The rise of quantum computers will render much of the existing cryptographic algorithms useless

This is including RSA, AES 128, ECC, Diffie Helman and others. This is a major threat to any organization holding sensitive data (any enterprise, government, hospital, etc.).

The U.S. National Institute for Standards and Technology (NIST) has been evaluating algorithms that can withstand quantum computers and recently selected four for PKI and digital signatures. As a result, proactive organizations want to discover, classify, and inventory their existing crypto so they can prioritize what to replace and are asking for solutions to help do this.

How We Help Inventa 3.3 now has cryptographic discovery to find secrets and cryptographic assets in storage. Examples include:

  • Type of secret (key, token, credentials, etc.)​
  • Crypto function (MD2/5, SHA, HMAC, etc.)
  • Crypto algorithm (DSA, EC, DES, AES, CMS, etc.)
  • Length of encryption key (128 bits, 256 bits, etc.)

With our classification search, the user can easily filter to find “128 bit keys” or “DES” to create a simple inventory of vulnerable encryption in their environment. Then, with a single click, the list can be exported to the relevant tools – ServiceNow, SIEM, SOAR – for remediation.

Learn More

Respondents to a recent Deloitte survey believe their organization is at risk for “Harvest now, decrypt later” attacks where bad-actors hoard encrypted data until quantum computers are ready to break the protections.

Let’s Get to Work