Skip to main content
banner image
venafi logo

Mastering the Quantum Challenge for Machine Identities [A Smooth and Scalable Solution from ISARA]

Mastering the Quantum Challenge for Machine Identities [A Smooth and Scalable Solution from ISARA]

quantum-computing-venafi-development-fund
November 4, 2020 | Mike Brown, ISARA

It is no secret that cybersecurity threats are ever-evolving. Each day, security professionals around the world receive reports of new vulnerabilities, new attack vectors, and new challenges that need to be overcome in this increasingly connected world. To make matters worse, cyberattacks are not only becoming increasingly sophisticated and damaging, but often easier to deploy as well.

Large organizations, such as those in the Global 5000, must be especially vigilant against new and emerging threats. These organizations have much more to protect than do smaller enterprises, and it generally takes comparatively more time and resources for large enterprises to reposition their security postures. Proactive measures and long-term vision are the keys to enabling Global 5000 companies to defend themselves efficiently against emerging cyber threats. To combat modern threats, modern defenses are required. But what are organizations to do when a threat unlike anything they have faced before looms on the horizon?

Quantum computers will enable threat actors to compromise the security and integrity of the devices and machines organizations rely on for their business operations. To protect systems against quantum-enabled attacks, post-quantum cryptographic solutions are required. The National Institute of Standards and Technology (NIST) is currently standardizing a suite of post-quantum algorithms that organizations can use alongside new paradigm methodologies to defeat these next-generation threat actors.

Ideally, organizations would be able to smoothly upgrade all their digital certificates and machine embedded cryptography to include post-quantum protections. Unfortunately, making such a transition is non-trivial in reality, and the difficulty and complexity increase with the size of the organization. A post-quantum migration requires that organizations have a deep understanding of not only their internal security postures but also of how their security postures are controlled or influenced by things such as their vendors or suppliers.

To help ease the post-quantum migration for customers, the Venafi Platform now supports the ISARA Radiate™ Quantum-safe Toolkit and the ISARA Catalyst™ Hybrid Certificate methodology. These offerings include a technique for using crypto agile certificates—leveraging highly optimized standards candidate post-quantum algorithms—that enable a phased and seamless migration while maintaining backward compatibility with current systems.

The consensus is that the arrival of large-scale quantum computers is only a matter of time. Of course, there is some debate as to the exact timeline, but industry experts typically estimate a range between seven and 15 years. Given the complexity of a cryptographic migration, the time to get serious about implementing quantum-safe solutions is now. NIST is aggressively pursuing their schedule of algorithm selection, but even then, true enterprise solutions have been lacking. 

Enterprises will now be able to make requests through the Venafi Platform for hybrid quantum-safe certificates that support both classical and quantum-safe cryptography. Leading Certificate Authorities are in the process of making these types of certificates available. The Venafi Platform will support and facilitate this certificate orchestration through partners such as ISARA.  The current version of the solutions can be found in the Venafi Marketplace.

The number of machines that enterprises need to protect continues to increase at a staggering rate. The Venafi Platform is a unique and powerful collection of tools that enable enterprises to address this growing problem in a smooth and scalable way. Through ISARA’s participation in the Venafi Machine Identity Management Development Fund, the Venafi Platform now supports technologies that give enterprises the ability to augment their security postures with quantum-safe solutions well before the threat of quantum computers becomes an unignorable reality.

Are you ready for the quantum revolution?


This blog features solutions from the ever-growing Venafi Ecosystem, where industry leaders are building and collaborating to protect more machine identities across organizations like yours. Learn more about how the Venafi Technology Network is evolving above and beyond just technical integrations.
 

Related posts


Learn more about Machine Identity Management.

Like this blog? We think you will love this.
kubernetes-wheel-2
Featured Blog

Cloud Native Machine Identity Management for Zero Trust [Pomerium & cert-manager]

Richard: Tell us about Pomerium and the role machine ide

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies
eBook

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Mike Brown, ISARA
Mike Brown, ISARA
Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more