Type a keyword or Post Title

Deployable Hardware and Software Solutions from QuintessenceLabs

by QuintessenceLabs on 21/02/2024 6:42 AM

QuintessenceLabs

Security threats worldwide have increased both in number and sophistication, making it critical for organizations to improve their data protection. But as with any big upgrade to infrastructure, it can be a significant challenge to secure information effectively, affordably, and without hindering operations.

A founding principle of data protection is encryption, keeping the data safe even when a breach occurs. Yet generating and effectively managing encryption keys can be quite an undertaking, particularly when integrating multiple devices spread across locations and users. And for the most sensitive assets, organizations must consider stronger protection, such as solutions with automatic zeroization, one-time pad (OTP) encryption, and quantum key distribution (QKD).

QuintessenceLabs offers security products that enable organizations to protect their valuable data, whether at rest, in transit, or in use. Through the combined power of quantum science and advanced data protection, our solutions maximize security, increase the ROI of existing assets, and ultimately reduce the complexities inherent in data security management.
 

Trusted Security Foundation® (TSF®) Key and Policy Manager - Agile Enterprise Key Management 

Designed to easily address the toughest challenges in key management, our TSF key and policy manager provides highly capable and fully interoperable centralized key and policy management with outstanding performance, availability, and integrity.

The TSF can be deployed as a virtual machine (TSF 100) or a selection of hardware appliances (TSF 200, TSF 300, TSF 400). It can integrate our QRNG with a FIPS 140-2 Level 3 HSM to meet the highest security needs (TSF 400).

   •   Centralized and vendor-neutral encryption key management solution  

   •   Crypto-agile adaptable to quantum resistant algorithms  

   •   Enables strong and comprehensive end-to-end encryption  

   •   Enabler for transition to quantum-safe
 

qStream™ QRNG - High-speed, True Random Number Generation  

Random numbers are fundamental to data security. They are used to generate encryption keys and other parameters at the heart of data protection. Random numbers are at the core of most security applications, as well as numerical simulations, random sampling, and gaming. It is important that the output from random number generators is both unpredictable and has a high enough throughput for commercial use. QuintessenceLabs' qStream™ quantum random number generator (QRNG) uses ground-breaking quantum technology to deliver random numbers with full entropy at 1 Gbit/sec, providing both the randomness and the speed required.

Integrating the qStream QRNG appliance into your existing security infrastructure is as simple as installing any other appliance or device in your network.

   •   Generates perfectly unpredictable true random numbers  

   •   Delivered at the speeds needed for commercial applications  

   •   Provides high-quality entropy for stronger encryption keys  

  

qOptica™ QKD – A Significant Step Towards Providing Post-Quantum Crypto Defence 

Quantum Key Distribution (QKD) is a point-to-point protocol that uses specialised hardware to share secret keys over an optical link (fibre or free space).

QuintessenceLabs’ continuous variable quantum key distribution (CV-QKD) technology is the most secure means of distributing keys, protected by the laws of physics. Our current solution integrates a quantum entropy source and distributes keys over existing optic fibre between network nodes.

• Point-to-point protocol that uses specialized hardware to share secret keys over an optical link  

• Secrecy of the keys is guaranteed by the laws of quantum physics  

• Offers CV-QKD technology with built-in advantages in terms of cost, form factor, and performance  

Through the combined power of quantum science and advanced data protection, QuintessenceLabs’ solutions maximize security, increase the ROI of existing assets, and ultimately reduce the complexities inherent in data security management. 

For additional information please visit www.quintessencelabs.com

Comments

LEAVE YOUR COMMENT