Fortanix Monthly Newsletter June 2025
Fortanix Monthly Newsletter June 2025

Fortanix Monthly Newsletter June 2025

Fortanix Launches PQC Central to Help Organizations Prepare for the Quantum Threat.

Fortanix has rolled out PQC Central, a new feature in its Key Insight tool, to help businesses understand and fix their exposure to future quantum-based attacks. As quantum computers move closer to reality, today’s encryption won’t be enough to keep data safe. PQC Central shows where your current systems are at risk, scores your readiness, and builds a clear plan to upgrade to safer algorithms. 

Part of the Fortanix Armor platform, PQC Central works across all environments, cloud or on-premises, without replacing existing key management tools or hardware. It supports recommended algorithms like Kyber, Dilithium, LMS, and XMSS and helps teams stay aligned with timelines such as the EU’s 2026 post-quantum target.

Read More

Your Data Is Not Safe! Quantum Readiness is Urgent.

As governments and regulators push for post-quantum cryptography (PQC) readiness by 2026, the time to act is now. Join Fortanix and cybersecurity leaders from Citi and PenFed Credit Union for an exclusive discussion on how large enterprises are assessing their cryptographic risk and building realistic PQC roadmaps.

Highlights:

  • How to discover and assess quantum-vulnerable encryption in your environment 

  • Lessons from real-world PQC readiness projects at scale 

  • Practical steps to start your transition without overhauling your infrastructure

  • Insights on cryptographic policy, IT coordination, and regulatory timelines 

Featured Speakers:

🗓 Date: July 15 🕘 Time: 9 AM PT | 12 PM ET 

Register

The Ultimate Guide for Post-Quantum Readiness

This eBook breaks down what post-quantum cryptography means for your business, why acting now matters, and how to begin the shift with a structured, four-step plan. It also covers how tools like Fortanix Key Insight help make this transition more manageable.

 Download

Fortanix Webinars

Post-Quantum Readiness: A Strategic Journey, Not a Simple Switch

Quantum computing is no longer theoretical; traditional encryption won’t hold up for long. This webinar goes beyond the buzz to focus on how to transition to post-quantum cryptography. From building cryptographic inventories to managing hybrid environments and aligning leadership, we’ll outline the practical steps every organization must take.

Watch

Next Generation HSM: Modernize Security, Eliminate Complexity & PQC-Proof Encryption

Legacy HSMs weren’t built for Zero Trust, scalable architectures, or post-quantum threats. They’re clunky, manual, and, in many cases, not even US-built. This webinar explains why federal agencies are shifting to modern HSM alternatives and how Fortanix DSM, powered by Confidential Computing, delivers the security, automation, and crypto agility needed for what’s next. 

Pat Conte, VP & GM of Americas, Fortanix, and Rodney Alto, Consultant, Google (former U.S. Intelligence Officer) get on a candid conversation on replacing legacy systems with purpose-built solutions for today’s demands. 

 Watch

Ciphering Intelligence: The Future of AI Encryption

⚠️ How do we take GenAI to production without breaking trust, privacy, or security? 

That’s the central question in this power-packed panel hosted by theCUBE, featuring Fortanix CPO, Anuj Jaiswal, and Nicolas Dupont – CEO, Cyborg  Eiman Ebrahimi – CEO & Co-founder, Protopia AI

With the host & co-founder of SiliconANGLE Media, John Furrier, SiliconANGLE & theCUBE  

Thank you, Brian J. Baumann, Founder, NYSE Wired, for orchestrating this panel.

✅ Anuj shares how Fortanix built an end-to-end secure AI platform, from data ingestion to inference, and why it’s becoming the missing bridge between GenAI experiments and real-world deployment. 

Watch the full panel here

Fortanix News and Blogs

A Peek Inside Post-Quantum Keys | Read 

How to Build a Cloud Data Security Strategy for Enterprises | Read 

Why Quantum-Resistant Cryptography Matters Now | Read 

Role of Cloud HSM in Strengthening Enterprise Data Security | Read 

Top Cloud Security Tools You Need to Protect Your Data | Read 

Prevent Your Business from Next Data Security Breach | Read 

How to Find the Exact Data Security Services Your Business is Seeking | Read 

A Guide to Cloud Key Management Best Practices | Read 

Role of Format-Preserving Encryption in Data Security | Read 

How to Implement a BYOE Strategy for Securing Data | Read 

AI Governance as the Cornerstone of Trust in the Age of Generative AI | Read 

How Data Tokenization Protects Sensitive Information | Read 

To view or add a comment, sign in

Others also viewed

Explore topics