Fortanix Monthly Newsletter June 2025
Fortanix has rolled out PQC Central, a new feature in its Key Insight tool, to help businesses understand and fix their exposure to future quantum-based attacks. As quantum computers move closer to reality, today’s encryption won’t be enough to keep data safe. PQC Central shows where your current systems are at risk, scores your readiness, and builds a clear plan to upgrade to safer algorithms.
Part of the Fortanix Armor platform, PQC Central works across all environments, cloud or on-premises, without replacing existing key management tools or hardware. It supports recommended algorithms like Kyber, Dilithium, LMS, and XMSS and helps teams stay aligned with timelines such as the EU’s 2026 post-quantum target.
As governments and regulators push for post-quantum cryptography (PQC) readiness by 2026, the time to act is now. Join Fortanix and cybersecurity leaders from Citi and PenFed Credit Union for an exclusive discussion on how large enterprises are assessing their cryptographic risk and building realistic PQC roadmaps.
Highlights:
How to discover and assess quantum-vulnerable encryption in your environment
Lessons from real-world PQC readiness projects at scale
Practical steps to start your transition without overhauling your infrastructure
Insights on cryptographic policy, IT coordination, and regulatory timelines
Featured Speakers:
Sudha E Iyer, Chief Cybersecurity Architect, Citi
David Chapman, Director of Identity Access Management, PenFed Credit Union
Dr. Richard Searle, Chief AI Officer, Fortanix
Craig Matsumoto , Contributing Analyst, Futuriom
🗓 Date: July 15 🕘 Time: 9 AM PT | 12 PM ET
This eBook breaks down what post-quantum cryptography means for your business, why acting now matters, and how to begin the shift with a structured, four-step plan. It also covers how tools like Fortanix Key Insight help make this transition more manageable.
Post-Quantum Readiness: A Strategic Journey, Not a Simple Switch
Quantum computing is no longer theoretical; traditional encryption won’t hold up for long. This webinar goes beyond the buzz to focus on how to transition to post-quantum cryptography. From building cryptographic inventories to managing hybrid environments and aligning leadership, we’ll outline the practical steps every organization must take.
Next Generation HSM: Modernize Security, Eliminate Complexity & PQC-Proof Encryption
Legacy HSMs weren’t built for Zero Trust, scalable architectures, or post-quantum threats. They’re clunky, manual, and, in many cases, not even US-built. This webinar explains why federal agencies are shifting to modern HSM alternatives and how Fortanix DSM, powered by Confidential Computing, delivers the security, automation, and crypto agility needed for what’s next.
Pat Conte, VP & GM of Americas, Fortanix, and Rodney Alto, Consultant, Google (former U.S. Intelligence Officer) get on a candid conversation on replacing legacy systems with purpose-built solutions for today’s demands.
⚠️ How do we take GenAI to production without breaking trust, privacy, or security?
That’s the central question in this power-packed panel hosted by theCUBE, featuring Fortanix CPO, Anuj Jaiswal, and Nicolas Dupont – CEO, Cyborg Eiman Ebrahimi – CEO & Co-founder, Protopia AI
With the host & co-founder of SiliconANGLE Media, John Furrier, SiliconANGLE & theCUBE
Thank you, Brian J. Baumann, Founder, NYSE Wired, for orchestrating this panel.
✅ Anuj shares how Fortanix built an end-to-end secure AI platform, from data ingestion to inference, and why it’s becoming the missing bridge between GenAI experiments and real-world deployment.
A Peek Inside Post-Quantum Keys | Read
How to Build a Cloud Data Security Strategy for Enterprises | Read
Why Quantum-Resistant Cryptography Matters Now | Read
Role of Cloud HSM in Strengthening Enterprise Data Security | Read
Top Cloud Security Tools You Need to Protect Your Data | Read
Prevent Your Business from Next Data Security Breach | Read
How to Find the Exact Data Security Services Your Business is Seeking | Read
A Guide to Cloud Key Management Best Practices | Read
Role of Format-Preserving Encryption in Data Security | Read
How to Implement a BYOE Strategy for Securing Data | Read
AI Governance as the Cornerstone of Trust in the Age of Generative AI | Read
How Data Tokenization Protects Sensitive Information | Read