logo
Commvault Introduces New Post-Quantum Cryptography Capabilities

Commvault Introduces New Post-Quantum Cryptography Capabilities

Commvault has announced enhancements to its post-quantum cryptography (PQC) capabilities. These advancements are designed to help customers protect their highly sensitive, long-term data from a new generation of imminent but unknown cyber threats, creating an additional layer of support, when needed.
Quantum computing uses quantum mechanics to process data and solve complex problems that could take decades with classical computers. However, these advancements bring unprecedented security challenges, along with the potential for threat actors to use quantum computing to decipher and unlock traditional encryption methods. According to the Information Systems Audit and Control Association's (ISACA) Quantum Computing Pulse Poll, 63% of technology and cybersecurity professionals say quantum will increase or shift cybersecurity risks and 50% believe it will present regulatory and compliance challenges. Now is the time to prepare and take action.
Commvault has provided support for quantum-resistant encryption standards, like CRYSTALS-Kyber, CRYSTALS-Dilithium, SPHINCS+, and FALCON, as recommended by the National Institute of Standards and Technology (NIST) since August 2024. It was then that Commvault introduced a cryptographic agility (crypto-agility) framework, enabling its customers, via the Commvault Cloud platform, to address rapidly evolving threats without overhauling their systems. With today's announcement, Commvault has built on that framework by adding support for Hamming Quasi-Cyclic (HQC), a new error correcting code-based algorithm designed to defend against threats like 'harvest now, decrypt later' where adversaries are intercepting encrypted network traffic and storing it for a later time when quantum computers are powerful enough to decrypt it.
'The quantum threat isn't theoretical,' said Bill O'Connell, Chief Security Officer at Commvault. 'We were among the first cyber resilience vendors to address post-quantum computing, and by integrating new algorithms like HQC and advancing our crypto-agility framework, we are providing our customers with the tools to navigate this complex landscape with confidence. Our goal is simple and clear: as quantum computing threats emerge, we intend to help our customers keep their data protected.'
For industries where long-term data storage is required, like finance and healthcare, Commvault's expanded post-quantum cryptography capabilities provide access to a variety of safeguards that can help fortify network tunnels against quantum-based attacks. With Commvault's Risk Analysis capabilities, customers can discover and classify data to determine where these cryptographic capabilities may be helpful. In addition, Commvault's capabilities are simple to implement, often using a checkbox configuration, making it easy for customers to utilize when needed.
The evolving quantum landscape – the need for speed
As investments pour into the quantum field, the time to address emerging threats is shrinking. This makes proactive adoption of post-quantum cryptography critical.
'Quantum readiness has become a business imperative, particularly for industries which handle data that remains sensitive for decades. The time when currently encrypted data can be decrypted using quantum technology is closer than many people think,' said Phil Goodwin, Research VP, IDC. 'Commvault's early adoption of quantum-resistant cryptography and commitment to crypto-agility positions it at the forefront among data protection software vendors in proactively addressing quantum threats. Organizations with sensitive, long-term data need to prepare now for a quantum world.'
'Commvault has been an invaluable partner in our journey to enhance cyber resilience. Their leadership in adopting post-quantum cryptography, combined with their crypto-agility framework, is exactly what we need to meet stringent government security mandates and protect highly sensitive information from emerging quantum threats,' said Jeff Day, Deputy Chief Information Security Officer, Nevada Department of Transportation.
'Safeguarding sensitive data is paramount, and the long-term threat of quantum decryption is a significant concern. Commvault's rapid integration of NIST's quantum-resistant standards, particularly HQC, gives us great confidence that our critical information is protected now and well into the future,' said Peter Hands, Chief Information Security Officer, British Medical Association. 'Their commitment to crypto-agility is important for healthcare organizations like ours.'
Availability
Commvault's post-quantum cryptography capabilities, including support for NIST's HQC algorithm, are immediately available to all Commvault Cloud customers running software version CPR 2024 (11.36) and later, enabling seamless adoption of quantum-resistant protection.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Falcon Technic Returns Global Express XRS Back to the Skies After Major Maintenance
Falcon Technic Returns Global Express XRS Back to the Skies After Major Maintenance

Web Release

time10 hours ago

  • Web Release

Falcon Technic Returns Global Express XRS Back to the Skies After Major Maintenance

Falcon Technic, part of Alex Group Investment, has successfully completed a major 60-month inspection on the Global Express XRS (A6-AFC), highlighting the base maintenance capabilities of its state-of-the-art MRO facility in Dubai. Base maintenance checks are the most detailed inspection events in an aircraft's life, covering everything from the structure and avionics to the hydraulic systems and flight controls, often revealing a variety of defects for the MRO to rectify. During this inspection, the Falcon Technic team competently carried out structural repairs for corrosion found on the wing trailing edge and dry bay areas. In addition to the schedule maintenance inspections, these inputs provide a valuable opportunity to incorporate the latest service bulletins, such as the one performed to upgrade the engine bleed air detection system. Additional work all encompassed within the planned down time. The eight strong dedicated team of engineers provided over 2,000 man-hours of expertise to the project and before returning to operations, the aircraft underwent a further handling flight to verify its performance, which was completed without a single issue being reported by the flight crew, confirming its readiness for full operations. The aircraft was returned to service on August 9th, 2025, fully inspected, repaired, and ready to take to the skies again for Falcon. 'When an aircraft comes into Falcon Technic, it leaves stronger, safer, and ready for the skies. That's true for our fleet, and it's true for every customer who chooses us. This inspection is proof of what our team can do,' said Mr. Sultan Rashit Abdulla Rashit Al Shene, Founder & Chairman of Alex Group Investment. The next major inspection for A6-AFC is scheduled after a further 500 flight hours, but for now, the Global Express XRS is back where it belongs: flying.

CrowdStrike Unveils Signal To Transform AI-Powered Threat Detection
CrowdStrike Unveils Signal To Transform AI-Powered Threat Detection

Channel Post MEA

time3 days ago

  • Channel Post MEA

CrowdStrike Unveils Signal To Transform AI-Powered Threat Detection

CrowdStrike has announced the general availability of CrowdStrike Signal, a new class of AI-powered detection engines that surface the undetectable threats others miss – before they escalate. Signal uses self-learning models for every host to understand what's normal in that environment across time, systems, and users. It pinpoints subtle, early-stage threat activity and connects related behaviors – before traditional tools act. By identifying weak signals that deviate from the norm and building high-confidence, prioritized leads, Signal accelerates the Falcon platform's AI advantage and empowers security teams to investigate, hunt, and stop threats earlier in the kill chain. Modern attacks often begin with low-signal activity that appears benign in isolation. Traditional rule-based systems ignore these behaviors because they lack the context to tell what's suspicious and what's just noise. Even newer AI approaches apply scoring only after a detection has occurred. Signal learns what's normal across the environment and continuously updates its understanding of standard activity as conditions change – identifying what deviates and linking early-stage behaviors with downstream activity. By analyzing behavior earlier in the threat lifecycle and correlating subtle activity across time, CrowdStrike turns fragmented signals into a small number of prioritized, AI-generated leads that expose threats buried in the noise and jumpstart response. Born on the endpoint, Signal lays the foundation for next-generation detection across identity, cloud, and third-party data. 'CrowdStrike pioneered AI-native cybersecurity, and continues to deliver the innovation driving the industry forward. Signal is our latest breakthrough, built to detect how modern adversaries actually operate,' said Elia Zaitsev, chief technology officer, CrowdStrike. 'Today's attackers spread subtle signals over time to stay under the radar. Signal is designed to catch what others overlook, connecting the dots across systems and time to paint the full picture.' Signal Through the Noise Behind Signal is a new family of statistical time series models that analyze billions of daily events within each customer's environment. By linking signals across time and systems, Signal filters out repetitive activity and surfaces what's truly unusual. This correlation builds high-confidence patterns that reveal stealthy attacker behavior before others can, giving defenders a clear starting point to act. Self-learning AI to Understand the Customer Environment: Signal continuously models behavior for each user, host, and process, adapting over time to surface meaningful deviations. Unlike static rules or pre-trained models, it delivers early-stage detection without manual configuration or constant adjustment. Signal continuously models behavior for each user, host, and process, adapting over time to surface meaningful deviations. Unlike static rules or pre-trained models, it delivers early-stage detection without manual configuration or constant adjustment. Real-time Detection of Stealthy Tradecraft Others Miss: Signal links subtle behaviors often used by attackers – but also commonly seen on benign hosts – such as the use of living-off-the-land tools for reconnaissance or applications running from temporary directories. This low-signal activity may appear benign in isolation, but analyzed earlier, over time and context, it reveals attacker activity that would otherwise go unnoticed. Signal links subtle behaviors often used by attackers – but also commonly seen on benign hosts – such as the use of living-off-the-land tools for reconnaissance or applications running from temporary directories. This low-signal activity may appear benign in isolation, but analyzed earlier, over time and context, it reveals attacker activity that would otherwise go unnoticed. High-confidence Leads Reduce Alert Volume, Accelerate Response: Signal condenses a vast number of behaviors and detections into a small set of high-fidelity leads. It surfaces early indicators of compromise, reduces false positives, and groups related activity into a single starting point to eliminate manual triage and speed investigation, hunting, and response.

Falcon Technic Expands GCAA Approval to Include Falcon 900EX EASy Line Maintenance
Falcon Technic Expands GCAA Approval to Include Falcon 900EX EASy Line Maintenance

Web Release

time29-07-2025

  • Web Release

Falcon Technic Expands GCAA Approval to Include Falcon 900EX EASy Line Maintenance

Falcon Technic, the MRO division of Falcon, the aviation arm of Alex Group Investment, is proud to announce the successful amendment of its GCAA AMO Approval Certificate. The updated certificate now includes Line Maintenance capability for the Falcon 900EX EASy. This news reflects Falcon Technic's continued growth and its commitment to providing certified, high-quality maintenance solutions for a wider range of business aircraft in the United Arab Emirates. The Falcon 900EX EASy is a long-range business jet, widely recognised for its performance and advanced avionics. 'Our pursuit of excellence is part of our standard. At Falcon Technic, every expansion is intentional and every approval hard-earned. Adding the Falcon 900EX EASy to our scope is a clear statement of our commitment to lead, to serve this region and to keep pushing the limits of what we can deliver,' said Mr. Sultan Rashit Abdulla Rashit Al Shene, Founder & Chairman of Alex Group Investment. With this new capability, Falcon Technic can now support operators and owners of this aircraft with fast and compliant line maintenance directly from its base at Falcon's 13,705 sqm hangar facility. Falcon Technic continues to invest in people, training and infrastructure to meet the growing demands of the aviation industry across the UAE and beyond.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store