logo
#

Latest news with #Fortanix

Fortanix Ranks No. 51 Among Security Companies on 2025 Inc. 5000, Driven by Excellence in Data Security Management, End-to-End Secure AI, and Post-Quantum Cryptography
Fortanix Ranks No. 51 Among Security Companies on 2025 Inc. 5000, Driven by Excellence in Data Security Management, End-to-End Secure AI, and Post-Quantum Cryptography

Business Wire

time2 days ago

  • Business
  • Business Wire

Fortanix Ranks No. 51 Among Security Companies on 2025 Inc. 5000, Driven by Excellence in Data Security Management, End-to-End Secure AI, and Post-Quantum Cryptography

SANTA CLARA, Calif.--(BUSINESS WIRE)-- Fortanix® Inc., a global leader in data security for an AI world, today announced that it has been ranked No. 51 amongst security companies, and No. 2,712 overall, on the annual Inc. 5000 list, the most prestigious ranking of the fastest-growing private companies in America. Superior Elastic Data Security, Easy to Use Centralized Key Management, and Unbreakable Encryption Protect Enterprise AI Systems Today and Prepare for a Post-Quantum Future 'We're honored to be named one of the fastest-growing private companies in America for a second consecutive year,' said Anand Kashyap, CEO and Founder of Fortanix. 'This recognition reflects Fortanix's exceptional growth fueled by continued global demand for our flagship data encryption and key management platform, Data Security Manager (DSM), rising adoption of our Next-Generation Hardware Security Modules (HSM), and the burgeoning need for PQC readiness, all designed for an AI world.' Accelerating Post Quantum Cryptography (PQC) Readiness All Fortanix solutions support PQC readiness, crypto-agility and protection from newly emerging threats such as higher-order Gen AI computational attacks. The Fortanix platform includes a broad array of security solutions, all powered by Confidential Computing: Data Security Manager: Quantum-ready, software-defined encryption and key management Next Gen Hardware Security Module: Elastic, cloud native, and FIPS 140-2 L3 certified HSM Cloud Data Control: Multi-cloud, PQC-ready data control and cloud key management Key Insight: Discovery, heat mapping and remediation to ensure PQC Readiness Armet AI: Secure Gen AI platform for application data protection and compliance Some of the largest and vital global brands, especially in highly regulated industries such as financial services, healthcare, and government, rely on Fortanix to secure their sensitive data and be compliant with regulations like GDPR, DORA, HIPAA, and PCI DSS, to name a few. To learn more about Fortanix's platform, solutions and customers, visit About Fortanix Fortanix is the global leader in data-first cybersecurity and a pioneer of Confidential Computing. Its unified platform secures sensitive data across on-premises and multi-cloud environments—at rest, in transit, and in use—through advanced encryption and key management. Fortanix's encryption is resistant to all known cryptanalytic techniques, including the latest quantum computing algorithms, allowing for top-level compliance and operational simplicity while reducing risk and cost. Trusted by leading enterprises and government agencies, Fortanix enables users to run applications and AI workloads entirely within secure hardware enclaves—isolated, tamper-proof environments. This innovative approach, an industry standard known as Confidential Computing, has been supported by leading technology companies, including Intel, Microsoft, and NVIDIA. For more information, visit

Promising Post-Quantum Cryptography Solutions, According To Experts
Promising Post-Quantum Cryptography Solutions, According To Experts

Forbes

time03-07-2025

  • Business
  • Forbes

Promising Post-Quantum Cryptography Solutions, According To Experts

Quantum computing capabilities are accelerating, pushing traditional encryption methods closer to obsolescence. In response, cryptographers and security professionals are advancing post-quantum cryptography (PQC) solutions designed to resist attacks from quantum-capable adversaries. A range of candidate algorithms and transition strategies are under active evaluation for their cryptographic strength, implementation efficiency, scalability and applicability across real-world use cases. Below, members of Forbes Technology Council explore the PQC approaches they believe hold the most promise—including their advantages and trade-offs—to help organizations prepare for a quantum-resilient future. 1. Cryptographic Bills Of Materials A cryptographic bill of materials (CBOM) inventories all cryptographic components within an organization's systems to uncover vulnerable classical algorithms and guide efficient migration to quantum-safe alternatives. Implementation is complex and tooling is still emerging, but CBOMs will jumpstart a smarter, faster path to PQC readiness. - Mark Hughes, IBM 2. Leighton-Micali Signature With U.S. mandates requiring post-quantum cryptography by 2028, hardware makers must act now. Leighton-Micali Signature (LMS) is a robust choice for code signing today as it ensures authenticity and integrity, but crypto-agility is key—new algorithms may emerge with better performance. Early adoption ensures compliance and long-term security. - Anand Kashyap, Fortanix Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify? 3. ML-KEM (Kyber) The ML-KEM (Kyber) protocol is approaching 40% adoption. Its downside is a fraction of a second delay in establishing a webpage connection. The upside? Unlike classical TLS security, Kyber-secured browser connections are considered substantially more immune to 'record now, decrypt later' attacks, often discussed as a threat target of cryptographically relevant quantum computers. - Steven Woo, Rambus 4. Crypto-Agility Crypto-agility itself is the most promising 'solution' for the post-quantum era. With it, organizations can swap cryptographic primitives without rewriting infrastructure, which is critical as quantum-safe algorithms evolve. Though its main challenge lies in rearchitecting non-agile, legacy systems, Crypto-agility will separate those who are post-quantum ready from those who are exposed. - Jason Sabin, DigiCert Inc. 5. CRYSTALS-Kyber CRYSTALS-Kyber is a top contender in post-quantum encryption. It's already being tested by tech giants (for example, by Google in Chrome) to prepare for quantum threats. Though it uses larger keys, its speed and security make it ideal for Internet of Things and cloud systems. It's a real-world step toward securing data in a future where quantum attacks are a real risk. - Mehwish Salman Ali, Data Vault 6. NTRU NTRU is a public-key cryptosystem that relies on polynomial ring arithmetic. Pros: It has a faster encryption and decryption process, safeguards against future quantum decryption, and has smaller key sizes that minimize storage requirements. Cons: Intricate math requires top-level experts to implement it. It lacks widespread adoption, and all NTRUs need countermeasures from side-channel attacks. - Will Conaway, Ascent Business Partners 7. Lattice-Based Cryptography Lattice-based cryptography is a prominent solution that has three schemes: NTRUEncrypt, Learning with Errors (LWE), and Ring Learning With Errors (RLWE). They are resistant to quantum attacks, versatile in applications and efficient in key generation, but they have larger keys, translating to decreased performance. - Balaji Soundararajan, Adroitts 8. Code-Based Cryptography Code-based cryptography offers a robust solution for post-quantum security due to its long history of analysis and strong security guarantees against quantum attacks. Recent NIST-selected variants address historic key size challenges, offering simpler, quantum-resistant encryption that may be crucial if lattice- or hash-based PQC approaches face issues. - Neil Lampton, TIAG 9. CRYSTALS-Dilithium A good example is CRYSTALS-Dilithium, a post-quantum digital signature scheme. It is strong against quantum attacks and runs fast on most systems. It's good for signing documents or messages securely. But like others, it uses larger signatures than current methods and is still new, so more testing is needed. Still, it's a top choice for future-proof digital security. - Jay Krishnan, NAIB IT Consultancy Solutions WLL 10. OpenSSL 3.5 PQC is made tangible with the release of OpenSSL 3.5. The open-source library has added support for all three current NIST-standardized PQC algorithms: ML-KEM for key encapsulation and ML-DSA and SLH-DSA for signatures. It even enables a hybrid approach, combining classical encryption with PQC. There are transition challenges, implementation risks and bugs, but PQC is now easier to implement. - Kim Bozzella, Protiviti 11. McEliece Cryptosystem Code-based cryptography, specifically the McEliece cryptosystem, is a promising post-quantum solution. Its core strength lies in its decades of proven resistance to cryptanalysis. It relies on the difficulty of decoding general linear codes, which is believed to be intractable for quantum computers. However, its main weakness is its very large public key size, which poses practical challenges. - Pradeep Kumar Muthukamatchi, Microsoft 12. Blockchain Plus Post-Quantum Encryption Blockchain, when paired with post-quantum encryption, shows real promise in securing future digital ecosystems. Its decentralized nature adds resilience, while quantum-resistant algorithms protect data integrity. The challenge lies in scalability and retrofitting existing chains, but it's a strong foundation for long-term security. - Adrian Stelmach, EXPLITIA 13. BIKE BIKE, a code-based key encapsulation method, is one to watch. It's less talked about than Kyber but brings solid speed and compact key sizes to the table. The challenge? It's still maturing and needs more scrutiny from the cryptographic community. But in a diverse post-quantum toolkit, BIKE could play a quiet but important role. - Umesh Kumar Sharma 14. HQC-KEM HQC-KEM shows strong promise. Its power comes from classic code-based hardness plus a quasi-cyclic trick that slashes McEliece-size keys to ~10-20 KB, delivers constant-time operations, and resists known side-channel attacks. The trade-offs are that ciphertexts remain bulky and the decoding step is compute-hungry, so resource-constrained or high-throughput environments need careful optimization. - Pawan Anand, Ascendion 15. Picnic Picnic, a post-quantum signature scheme based on zero-knowledge proofs, shows promise by avoiding reliance on lattices or number-theoretic assumptions. This diversification strengthens its resilience against unforeseen quantum breakthroughs. However, its large signature sizes and slower verification limit practicality for real-time or resource-constrained systems. - Rahul Wankhede, Humana 16. SPHINCS+ I'm bullish on SPHINCS+ for digital signatures. It's hash-based, meaning its security relies on well-understood SHA-2/SHA-3 rather than exotic math. For mobile apps handling sensitive data, this conservative approach appeals to me. The downside? Signature sizes are massive—sometimes 40 KB. That's painful for bandwidth-constrained mobile apps, but the peace of mind might be worth it. - Marc Fischer, Dogtown Media LLC 17. Google Cloud I would honestly go with Google Cloud, since it would have the most to lose on the data front if its cryptography is ever cracked. Its strength is that you are backed by a huge player that takes data security seriously. Its weakness is that it is large and therefore a common target for all who wish to crack crypto algorithms—and in the same vein, for them, there's a lot to gain. - WaiJe Coler, InfoTracer 18. FrodoKEM FrodoKEM is a learning-with-errors-based algorithm designed without structured lattices, offering 'conservative' cryptography. Its biggest strength is transparency, built from simple, well-understood math. However, it comes with a trade-off: significantly larger key sizes and slower performance than competitors like Kyber. This limits its practicality in resource-limited systems. - Jagadish Gokavarapu, Wissen Infotech 19. Hash-Based XMSS Hash-based XMSS stands out for post-quantum security. With global cyberthreats, regulatory shifts and quantum risks rising, it's NIST-endorsed, offering robust digital signatures for banking. Its strengths are high security and efficient signing. Its weaknesses are complex implementation and higher computational costs. By 2030, it will secure transactions, but it needs simplification. Discipline drives trust and resilience. - Kalyan Gottipati, Citizens Financial Group, Inc. 20. Kyber Plus Dilithium NIST has finalized its first PQC standards with Kyber for encryption and Dilithium for digital signatures. The challenge is bringing them into embedded systems such as cars, planes and medical devices, where performance, security and reliability must all scale together. A solution is working with semiconductor partners already delivering early silicon optimized for quantum-safe cryptography. - Javed Khan, Aptiv

Fortanix Previewing Armet AI at the RSA Conference 2025, Delivering Comprehensive Data and Model Security Across the AI Lifecycle
Fortanix Previewing Armet AI at the RSA Conference 2025, Delivering Comprehensive Data and Model Security Across the AI Lifecycle

Business Wire

time24-04-2025

  • Business
  • Business Wire

Fortanix Previewing Armet AI at the RSA Conference 2025, Delivering Comprehensive Data and Model Security Across the AI Lifecycle

SANTA CLARA, Calif.--(BUSINESS WIRE)-- Fortanix® Inc., a global leader in data-first cybersecurity and a Confidential Computing pioneer, today announced its plans to publicly preview Fortanix Armet AI at the RSA Conference 2025 in San Francisco. The solution addresses a critical enterprise concern: the risk of exposing highly sensitive data when using off-the-shelf AI tools. RSA Attendees to Get an Exclusive First Look at the New Standard for Managing Data Exposure in GenAI Applications for Enterprises Now in public preview and built on Confidential Computing, Armet AI is a secure GenAI platform where every stage of the process—including data access, ingestion, vectorization, LLM inference, and response handling—occurs within secure hardware enclaves to prevent unauthorized access and the ability to alter customer data. With readily available connectors, enterprises can seamlessly integrate internal data sources to provide LLMs with the context needed for trusted answers, while built-in guardrails ensure that sensitive data stays protected and malicious prompt injections are stopped in their tracks. Fortanix was the first company to impenetrably protect enterprise data in a secure hardware enclave—a protected area of hardware memory where code and data run in complete isolation from the rest of the system. It was the first company to enable an enterprise application to run in a secure hardware-based enclave. And now, it is the first and only company to protect a global enterprise's entire AI solution, including but not limited to source data, data pipelines, vector databases, LLMs, inference engines and guardrails, within a secure hardware-based enclave. 'Generative AI has the power to transform every industry, but only if it can be trusted. Today, enterprise leaders are forced to choose between innovation and security—and that's a major dilemma facing enterprises today,' said Anand Kashyap, CEO and Founder of Fortanix. 'With Armet AI, we're redefining what's possible by protecting every aspect of the enterprise's GenAI pipeline. We look forward to providing RSA attendees an exclusive preview of the technology.' What: Public Preview of Armet AI at RSA Conference 2025 When: April 28 - May 1, 2025 Where: Moscone Center South Expo Hall, Fortanix Booth #1849 Book a 1:1 meeting with a Fortanix representative to receive a pair of Apple AirPods or join one of our multiple in-booth presentations from executives at Fortanix, Citi, Cohesity, NVIDIA, AppViewX, BigID, Keyfactor, Quantum Dice, Qrypt and more. Additional Resources About Fortanix Fortanix is the global leader in data-first cybersecurity and a pioneer of Confidential Computing. Its unified platform secures sensitive data across on-premises and multi-cloud environments—at rest, in transit, and in use—through advanced encryption and key management. Fortanix's encryption is resistant to all known cryptanalytic techniques, including the latest quantum computing algorithms, allowing for top-level compliance and operational simplicity while reducing risk and cost. Trusted by leading enterprises and government agencies, Fortanix enables users to run applications and AI workloads entirely within secure hardware enclaves—isolated, tamper-proof environments. This innovative approach, an industry standard known as Confidential Computing, has been supported by leading technology companies, including Intel, Microsoft, and NVIDIA. For any global enterprise that absolutely cannot risk its data being exposed to unauthorized parties or altered by bad actors, Fortanix provides the only solution that has never been, and never will be, breached. For more information, visit

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store