Software-based protection for a range of connected devices

Quantinuum has launched Quantum Origin Onboard, an innovation in cryptographic key generation that provides quantum computing hardened cyber protection for a wide range of connected devices by maximizing the strength of keys generated within the devices themselves.

  • 1 year ago Posted in

The risk of cyberattacks compromising organizations continues to grow. As cybercriminals uncover new techniques to exploit connected systems and their data, even the cryptographic foundations of cybersecurity measures remain vulnerable to advanced threats. Cryptographic keys created using current typical methods deployed by organizations around the world are not provably unpredictable, leaving encrypted data and systems potentially at risk of devastating attacks. Quantinuum’s quantum-computing-hardened cryptographic key enhancement solution provably minimizes the risk that businesses generate and use vulnerable encryption keys to protect encrypted data.

 

“While quantum computing has the potential to render current encryption algorithms obsolete, posing a significant challenge to businesses and individuals alike, already today sophisticated attackers can take advantage of vulnerable encryption keys” said Dr. Rajeeb Hazra, CEO of Quantinuum. “With our Quantum Origin Onboard and the overall Quantum Origin platform, organizations can fortify defenses across multiple endpoints and embrace the possibilities of a quantum-secure future. The next era of data security is here, and we are proud to be at the forefront as we collaborate with organizations worldwide.”

 

Strengthening encryption at the device level

Quantum Origin Onboard is the first and only commercially available enterprise software solution capable of delivering quantum-computing-hardened key enhancement. It can be installed directly onto devices and used to help deliver unparalleled foundational-level protection. Quantum Origin Onboard brings cutting-edge, enterprise-level security that integrates directly into connected devices without the need for additional hardware upgrades. This unique approach ensures that devices in any environment, online or offline, can generate quantum-computing-hardened keys to continually maximize the strength of encryption measures protecting devices.

 

Quantum Origin Onboard embeds a quantum seed, created by Quantinuum's H-series quantum computer, into devices. The seed is a string of provably unpredictable numbers, which enhance a device's capability to generate strong and secure keys.

 

“Enterprises are recognizing they can build unprecedented resilience by adopting quantum-computing-hardened cryptographic keys,” said Duncan Jones, Head of Cybersecurity at Quantinuum. “This is a paradigm shift, and enterprises in critical industries are embracing the opportunity to minimize a risk to one of their attack surfaces, specifically device-level encryption on internet connected products that might be in the field for a decade.”

 

The growing security threat to embedded devices

The growing use of connected devices continues to underpin innovation across industries, from critical infrastructure to healthcare to transportation to energy. As adoption has risen, cybercriminals have increasingly targeted vulnerable interconnected devices, causing mass disruption. One of the most infamous examples of the power of IoT-based attacks is the Mirai malware that infected IP cameras and basic home routers, creating a botnet that compromised a leading Domain Name Systems provider, leaving many high-profile websites inaccessible.

 

Quantum Origin Onboard embeds an industry-leading security capability into connected devices, to strengthen device security against advanced cyber-attacks, by minimizing an exploitable cyber vulnerability. As the only software solution of its kind, it simplifies deployment and provides uninterrupted key generation for connected devices and the data they manage.

Trustwave and Cybereason have announced a definitive merger agreement offering a comprehensive and...
FortiDLP’s unified approach to data protection enables enterprise organizations to anticipate and...
On average, only 48% of digital initiatives meet or exceed business outcome targets, according to...
Falcon platform will deliver complete protection against identity-based attacks across hybrid cloud...
95% of UK businesses said they were negatively impacted by supply chain cyber breaches within the...
Acquisition of leading DSPM company will bolster Proofpoint’s human-centric security platform...
NTT DATA’s new Managed Detection & Response service powered by Palo Alto Networks Cortex XSIAM...
SPG is enhancing its cybersecurity capabilities in a new partnership with Saviynt, a leading...