Post-Quantum enforces data confidentiality, authenticity and access control for now
and the future
“We cannot just rely on antivirus and firewalls anymore, we need to take steps to innovate new ways of creating security, privacy and safety for the customers…The Post-Quantum team…has provided us with an insight into new technologies, new ways of securing and encrypting the internet”
Chief Information Security Officer, Barclays PLC
billion cost from stolen
user records lost per year
of companies will suffer a data breach in the next 2 years
of data breaches are malicious or criminal attacks
5-10 years – estimate for breaking RSA with quantum cryptanalysis
Securing Mobile Transactions
of smartphone users have used online banking
Mobile is now the most popular way of banking in the UK
of lost smartphones have their business data compromised
of IT Managers agree the risk of malware spreading to the business network from mobile devices is moderate to very high
User authentication, non-repudiation and fraud deterrence
Our ‘video selfie’ goes beyond authenticating a user’s identity; it signs and seals a transaction. PQ Check immutably binds an identity to a transaction.
Quorum key technology prevents data breaches. The encryption key is split into fragments. Access to data is only possible when a quorum of fragment holders come together in consensus.
A secure and user-friendly voice and messaging app for desktop and mobile. Suitable for enterprise and government applications.
Encryption designed to resist current and future hacking threats. Quantum computer and supercomputer resistant