{"id":343235,"date":"2025-08-14T04:50:36","date_gmt":"2025-08-14T11:50:36","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=343235"},"modified":"2025-08-15T15:35:22","modified_gmt":"2025-08-15T22:35:22","slug":"securing-the-quantum-age","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2025\/08\/securing-the-quantum-age\/","title":{"rendered":"Securing the Quantum Age"},"content":{"rendered":"<h1><a id=\"post-343235-_g0eqnw8beb83\"><\/a>Palo Alto Networks Announces New Quantum Security Innovations<\/h1>\n<p><em>New Cryptography Inventory Tool, Quantum-Optimized Firewalls and PAN-OS 12.1 Enable Quantum Readiness<\/em><\/p>\n<p>The cybersecurity landscape is rapidly shifting due to a risk that\u2019s quietly brewing in the background: the race to achieve quantum supremacy. Quantum computing has long promised to redefine what\u2019s possible in technology, with its ability to solve complex problems exponentially faster than classical computers. This technological breakthrough promises many benefits likely to unlock trillions in economic value but will also introduce major new risks to the cryptographic foundations of modern cybersecurity. Despite this significance, quantum is still often dismissed as a problem too far away to worry about.<\/p>\n<p>That\u2019s changing with the convergence of AI and quantum computing. Researchers are now <a href=\"https:\/\/thequantuminsider.com\/2025\/01\/06\/ai-for-quantum-error-correction-a-comprehensive-guide-to-using-artificial-intelligence-to-improve-quantum-error-correction\/#:~:text=For%20instance%2C%20Google%20Quantum%20AI,in%20their%20superconducting%20quantum%20processors.\" rel=\"nofollow,noopener\" >leveraging AI to reduce some of the key barriers to quantum computing<\/a>, like automating qubit error correction and optimizing quantum algorithms. This means cryptographically relevant quantum computing (CRQC) \u2013 the point at which quantum systems can break today\u2019s public key cryptography \u2013 could arrive sooner than the industry initially projected. <a href=\"https:\/\/www.mckinsey.com\/~\/media\/mckinsey\/business%20functions\/mckinsey%20digital\/our%20insights\/steady%20progress%20in%20approaching%20the%20quantum%20advantage\/quantum-technology-monitor-april-2024.pdf\" rel=\"nofollow,noopener\" >McKinsey (2024)<\/a> predicted a CRQC could break the most common public-key encryption algorithms as soon as 2027, while <a href=\"https:\/\/www.gartner.com\/en\/articles\/post-quantum-cryptography\" rel=\"nofollow,noopener\" >Gartner (2025)<\/a> predicts that most conventional asymmetric cryptography would be unsafe to use by 2029.<\/p>\n<p>Governments around the world have taken notice, developing new national quantum readiness strategies, including requirements to migrate to new quantum resistant Post-Quantum Cryptographic (PQC) standards, like those developed by the <a href=\"https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\" rel=\"nofollow,noopener\" >United States National Institute of Standards and Technology (NIST)<\/a>. Organizations are also experimenting with solutions beyond PQC migration, adopting technologies like Quantum Random Number Generation (QRNG) and Quantum Key Distribution (QKD) to build additional resilience to unforeseen computational advancements.<\/p>\n<p>These emerging quantum readiness strategies have another common thread: emphasizing the critical role technology providers can play to proactively lead in the quantum era. At Palo Alto Networks, we\u2019re meeting this moment by announcing a comprehensive suite of new quantum security capabilities as part of <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2025\/08\/paves-way-for-quantum-ready-security\/\">PAN-OS 12.1 Orion<\/a> and our new quantum-optimized fifth-generation Next-Generation Firewalls (NGFW). These capabilities will empower organizations globally, across government and critical infrastructure, to accelerate their quantum readiness in alignment with emerging global and regional standards. Here is how our new capabilities can help your organization meet some of the fundamental imperatives of quantum readiness:<\/p>\n<h4><a id=\"post-343235-_7w206tmw0wzg\"><\/a><strong>Discover \u2014 Conducting Automated Cryptographic Inventories<\/strong><\/h4>\n<ul>\n<li><em>Challenge: <\/em>Establishing foundational visibility of your organization\u2019s cryptographic usage is often cited as the best first step to kick-start quantum readiness. But legacy cryptographic inventory technologies have been insufficient, providing an incomplete and static snapshot of cryptography usage, failing to connect cryptography to sensitive data, and unable to empower users to take remediation action in real-time.<\/li>\n<li><em>Solution:<\/em> Palo Alto Networks announced <a href=\"https:\/\/live.paloaltonetworks.com\/t5\/community-blogs\/unlock-your-quantum-defense-introducing-the-quantum-readiness\/ba-p\/1232791\">Strata Cloud Manager's <strong>\u2018<\/strong><em>Quantum Readiness<\/em><strong>\u2019<\/strong> view<\/a> and a forthcoming \u2018<em>Cryptographic Inventory<\/em>\u2019 insights dashboard to help you prepare for the quantum era. Organizations can gain visibility and take control of their cryptographic risk posture across users and applications from a single management interface. With <em>Quantum Readiness<\/em> view, we\u2019re introducing several capabilities:<\/li>\n<\/ul>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li>Inventory and assess cryptography usage as secure, weak or vulnerable.<\/li>\n<li>Validate compliance with a range of government standards and regulations.<\/li>\n<li>Remediate and upgrade to PQCs through an inline workflow.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<h4 style=\"padding-left: 40px;\"><div style=\"max-width:100%\" data-width=\"1112\"><span class=\"ar-custom\" style=\"padding-bottom:62.59%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-343261 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/08\/Quantum-Readiness-View-230x144.png\" alt=\"\" width=\"1112\" height=\"696\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/08\/Quantum-Readiness-View-230x144.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/08\/Quantum-Readiness-View-500x314.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/08\/Quantum-Readiness-View-768x482.png 768w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/08\/Quantum-Readiness-View-1536x963.png 1536w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/08\/Quantum-Readiness-View-2048x1284.png 2048w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/08\/Quantum-Readiness-View-478x300.png 478w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/08\/Quantum-Readiness-View-64x40.png 64w\" sizes=\"auto, (max-width: 1112px) 100vw, 1112px\" \/><\/span><\/div><\/h4>\n<h4><a id=\"post-343235-_2rtc86908mw4\"><\/a><strong>Dep<\/strong><strong>loy \u2014 Migrating to PQC-Enabled Technologies<\/strong><\/h4>\n<ul>\n<li><em>Challenge<\/em>: Once an organization establishes visibility of its cryptographic risk posture through inventorying, then migrating high-risk systems to new PQC standards is another critical step in quantum readiness. This action is particularly time sensitive for organizations that hold data with long-term value. Adversaries are already conducting \u2018harvest now, decrypt later\u2019 attacks with the intent to decrypt once a quantum computer becomes available. Collaborating with technology partners who are proactive and transparent about their products\u2019 supportability with PQC standards is a critical part of quantum readiness.<\/li>\n<li><em>Solution:<\/em> PAN-OS 12.1 Orion, running on our fourth-generation and newly announced fifth-generation NGFWs, now includes support for all NIST standard algorithms: <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.203.pdf?_cldee=s5r3Da8sdXFcbaKDCuF8O4zhdAu8J_Fgz56D_BvvI_kMXR7jDAXGMKxGH0k-Z4Qm&amp;recipientid=contact-7a175f2aab22eb11a813000d3ab0a7d2-2617be969e124935a6cf769dc185f17c&amp;esid=ee740eb2-6159-ef11-bfe2-7c1e52207b24\" rel=\"nofollow,noopener\" >FIPS 203: ML-KEM<\/a>, <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.204.pdf?_cldee=s5r3Da8sdXFcbaKDCuF8O4zhdAu8J_Fgz56D_BvvI_kMXR7jDAXGMKxGH0k-Z4Qm&amp;recipientid=contact-7a175f2aab22eb11a813000d3ab0a7d2-2617be969e124935a6cf769dc185f17c&amp;esid=ee740eb2-6159-ef11-bfe2-7c1e52207b24\" rel=\"nofollow,noopener\" >FIPS 204: ML-DSA<\/a>, <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.205.pdf?_cldee=s5r3Da8sdXFcbaKDCuF8O4zhdAu8J_Fgz56D_BvvI_kMXR7jDAXGMKxGH0k-Z4Qm&amp;recipientid=contact-7a175f2aab22eb11a813000d3ab0a7d2-2617be969e124935a6cf769dc185f17c&amp;esid=ee740eb2-6159-ef11-bfe2-7c1e52207b24\" rel=\"nofollow,noopener\" >FIPS 205: SLH-DSA<\/a> and other prestandard algorithms \u2013 HQC, Classic McEliece, BIKE, Frodo. PAN-OS 12.1 Orion also delivers Quantum-safe site-to-site <a href=\"https:\/\/live.paloaltonetworks.com\/t5\/community-blogs\/palo-alto-networks-extends-support-for-quantum-safe-vpn-with-rfc\/ba-p\/585492\">VPN<\/a> Tunnels and SSL\/TLS sessions to protect against more immediate \u201charvest now, decrypt later\u201d attacks.<\/li>\n<\/ul>\n<p>Our implementation is focused on providing a more seamless transition to quantum-safe algorithms with prioritization:<\/p>\n<ol>\n<li><em>Global interoperability<\/em> through alignment with international standards and regional requirements, such as those in the <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/coordinated-implementation-roadmap-transition-post-quantum-cryptography\" rel=\"nofollow,noopener\" >European Union<\/a>, <a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/pqc-migration-timelines\" rel=\"nofollow,noopener\" >United Kingdom<\/a>, <a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2022\/11\/M-23-02-M-Memo-on-Migrating-to-Post-Quantum-Cryptography.pdf\" rel=\"nofollow,noopener\" >United States<\/a>, <a href=\"https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cybersecurity\/ism\/cybersecurity-guidelines\/guidelines-cryptography\" rel=\"nofollow,noopener\" >Australia<\/a>, <a href=\"https:\/\/tec.gov.in\/pdf\/TR\/Final%20technical%20report%20on%20migration%20to%20PQC%2028-03-25.pdf\" rel=\"nofollow,noopener\" >India<\/a> and more.<\/li>\n<li><em>Cryptographic agility <\/em>through flexible support for multiple standard and prestandard algorithms.<\/li>\n<li><em>Hybrid algorithms<\/em> through support for concatenation of classical and post-quantum algorithms for enhanced security in encryption.<\/li>\n<\/ol>\n<h4><a id=\"post-343235-_m5i0uyre6tfg\"><\/a><strong>Deploy \u2014 Adopting Quantum-Optimized Hardware<\/strong><\/h4>\n<ul>\n<li><i><span style=\"font-weight: 400;\">Challenge:<\/span><\/i> <span style=\"font-weight: 400;\">Given the significant compute and memory requirements for hybrid and cryptographically agile implementations of PQC, not all IT systems will be able to be made quantum-ready through software upgrades alone. Hardware modernization will be necessary, and organizations will need to be judicious to ensure they\u2019re not simply replacing legacy IT with more legacy IT for the quantum era.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"><i>Solution:<\/i> Palo Alto Networks just announced our fifth-generation NGFW which are performance optimized with a suite of additional capabilities to future-proof your investment for quantum security defense-in-depth. Our PA-5500 Series NGFW is Quantum Optimized with up to 256 cores of compute and hardware acceleration to process encryption at scale. With network packet processing powered by the FE400 ASIC, the PA-5500 series NGFWs support 400 Gbps interfaces to meet the needs of modern data centers.<\/span><\/li>\n<\/ul>\n<h4><a id=\"post-343235-_20h052o00g62\"><\/a><strong>Deploy \u2014 Enabling Layered Defense through PQC and Quantum-Key Distribution Support <\/strong><\/h4>\n<ul>\n<li><em>Challenge: <\/em>While PQC migration has been the primary focus for securing digital communications against future quantum computer attacks, there is no guarantee around the long-term efficacy of the PQC standards as they just begin to undergo large-scale global testing. To address this risk, many organizations are seeking additional methods to build quantum-resistant infrastructure as either a fallback mechanism or a primary solution.<\/li>\n<li><em>Solution: <\/em>With PAN-OS 12.1, Palo Alto Networks is announcing support for ETSI 014 protocol integration, leveraging Quantum Key Distribution (QKD) capabilities to establish cryptographic keys resistant to unforeseen computational advancements. With the support for both PQC and QKD in PAN-OS 12.1, we provide organizations with a hybrid and agile approach, offering a robust, multilayered security posture, to bolster resilience in an evolving and unpredictable quantum landscape.<\/li>\n<\/ul>\n<h4><a id=\"post-343235-_wsvtsfjog15n\"><\/a><strong>Protect \u2014 Secure Legacy Applications and IoT\/IT Infrastructure with Cipher Translation Proxy<\/strong><\/h4>\n<ul>\n<li><em>Challenge:<\/em> Organizations face a difficult balance between efficiently migrating systems to PQC while also prioritizing near-term operational continuity for their organization. This challenge is particularly acute for organizations with high levels of dependency on legacy systems, such as in manufacturing and other operational technology (OT)-dependent environments.<\/li>\n<li><em>Solution: <\/em>With PAN-OS 12.1, we introduce a \"cipher translation proxy\" that offers a critical bridge for web applications that cannot be migrated to PQC and must be protected. This intelligent proxy acts as an intermediary, seamlessly translating classical cryptographic communications into quantum-safe ones and vice versa. This capability allows organizations to bolster their security against future quantum threats without immediately overhauling legacy systems, ensuring continuous operations, data protection and achieving PQC compliance as they strategically transition their entire infrastructure.<\/li>\n<\/ul>\n<p>The surge in global attention around quantum computing-related risks should be a wake-up call for any organization across the public and private sector seeking to accelerate their own quantum readiness. It should also be a call to action for all technology providers to ensure they\u2019re doing their part to proactively develop technologies prepared for the unique risks of the quantum era.<\/p>\n<p>At Palo Alto Networks, we\u2019re answering that call by delivering advanced, integrated solutions that offer the visibility, agility, as well as remediation capabilities essential for true quantum readiness. We also recognize that public-partnership is critical in this global effort, which is why we\u2019re also embracing a leadership role within the broader ecosystem \u2014 establishing a <a href=\"https:\/\/www.paloaltonetworks.com\/company\/press\/2025\/palo-alto-networks-prepares-organizations-for-quantum-security-with-qrng-open-api\">QRNG Open API Coalition<\/a> and as proud partners at <a href=\"https:\/\/www.nccoe.nist.gov\/crypto-agility-considerations-migrating-post-quantum-cryptographic-algorithms\" rel=\"nofollow,noopener\" >NIST\u2019s Migration to Post Quantum Cryptography<\/a>\u00a0project.<\/p>\n<p>As attention shifts to this next significant cybersecurity challenge, Palo Alto Networks remains committed to lead through both technological innovation and partnerships, as a strategic partner in the global pursuit of quantum readiness.<\/p>\n<p><strong>To learn more about the cybersecurity risks of quantum computing and how your organization can begin its Quantum Readiness journey, check out our <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/pan-os\">PAN-OS webpage<\/a>, learn from our product leaders' <a href=\"https:\/\/www.youtube.com\/playlist?list=PLqATPiC_Bcl8ZGx_EAxQHq0PKa2ii6pNE\" rel=\"nofollow,noopener\" >CISO\u2019s Guide to Quantum Security video series<\/a>, and join our discussion forum on <a href=\"https:\/\/live.paloaltonetworks.com\/t5\/quantum-security\/ct-p\/quantum-security\">Quantum Security Live Community<\/a> for the latest updates. <\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At Palo Alto Networks, we deliver advanced, integrated solutions for true quantum readiness with essential visibility, agility and remediation capabilities.<\/p>\n","protected":false},"author":184,"featured_media":343243,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,6724,6769],"tags":[5948,10243,9719,9722,7442],"coauthors":[9725,1878],"class_list":["post-343235","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","category-points-of-view","category-public-sector","tag-cisos","tag-orion","tag-quantum","tag-quantum-security","tag-thought-leadership"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2025\/08\/GettyImages-184911384-edit-2-scaled.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/343235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/184"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=343235"}],"version-history":[{"count":15,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/343235\/revisions"}],"predecessor-version":[{"id":343382,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/343235\/revisions\/343382"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/343243"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=343235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=343235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=343235"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=343235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}