Quantum Cryptography Exposure Report
Assess your organisation's current cryptographic exposure to quantum threats and receive a structured report for board-level discussion.
Use this toolResources
Free browser-based tools for cryptographic asset mapping, PQC risk assessment, and migration readiness. Built for security architects and practitioners who need to assess exposure, not read about it.
These simple tools are designed to help executives, transformation leaders and technology leaders understand their organisation's current position on post-quantum cryptography projects.
Assess your organisation's current cryptographic exposure to quantum threats and receive a structured report for board-level discussion.
Use this toolA structured decision framework to identify which migration pathway best fits your organisation's size, sector, and risk tolerance.
Use this toolGenerate a tailored readiness checklist based on your industry, infrastructure profile, and current PQC programme status.
Use this toolEstimate your organisation's exposure window relative to projected quantum computing timelines and your current migration velocity.
Use this toolThese tools are designed to help security and risk teams understand some of the issues associated with post-quantum cryptography and the new cryptographic algorithms. They are not a substitute for technical advice, but they provide a snapshot view of some of the migration challenges and the risks to your business.
Map your current cryptographic assets against quantum threat vectors and receive a prioritised risk profile for your security architecture.
Use this toolCalculate your exposure to store-now-decrypt-later attacks based on data sensitivity classifications and estimated Q-Day timelines.
Use this toolTrack the remaining operational lifespan of your current cryptographic algorithms against published deprecation schedules and emerging standards.
Use this toolMatch your use case requirements to the appropriate NIST-standardised post-quantum algorithm across key encapsulation and digital signature functions.
Use this toolRank your cryptographic assets by migration urgency, factoring in data sensitivity, algorithm lifespan, and operational dependency.
Use this toolThese tools are designed for sales and systems integration teams to support the development of best practice and clear, accurate communication. They enable sales and pre-sales teams to assess quickly whether a customer has a defined requirement for PQC, QRNG, QKD or related products. These tools are intended for early-stage engagement and provide a snapshot view only.
Quickly determine whether a prospect has a genuine, near-term PQC requirement. Structured for early-stage discovery conversations.
Use this toolAssess whether a prospect's infrastructure and use case justify a quantum key distribution solution, before investing in a full technical proposal.
Use this toolQuantum computers threaten the cryptographic foundations of blockchain networks. These tools assess your blockchain deployment's quantum exposure across signing algorithms, key management, smart contracts, and encrypted data. Built on research from Google's quantum factoring work and NIST post-quantum standards.
Score your blockchain deployment across six quantum exposure dimensions: signing algorithm, address reuse, smart contracts, protocol upgrade feasibility, key management, and data sensitivity.
Use this toolEstimate the complexity, timeline, and cost band for migrating your blockchain deployment to post-quantum cryptographic standards. Covers programme structure, smart contract dependencies, and regulatory requirements.
Use this toolDual-vector assessment scoring both signing key exposure (authentication threat) and encrypted data vulnerability (harvest now, decrypt later). Produces a composite quantum exposure profile for your blockchain infrastructure.
Use this toolRisk assessment and migration planning tools for operational technology environments. Built for OT security engineers, plant managers, and industrial network architects.
Score OT assets across five dimensions: lifecycle, cryptographic vulnerability, operational impact, migration feasibility, and regulatory exposure. Produces a ranked migration register with Mosca analysis and PDF report.
Use this toolSelect the OT communication protocols deployed in your network. Identifies which use classical asymmetric cryptography a quantum computer would break, maps the specific vulnerable functions, and returns the available migration pathway for each protocol.
Use this toolSector-specific readiness assessments for satellite communications, command-and-control systems, and defence infrastructure operators navigating CNSA 2.0 and NIST PQC migration timelines.
Scores satellite and command-and-control system operators on cryptographic migration readiness across seven weighted factors. Aligned with CNSA 2.0 (2030-2033 deadline for NSS) and NIST FIPS 203/204/205 for non-NSS operators. Covers ground segment, space segment, key management infrastructure, and programme maturity.
Use this toolWhen you use these tools, we do not store your email address or company name. If you choose to subscribe to our updates, we will use your email address and company name only to send the information you have requested. We do not retain your email address or company name alongside your results. All results are anonymised.
We collect country, industry and results data, which is stored in a database. This information is used to produce industry-level reports for different sectors and is never linked to your email address or company. We use this anonymised data to share industry-level insights on preparedness with our members, governments and national security bodies only.