0xA4F2
0x3C8B
0xDE1F
0x77EA
0xC209
0x5B4D

Resources

AI and Quantum Security Assessment Tools

Free browser-based tools for cryptographic asset mapping, PQC risk assessment, and migration readiness. Built for security architects and practitioners who need to assess exposure, not read about it.

Executive

Quantum Risk Tools for Business and Transformation Executives

These simple tools are designed to help executives, transformation leaders and technology leaders understand their organisation's current position on post-quantum cryptography projects.

Executive

Quantum Cryptography Exposure Report

Assess your organisation's current cryptographic exposure to quantum threats and receive a structured report for board-level discussion.

Use this tool
Executive

Post-Quantum Migration Decision Guide

A structured decision framework to identify which migration pathway best fits your organisation's size, sector, and risk tolerance.

Use this tool
Executive

Quantum Readiness Checklist Generator

Generate a tailored readiness checklist based on your industry, infrastructure profile, and current PQC programme status.

Use this tool
Executive

Q-Day Timeline Risk Calculator

Estimate your organisation's exposure window relative to projected quantum computing timelines and your current migration velocity.

Use this tool
Security Teams

Snapshot Quantum Risk Tools for Security and Migration Teams

These tools are designed to help security and risk teams understand some of the issues associated with post-quantum cryptography and the new cryptographic algorithms. They are not a substitute for technical advice, but they provide a snapshot view of some of the migration challenges and the risks to your business.

Security Team

Quantum Security Risk Assessment

Map your current cryptographic assets against quantum threat vectors and receive a prioritised risk profile for your security architecture.

Use this tool
Security Team

Harvest Now Decrypt Later Risk Calculator

Calculate your exposure to store-now-decrypt-later attacks based on data sensitivity classifications and estimated Q-Day timelines.

Use this tool
Security Team

Cryptographic Algorithm Deprecation Timer

Track the remaining operational lifespan of your current cryptographic algorithms against published deprecation schedules and emerging standards.

Use this tool
Security Team

NIST Post-Quantum Algorithm Selector

Match your use case requirements to the appropriate NIST-standardised post-quantum algorithm across key encapsulation and digital signature functions.

Use this tool
Security Team

Cryptographic Asset Migration Prioritiser

Rank your cryptographic assets by migration urgency, factoring in data sensitivity, algorithm lifespan, and operational dependency.

Use this tool
Sales and VARs

Sales and Qualification Tools for VARs, Resellers and Integrators

These tools are designed for sales and systems integration teams to support the development of best practice and clear, accurate communication. They enable sales and pre-sales teams to assess quickly whether a customer has a defined requirement for PQC, QRNG, QKD or related products. These tools are intended for early-stage engagement and provide a snapshot view only.

Sales

Post Quantum Cryptography Opportunity Qualifier

Quickly determine whether a prospect has a genuine, near-term PQC requirement. Structured for early-stage discovery conversations.

Use this tool
Sales

QKD Opportunity Qualifier

Assess whether a prospect's infrastructure and use case justify a quantum key distribution solution, before investing in a full technical proposal.

Use this tool
Blockchain

Blockchain Quantum Exposure Tools

Quantum computers threaten the cryptographic foundations of blockchain networks. These tools assess your blockchain deployment's quantum exposure across signing algorithms, key management, smart contracts, and encrypted data. Built on research from Google's quantum factoring work and NIST post-quantum standards.

Security Team

Blockchain Quantum Exposure Scanner

Score your blockchain deployment across six quantum exposure dimensions: signing algorithm, address reuse, smart contracts, protocol upgrade feasibility, key management, and data sensitivity.

Use this tool
Executive

Blockchain PQC Migration Effort Estimator

Estimate the complexity, timeline, and cost band for migrating your blockchain deployment to post-quantum cryptographic standards. Covers programme structure, smart contract dependencies, and regulatory requirements.

Use this tool
Security Team

Blockchain Quantum Exposure Assessment

Dual-vector assessment scoring both signing key exposure (authentication threat) and encrypted data vulnerability (harvest now, decrypt later). Produces a composite quantum exposure profile for your blockchain infrastructure.

Use this tool
OT / Industrial

OT Tools

Risk assessment and migration planning tools for operational technology environments. Built for OT security engineers, plant managers, and industrial network architects.

OT Security

OT Cryptographic Asset Prioritisation Matrix

Score OT assets across five dimensions: lifecycle, cryptographic vulnerability, operational impact, migration feasibility, and regulatory exposure. Produces a ranked migration register with Mosca analysis and PDF report.

Use this tool
OT Security

OT Protocol Quantum Vulnerability Scanner

Select the OT communication protocols deployed in your network. Identifies which use classical asymmetric cryptography a quantum computer would break, maps the specific vulnerable functions, and returns the available migration pathway for each protocol.

Use this tool
Defence / Space

Defence & Space

Sector-specific readiness assessments for satellite communications, command-and-control systems, and defence infrastructure operators navigating CNSA 2.0 and NIST PQC migration timelines.

Defence / SATCOM

SATCOM/C2 Cryptographic Readiness Assessor

Scores satellite and command-and-control system operators on cryptographic migration readiness across seven weighted factors. Aligned with CNSA 2.0 (2030-2033 deadline for NSS) and NIST FIPS 203/204/205 for non-NSS operators. Covers ground segment, space segment, key management infrastructure, and programme maturity.

Use this tool

How Your Data Is Used

When you use these tools, we do not store your email address or company name. If you choose to subscribe to our updates, we will use your email address and company name only to send the information you have requested. We do not retain your email address or company name alongside your results. All results are anonymised.

We collect country, industry and results data, which is stored in a database. This information is used to produce industry-level reports for different sectors and is never linked to your email address or company. We use this anonymised data to share industry-level insights on preparedness with our members, governments and national security bodies only.