
F5 Announces New Post-Quantum Cryptography Solutions
F5 is helping customers prepare for the foundational cybersecurity shift presented by quantum computing. New comprehensive post-quantum cryptography (PQC) readiness solutions are seamlessly integrated into the F5 Application Delivery and Security Platform, equipping organizations with the tools they need to secure applications and APIs while maintaining high performance and scalability.
The quantum era presents a significant cybersecurity inflection point, as the previous limits of classical computing will no longer apply. According to Gartner: 'The motivation for IT departments to adopt post-quantum cryptography is grounded in the fact that advances in quantum computing will make asymmetric cryptography unsafe by 2029. By 2034, asymmetric cryptography will be fully breakable with quantum computing technologies.'
A Requirement to Rethink Cybersecurity
Post-quantum cryptography marks a critical transformation in how sensitive data is secured. Unlike typical upgrades or patches, the transition to PQC represents a fundamental architectural shift in cybersecurity, requiring proactive planning and execution. A poorly managed transition can cause outages and disrupt operations, especially across hybrid, multicloud, and legacy systems. Without the right approach, organizations risk costly downtime, slower applications, compliance issues, and frustrated users.
In addition, with widespread traditional cryptographic methods becoming ineffective, malicious actors have already begun employing a 'harvest now, decrypt later' attack strategy, capturing encrypted data today to decrypt when quantum capabilities emerge. Sensitive data—including user records, financial information, personal health details, and intellectual property—faces unprecedented vulnerability.
'Post-quantum threats aren't a distant problem—they're a forcing function to modernize security now,' said Kunal Anand, Chief Innovation Officer at F5. 'Our platform makes PQC adoption practical so enterprises can future-proof their apps, APIs, and trust models without slowing down.'
What Sets F5 Apart
F5 simplifies the shift to quantum-safe protections as the leading vendor providing a fully integrated, scalable platform for both application delivery and security. With comprehensive PQC support for both server-side and client-side encryption—and seamless integration across hybrid, multicloud, and legacy environments—this platform-based approach protects organizations' apps, APIs, and data while optimizing performance.
By combining classical encryption with PQC, customers benefit from interoperability and phased system upgrades without business disruptions. F5 solutions also offer detailed insights into encrypted traffic, enhancing threat detection even during post-quantum cryptography transitions.
Key benefits of F5's PQC capabilities include: Trusted Post-Quantum Encryption: NIST-standardized cryptographic algorithms protect customer data, intellectual property, and operational assets without compromising system performance. End-to-End Security: From client-side encryption to backend systems, F5 provides full-spectrum PQC coverage combining high-availability app delivery with encrypted threat protection, access security, high-performance firewall capabilities, and proactive threat intelligence. Operational Continuity: With hybrid and multicloud compatibility, F5 ensures mission-critical apps and APIs remain efficient, secure, and available during every step of the quantum transition. Unified Visibility Across Environments: Centralized management and assessment tools provide insights into all apps, APIs, and encrypted traffic, covering the entire security ecosystem and promoting additive AI, telemetry, and automation capabilities. Simplified Compliance: F5 helps businesses meet evolving regulatory standards, ensuring sensitive data remains protected and compliant during the post-quantum transition.
The Path Forward: Accelerating Quantum-Ready Adoption
Moving to post-quantum cryptography is not just a technical necessity—it's an opportunity to prepare for the future while driving current innovation. F5 provides organizations with a smooth migration path and full proxy capabilities that allow PQC to be implemented, and further evolved, alongside existing encryption technology. Businesses gain the flexibility to adopt hybrid cryptographic models at their own pace, ensuring minimal risk of downtime or operational challenges.
By focusing on the applications and APIs that drive today's digital businesses, F5 helps customers confidently embrace the transformative opportunities of the quantum era. The company's tailored support for hybrid cryptographic models enables organizations to maintain streamlined app delivery while preparing for post-quantum protocols and the future of cybersecurity.
Availability
Post-quantum cryptography readiness solutions are now available for the F5 Application Delivery and Security Platform.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Channel Post MEA
21 hours ago
- Channel Post MEA
F5 Announces New Post-Quantum Cryptography Solutions
F5 is helping customers prepare for the foundational cybersecurity shift presented by quantum computing. New comprehensive post-quantum cryptography (PQC) readiness solutions are seamlessly integrated into the F5 Application Delivery and Security Platform, equipping organizations with the tools they need to secure applications and APIs while maintaining high performance and scalability. The quantum era presents a significant cybersecurity inflection point, as the previous limits of classical computing will no longer apply. According to Gartner: 'The motivation for IT departments to adopt post-quantum cryptography is grounded in the fact that advances in quantum computing will make asymmetric cryptography unsafe by 2029. By 2034, asymmetric cryptography will be fully breakable with quantum computing technologies.' A Requirement to Rethink Cybersecurity Post-quantum cryptography marks a critical transformation in how sensitive data is secured. Unlike typical upgrades or patches, the transition to PQC represents a fundamental architectural shift in cybersecurity, requiring proactive planning and execution. A poorly managed transition can cause outages and disrupt operations, especially across hybrid, multicloud, and legacy systems. Without the right approach, organizations risk costly downtime, slower applications, compliance issues, and frustrated users. In addition, with widespread traditional cryptographic methods becoming ineffective, malicious actors have already begun employing a 'harvest now, decrypt later' attack strategy, capturing encrypted data today to decrypt when quantum capabilities emerge. Sensitive data—including user records, financial information, personal health details, and intellectual property—faces unprecedented vulnerability. 'Post-quantum threats aren't a distant problem—they're a forcing function to modernize security now,' said Kunal Anand, Chief Innovation Officer at F5. 'Our platform makes PQC adoption practical so enterprises can future-proof their apps, APIs, and trust models without slowing down.' What Sets F5 Apart F5 simplifies the shift to quantum-safe protections as the leading vendor providing a fully integrated, scalable platform for both application delivery and security. With comprehensive PQC support for both server-side and client-side encryption—and seamless integration across hybrid, multicloud, and legacy environments—this platform-based approach protects organizations' apps, APIs, and data while optimizing performance. By combining classical encryption with PQC, customers benefit from interoperability and phased system upgrades without business disruptions. F5 solutions also offer detailed insights into encrypted traffic, enhancing threat detection even during post-quantum cryptography transitions. Key benefits of F5's PQC capabilities include: Trusted Post-Quantum Encryption: NIST-standardized cryptographic algorithms protect customer data, intellectual property, and operational assets without compromising system performance. End-to-End Security: From client-side encryption to backend systems, F5 provides full-spectrum PQC coverage combining high-availability app delivery with encrypted threat protection, access security, high-performance firewall capabilities, and proactive threat intelligence. Operational Continuity: With hybrid and multicloud compatibility, F5 ensures mission-critical apps and APIs remain efficient, secure, and available during every step of the quantum transition. Unified Visibility Across Environments: Centralized management and assessment tools provide insights into all apps, APIs, and encrypted traffic, covering the entire security ecosystem and promoting additive AI, telemetry, and automation capabilities. Simplified Compliance: F5 helps businesses meet evolving regulatory standards, ensuring sensitive data remains protected and compliant during the post-quantum transition. The Path Forward: Accelerating Quantum-Ready Adoption Moving to post-quantum cryptography is not just a technical necessity—it's an opportunity to prepare for the future while driving current innovation. F5 provides organizations with a smooth migration path and full proxy capabilities that allow PQC to be implemented, and further evolved, alongside existing encryption technology. Businesses gain the flexibility to adopt hybrid cryptographic models at their own pace, ensuring minimal risk of downtime or operational challenges. By focusing on the applications and APIs that drive today's digital businesses, F5 helps customers confidently embrace the transformative opportunities of the quantum era. The company's tailored support for hybrid cryptographic models enables organizations to maintain streamlined app delivery while preparing for post-quantum protocols and the future of cybersecurity. Availability Post-quantum cryptography readiness solutions are now available for the F5 Application Delivery and Security Platform.


Channel Post MEA
a day ago
- Channel Post MEA
Bitdefender Launches External Attack Surface Management Solution GravityZone EASM
Bitdefender has announced Bitdefender GravityZone External Attack Surface Management (EASM), a new solution that gives businesses, managed service providers (MSPs) and their customers comprehensive visibility into their internet-facing assets and associated vulnerabilities. GravityZone EASM dramatically reduces threat exposure and strengthens security operations through centralized discovery, monitoring, and management of expanding attack surfaces. The attack surface, encompassing all potential entry points for adversaries, is rapidly expanding due to digital transformation, cloud adoption, remote work, and increased connectivity with third-party infrastructure, including partners and customers. Without centralized oversight, assets such as unused domains, misconfigured cloud instances, and expired certificates often go unnoticed—leaving organizations vulnerable to attackers who continuously scan the internet for exposed systems. According to Gartner®, 'Through 2029, more than 60% of security incidents will be traced to misconfigured technical security controls.'¹ Additionally, a recent survey of 1,200 cybersecurity professionals found that reducing the attack surface is a top priority in their security operations. Bitdefender GravityZone EASM is agentless, requiring no endpoint deployment, and delivers a powerful, proactive approach to identifying and understanding external risks while reducing the attack surface. It continuously discovers, maps, and analyzes internet-exposed assets from an attacker's perspective, enabling organizations to quickly assess risk, identify vulnerabilities, and take action before they are exploited. The solution is available as an add-on to Bitdefender GravityZone, the company's unified security, risk analytics, and compliance platform that delivers advanced endpoint protection (EPP), endpoint detection and response (EDR), extended detection and response (XDR), and cloud-native security. GravityZone EASM scans a wide range of asset types, including IPv4 and IPv6 addresses, IP blocks, email addresses, and domains. From these scans, it delivers comprehensive asset discovery by detecting publicly exposed IPs, expiring or expired certificates, vulnerable public services, open ports, and more—ensuring no asset is overlooked. Key Benefits of Bitdefender GravityZone EASM: Fast internet-facing asset discovery – GravityZone EASM scans and maps all internet-facing assets including devices, domains, subdomains, applications, certificates, third-party connections, shadow IT, and more—in as little as 30 minutes. It delivers comprehensive visibility into a business's attack surface, even for unmanaged or forgotten assets. – GravityZone EASM scans and maps all internet-facing assets including devices, domains, subdomains, applications, certificates, third-party connections, shadow IT, and more—in as little as 30 minutes. It delivers comprehensive visibility into a business's attack surface, even for unmanaged or forgotten assets. Continuous vulnerability monitoring, alerting, and prioritization – GravityZone EASM continuously monitors and detects vulnerabilities and misconfigurations across internal and external assets, including those managed by partners, customers, and supply chain vendors. It delivers immediate, context-rich alerts for exposed systems, expired certificates, and high-risk threats. Alerts are prioritized by severity (e.g., CVE scores) to streamline response and remediation. – GravityZone EASM continuously monitors and detects vulnerabilities and misconfigurations across internal and external assets, including those managed by partners, customers, and supply chain vendors. It delivers immediate, context-rich alerts for exposed systems, expired certificates, and high-risk threats. Alerts are prioritized by severity (e.g., CVE scores) to streamline response and remediation. Unified security, risk management, and compliance – Seamlessly integrated with Bitdefender GravityZone, combining security, risk analytics, and compliance—GravityZone EASM supports both strategic and operational use cases. Security analysts can leverage it for threat analysis and vulnerability prioritization, while administrators benefit from broader security management capabilities such as policy enforcement and access control configuration—all within a single platform. 'Security teams across businesses and MSPs face increasing pressure to keep pace with expanding attack surfaces, driven by digital transformation and complex third-party ecosystems,' said Andrei Florescu, president and general manager at Bitdefender Business Solutions Group. 'Effective defense-in-depth security starts by reducing the attack surface as much as possible before threats reach the detection and response layers. GravityZone EASM is a critical part of our vision for unified security, risk management, and compliance, enabling proactive discovery and control of internet-facing assets that could serve as potential entry points for attackers.' Availability Bitdefender GravityZone EASM is available now for select GravityZone license tiers, and Bitdefender MDR services. For more information, visit here.


Zawya
3 days ago
- Zawya
Over 40% of agentic AI projects will be scrapped by 2027, Gartner says
More than 40% of agentic artificial intelligence projects will be canceled by the end of 2027 due to escalating costs and unclear business value, according to a report by Gartner. WHY IT'S IMPORTANT Tech giants such as Salesforce and Oracle have embraced AI agents, systems that can autonomously complete goals and take action, pouring billions into the technology in the hopes of boosting margins and optimizing costs. Many vendors are engaging in "agent washing" - the rebranding of products such as AI assistants and chatbots without significant agentic capabilities, Gartner says, estimating that only about 130 of the thousands of agentic AI vendors are real. KEY QUOTES "Most agentic AI projects right now are early stage experiments or proofs of concept that are mostly driven by hype and are often misapplied," said Anushree Verma, Senior Director Analyst at Gartner. "Most agentic AI propositions lack significant value or return on investment, as current models do not have the maturity and agency to autonomously achieve complex business goals or follow nuanced instructions over time," Verma said. BY THE NUMBERS Gartner predicts at least 15% of day-to-day work decisions will be made autonomously through agentic AI by 2028, up from 0% in 2024. Additionally, 33% of enterprise software applications will include agentic AI by 2028, up from less than 1% in 2024. (Reporting by Zaheer Kachwala in Bengaluru; Editing by Arun Koyyur)