logo
#

Latest news with #AntonioSanchez

Quantum Xchange Grows Headcount By 60% To Meet Global Demand For Its Leading Quantum-Safe Key Management System
Quantum Xchange Grows Headcount By 60% To Meet Global Demand For Its Leading Quantum-Safe Key Management System

Business Wire

time16-07-2025

  • Business
  • Business Wire

Quantum Xchange Grows Headcount By 60% To Meet Global Demand For Its Leading Quantum-Safe Key Management System

BETHESDA, Md.--(BUSINESS WIRE)-- Quantum Xchange, the quantum-safe encryption company, has announced its expansion in the U.S. increasing headcount by more than 60% across its product engineering, sales, and marketing teams. The move signals the company's commitment to deepening customer and partner engagement, driving brand awareness, and continuing to innovate on Phio TX®, its award-winning key management system that enables a seamless transition to the latest Post-Quantum Cryptography (PQC) standards. In August 2024, the National Institute of Standards and Technology (NIST) formalized the world's first PQC standards, providing organizations with a framework to secure systems and data against future quantum threats – or the day when quantum computers will be powerful enough to break common encryption protocols, such as RSA and AES. Given the complexity and unpredictability of this migration and for immediate protection against Harvest Now, Decrypt Later (HNDL) attacks, NIST has urged organizations to begin transitioning their systems immediately to the PQC standards. As a result, the quantum security market is projected to reach $6.7 billion by 2032. Quantum Xchange has strengthened its leadership team with key appointments across corporate disciplines. Antonio Sanchez has joined as Chief Strategy Officer, bringing decades of experience in enterprise cybersecurity having held various leadership roles in product management, marketing, and technical sales at Dell, Symantec, Forcepoint, Alert Logic, and Fortra. He is responsible for the development and execution of the company's overall go-to-market strategy and brand positioning. Sanchez is joined by Christina Hausman, Vice President of Product Growth, who comes to Quantum Xchange from Cisco Systems, where she spent more than two decades helping grow the security business from a handful of products to more than 20 technologies covering Security Services Edge (SSE/SASE), workload and data center security, network and endpoint security, Data Loss Prevention (DLP), compliance, SIEM and security management. At Quantum Xchange she oversees the revenue growth and retention strategies for the company's flagship product, Phio TX. Also coming off a successful tenure with Cisco is Eden Taylor, Vice President of Partner Alliances, where she is responsible for developing channel partner strategies, direct sales, and building stakeholder relationships with leading networking and communications vendors. In addition, Quantum Xchange has appointed Andrey Vovk, Vice President of Engineering to ensure its offerings and product roadmap are deeply aligned with customer needs and regulatory requirements. Vovk has a proven, 30-year track record in quality product delivery and building high-performing engineering teams at security companies including InforMax, Fidelis, and Bricata. Galit Miller joins Vovk and other members of the engineering team as Director of Frontend Engineering. Both report to Gene Savchuk, Chief Product Officer and inventor of Phio TX. 'It's an exciting time for Quantum Xchange and these strategic hires illustrate how we are prepared to meet the moment to unlock new opportunities and deliver even greater value to our stakeholders,' said Eddy Zervigon, CEO of Quantum Xchange. 'There's no easier way to ensure your legacy encryption is immediately quantum-safe, while simultaneously practicing crypto-agility and quantum readiness. Phio TX is a true game changer.' Phio TX works with an organization's existing infrastructure to send a second symmetric key out-of-band, independently from the encrypted data path. These ephemeral key pairs are dynamically generated in-memory and deleted after use. The solution is FIPS 203 and FIPS 140-3 validated and utilizes NIST Entropy Source Validation for unpredictable randomness, secure data transmission, and eavesdropping prevention. To learn more, download the product guide. About Quantum Xchange Quantum Xchange protects confidential and classified data from advances in computing and everyday cybersecurity risks. Its award-winning key management platform, Phio TX empowers organizations to bring existing IT infrastructures into the post-quantum era easily and affordably with an innovative, secure, and flexible architecture. Commercial enterprises and government agencies can leverage trusted standards for quantum-safe protection, embrace crypto-agility, and establish a cryptographic center of excellence with no network or application downtime and no performance degradation. To learn more visit

Post-Quantum Cryptography: Beyond The CISO's Responsibility
Post-Quantum Cryptography: Beyond The CISO's Responsibility

Forbes

time15-07-2025

  • Business
  • Forbes

Post-Quantum Cryptography: Beyond The CISO's Responsibility

Antonio Sanchez is Chief Strategy Officer at Quantum Xchange, a post-quantum crypto-agility solution provider. The quantum computing revolution is an imminent reality that will fundamentally alter the cybersecurity landscape. As quantum computers reach sufficient scale, they will render today's cryptographic defenses obsolete, exposing decades of encrypted data to potential compromise. This isn't just about protecting against known threats; it's about building resilient infrastructure that can withstand whatever advanced capabilities emerge from the quantum age. Organizations must act now to safeguard their most sensitive data against threats that don't yet exist but inevitably will. Data protection policy is typically owned by the chief information security officer (CISO), but the responsibility for migrating to post-quantum cryptography (PQC) extends far beyond the security department. This is a digital transformation initiative that requires coordinated leadership across all technology domains. Every Department Gets Affected A common misconception is that PQC is a cybersecurity concern. This comes from a view that encryption is an isolated security layer. Cryptography is the invisible foundation supporting virtually every digital business process. Consider some of the systems at risk for a given enterprise: • Customer Relationship Management (CRM): Your sales teams rely on CRM platforms that encrypt customer data, communications and transaction histories. These systems hold years, if not decades of customer intelligence, which will become vulnerable. The CTO or vice president of sales typically owns CRM decisions, making them critical stakeholders. • Enterprise Resource Planning (ERP): Financial data, supply chain information and operational metrics flow through ERP systems protected by current encryption standards. The CFO and COO, who traditionally govern ERP investments, must now factor quantum resilience into their technology decisions. • Collaboration And Communication Tools: From Microsoft Teams to Slack, the platforms enabling remote work and digital collaboration rely on encryption protocols that will soon be vulnerable to quantum attacks. The decision-makers for these tools are typically CIOs or department heads. They must now evaluate quantum readiness alongside traditional features like user experience and integration capabilities. • Payroll And Human Resources: Employee personal information, salary data and performance records stored in HR systems represent attractive targets for criminal actors. CHRO and finance leaders overseeing these systems cannot delegate quantum preparedness to the security team alone. The Cross-Functional Challenge The complexity of PQC implementation requires expertise that spans multiple domains. While CISOs understand the threat landscape and risk implications, they often lack the operational knowledge to assess quantum readiness across diverse business applications. Meanwhile, department leaders who understand their systems' business requirements may not grasp the cryptographic technical details. This knowledge gap creates a dangerous blind spot. A business leader might select a new cloud platform based on performance and cost considerations without evaluating its quantum-cryptography road map. An operations leader might upgrade manufacturing systems without considering their encryption capabilities. These decisions, made in isolation from security considerations, can create long-term vulnerabilities that become exponentially more expensive to address later. Existing Investments Your organization has invested millions of dollars in the technology stack that runs the business. A complete rip-and-replace approach is not realistic as it would severely strain budgets, cause operational interruption and require extensive retraining. There are also some legacy applications that are so critical to the organization that they can't be replaced or upgraded. A nuanced strategy is needed that maximizes investments while transitioning to quantum resilience. Each department stakeholder must work with their current vendors to understand upgrade paths, feature enhancements that strengthen current encryption and which systems were never designed to be upgradable. Many of the vendors are already developing cryptographic updates that can be deployed as patches, but it still requires proactive engagement from business leaders to ensure these patches go through the patching process and are not overlooked, which often happens due to shifting priorities. The Strategic Imperative Migrating to PQC is a digital transformation initiative, which also makes it a business transformation initiative, so it requires commitment across the entire enterprise. The CISO is a crucial contributor as they provide expertise and insights on cyber risk and the threat landscape. However, the success of your quantum transition depends on every technology leader understanding their role in this journey. Forbes Communications Council is an invitation-only community for executives in successful public relations, media strategy, creative and advertising agencies. Do I qualify?

Beyond Operating Systems: Considerations For A Comprehensive Quantum Security Strategy
Beyond Operating Systems: Considerations For A Comprehensive Quantum Security Strategy

Forbes

time18-06-2025

  • Business
  • Forbes

Beyond Operating Systems: Considerations For A Comprehensive Quantum Security Strategy

Antonio Sanchez is Chief Strategy Officer at Quantum Xchange, a post-quantum crypto-agility solution provider. The recent integration of post-quantum cryptography (PQC) into Windows 11 and Red Hat Enterprise Linux 10 marks a pivotal moment in cybersecurity. As quantum computing continues advancing, the industry is responding to the existential threat these powerful machines pose to our current encryption standards, which are embedded everywhere in our digital lives. However, security is an end-to-end concern, and while OS-level quantum resistance represents significant progress, it addresses only one layer of what must be a comprehensive strategy. Operating system PQC integration provides a foundation for quantum security, but several critical vulnerabilities remain unaddressed: • Enterprises maintain diverse and dynamic IT footprints. They span multiple OS vendors, versions, legacy systems, cloud services and specialized applications. A quantum-secure operating system cannot protect outdated systems or anything beyond its ecosystem. The heterogeneous environment creates security gaps that require comprehensive solutions beyond the OS layer. • Data in motion remains vulnerable. An operating system handles encryption requirements on the local machine, but those systems have to connect with other servers and clients across the network. This means your data travels across your IT footprint with varying security implementations. A quantum-secure strategy must address the entire journey. • Cryptographic agility—the ability to quickly swap encryption algorithms—requires infrastructure and planning beyond the OS on the systems. As quantum-resistant cryptography evolves, organizations need frameworks for rapid adoption and implementation of future algorithms. There are several key elements of a robust security posture that includes quantum: • Cryptographic Inventory Discovery And Management: Organizations must conduct thorough audits to identify all systems and cryptography in use. This cryptographic inventory should ideally be continuous due to the dynamic nature of IT estates. This becomes the foundation for prioritized remediation efforts. • Risk-Based Implementation: Not all data requires the same level of protection. A nuanced strategy allocates quantum-resistant resources based on data sensitivity and retention requirements. Information that must remain secure for decades demands immediate quantum protection, while short-lived data may follow a more gradual transition timeline. • Application-Level Security: Applications typically implement their own cryptographic protocols independent of the underlying operating system. Each must be individually assessed and updated to quantum-resistant standards—a process that OS-level PQC cannot address. • Key And Certificate Management: The transition to quantum-resistant algorithms necessitates comprehensive key management systems that can handle longer keys, different certificate formats and hybrid cryptographic approaches during the migration period. • Hardware Security Integration: Many organizations rely on hardware security modules (HSMs) and trusted platform modules (TPMs) for their most sensitive operations. These specialized components require quantum-resistant updates that align with broader security strategies. • Cross-Platform Standardization: Enterprise environments typically span Windows, Linux, macOS, mobile operating systems, IoT devices and other specialized systems. A comprehensive security strategy must harmonize quantum-resistant approaches across this diverse landscape. Organizations must navigate a hybrid reality where quantum-vulnerable and quantum-resistant systems coexist, sometimes processing the same data. This transition requires: • Crypto-Agile Infrastructure: Solutions designed to accommodate algorithm changes without major architectural overhauls or operational interruption. • Hybrid Cryptographic Approaches: Implementing both traditional and post-quantum algorithms during the transition, providing defense-in-depth while building confidence in new cryptographic methods. • Policy And Governance Frameworks: Updated security policies that account for quantum threats and establish governance for the transition to quantum-resistant technologies. The integration of PQC into major operating systems represents an important milestone, but it's not the destination. It signals the beginning of a broad transformation in how we secure digital assets against quantum threats. Organizations must look beyond operating system protections to develop holistic strategies addressing their entire digital footprint. As quantum computing continues its rapid advancement, the window for preparation narrows. Those who view OS-level PQC as a step in a comprehensive security evolution will be best positioned to protect their most valuable information assets in the post-quantum era. The quantum security journey extends far beyond operating system updates. It requires rethinking security architecture, implementation priorities and transition strategies. Only through this comprehensive approach can organizations truly prepare for the quantum computing revolution that lies ahead. Forbes Communications Council is an invitation-only community for executives in successful public relations, media strategy, creative and advertising agencies. Do I qualify?

Quantum Xchange Releases Virtual Container Key Management Solution for Post-Quantum Cryptography
Quantum Xchange Releases Virtual Container Key Management Solution for Post-Quantum Cryptography

Business Wire

time12-06-2025

  • Business Wire

Quantum Xchange Releases Virtual Container Key Management Solution for Post-Quantum Cryptography

SAN DIEGO--(BUSINESS WIRE)--Today at Cisco Live, Cisco's annual IT and communications conference, Quantum Xchange announced that its Post-Quantum Cryptography (PQC) key management solution, Phio TX ®, is now available as a virtual container. The new form factor, Phio TX-EM, is compatible with Cisco networking operating systems IOS XE, IOS XR, as well as the Nexus NX-OS operating system, which will allow Cisco networking users to harden their infrastructure and easily migrate to NIST-standard PQC with no network downtime or performance degradation. 'Our support for Cisco's SKIP protocol and network operating systems is just the latest example of how Quantum Xchange is working to offer their customers, and the market, a practical path to quantum readiness while hardening their infrastructure today,' Share Phio TX supports standard key management protocols, such as SKIP and ETSI, enabling drop-in integration without changes to existing router configurations. It is also one of the first products to receive NIST certification for the latest FIPS 140-3 cryptographic module standard and FIPS 203 validation supporting all ML-KEM algorithms for post-quantum security. Compatible with Cisco IOS XE and XR routers supporting containers such as Cisco Catalyst 8000v, NCS 540 and Nexus switches with containers, Phio TX-EM provides over-the-network provisioning, installation, configuration and distribution of Phio TX key management as an integrated process within the network itself. With Phio TX-EM, SKIP key requests are kept within the cryptographic boundary of the device, making the SKIP PQC implementation secure by eliminating the possibility of data leakage due to weakly configured external SKIP calls. Only FIPS-validated PQC key exchanges are passed between devices. Moreover, Phio TX does not rely on pre-shared or static keys. It uses ephemeral keys, dynamically generated in-memory and deleted after use. A strong symmetric key is created and travels out-of-band, independent of the encrypted data thereby avoiding harvest now, decrypt later (HNDL) and man-in-the-middle attack scenarios. Download the Phio TX-EM data sheet for a complete inventory of product features. 'Our support for Cisco's SKIP protocol and network operating systems is just the latest example of how Quantum Xchange is working to offer their customers, and the market, a practical path to quantum readiness while hardening their infrastructure today,' said Antonio Sanchez, Chief Strategy Officer at Quantum Xchange. 'Phio TX's crypto-agile features and capabilities deployed as a virtual container, offers customers choice and flexibility for meeting the unique data security requirements of their organization while easily upgrading their network infrastructure to quantum safety with zero static keys, zero downtime, and zero added latency.' Quantum Xchange demoed Phio TX and its various deployment options in the Security & Networking Village at Cisco Live, where the best and brightest minds in IT come together to learn, share knowledge, and connect. To view the presentation delivered to event attendees in San Diego, June 8-12, 2025, 'Fast Track to Post-Quantum Security' go to the Cisco Live website. About Quantum Xchange Quantum Xchange protects confidential and classified data from advances in computing and everyday cybersecurity risks. Its award-winning key management platform, Phio TX empowers organizations to bring existing IT infrastructures into the post-quantum era easily and affordably with an innovative, secure, and flexible architecture. Commercial enterprises and government agencies can leverage trusted standards for quantum-safe protection, embrace crypto-agility, and establish a cryptographic center of excellence with no network or application downtime and no performance degradation. To learn more visit

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store