logo
#

Latest news with #postQuantumCryptography

F5 Networks: Buy FFIV Stock At $290?
F5 Networks: Buy FFIV Stock At $290?

Forbes

time8 hours ago

  • Business
  • Forbes

F5 Networks: Buy FFIV Stock At $290?

The F5, Inc. logo appears on the screen of a smartphone in Reno, United States, on December 1, 2024. ... More (Photo by Jaque Silva/NurPhoto via Getty Images) F5 (NASDAQ:FFIV) has recently introduced new, extensive post-quantum cryptography (PQC) readiness solutions that are integrated smoothly into its Application Delivery and Security Platform. These solutions aim to secure applications and APIs while ensuring high performance and scalability, which is crucial given the transformative impact of post-quantum cryptography on data security. Recently, there has been an increase in demand for cybersecurity, from which F5 has profited. Indeed, F5's stock has experienced a considerable rise, increasing nearly 70% over the last twelve months. The critical question for investors is whether it remains a worthwhile investment after such a significant increase. We believe it does. We perceive minimal reasons for concern regarding FFIV stock, positioning it as an appealing choice due to its current moderate valuation. Our conclusion is derived from a comprehensive analysis of FFIV stock's current valuation in relation to its recent operational performance as well as its current and historical financial health. Our in-depth examination of F5 across vital metrics—Growth, Profitability, Financial Stability, and Downturn Resilience—shows a robust operating performance and financial condition. However, for those investors looking for less volatility than individual stocks, the Trefis High Quality portfolio offers an alternative, having surpassed the S&P 500 and delivered returns over 91% since its founding. Additionally, refer to – QuantumScape: 40x Upside For QS Stock? How Does F5's Valuation Compare to The S&P 500? When considering what you pay per dollar of revenue or profit, FFIV stock appears somewhat overvalued in relation to the wider market. How Have F5's Revenues Evolved Over Recent Years? F5's Revenues have grown slightly over the latest years. How Profitable Is F5? F5's profit margins are greater than those of most companies in the Trefis coverage area. Is F5 Financially Stable? F5's balance sheet appears very solid. How Resilient Is FFIV Stock In A Downturn? FFIV stock has demonstrated an impact that was slightly better than the benchmark S&P 500 index during some recent downturns. While investors are hopeful for a soft landing in the U.S. economy, how severe could the situation become if another recession occurs? Our dashboard How Low Can Stocks Go During A Market Crash illustrates how key stocks performed during and following the last six market crashes. Synthesizing All The Insights: Implications For FFIV Stock In conclusion, F5's performance across the parameters outlined above is summarized as follows: F5 Networks has shown robust performance across key financial and operational metrics. Nevertheless, the stock is currently valued moderately, which we believe does not accurately represent its inherent strength. This misalignment is exactly why we view FFIV stock as a compelling buying opportunity. Of course, every investment carries its own risks. Investors may be reluctant to assign a higher valuation multiple to FFIV stock, particularly in light of its 6% revenue growth over the past twelve months. However, it is important to highlight that revenue growth has seen recent improvement, coupled with increased profitability. In our opinion, this favorable trend justifies an upward revision of its valuation multiple. While FFIV stock appears promising, investing in a single stock involves risks. Conversely, the Trefis High Quality (HQ) Portfolio, featuring a set of 30 stocks, has a history of consistently outperforming the S&P 500 over the past four years. What accounts for this? Collectively, HQ Portfolio stocks have yielded better returns with lower risk compared to the benchmark index; a smoother experience, as seen in HQ Portfolio performance metrics.

Quantum Threats Reshape Commvault's Vision For Data Security
Quantum Threats Reshape Commvault's Vision For Data Security

Forbes

time4 days ago

  • Business
  • Forbes

Quantum Threats Reshape Commvault's Vision For Data Security

Commvault is incorporating post-quantum cryptography to address future data security risks. Data protection provider Commvault announced earlier this month that it is adding more quantum-safe capabilities to its platform to build out defenses against post-quantum cryptography. This is important because, as quantum computing shifts from theoretical to practical use, it brings a new class of cybersecurity threats. To help organizations prepare, Commvault has incorporated NIST-recommended PQC algorithms into its data protection offerings, covering both cloud and on-premises environments. The goal is to ensure long-term data security by protecting backups made today from potential decryption by future quantum systems. Over the past year, Commvault has introduced multiple post-quantum cryptography capabilities to safeguard data against future risks posed by quantum computing. PQC has important implications for customers, competitors and the broader industry, and all organizations should prepare for a quantum-driven — and quantum-safe — future. (Note: Commvault is an advisory client of my firm, Moor Insights & Strategy.) Understanding The Quantum Threat To Enterprise Data First, a little background on why this is so important. Quantum computers apply principles of quantum mechanics to process information in fundamentally different ways from classical computers. While this could unlock incredible advances in medicine, materials science, finance, AI and more, it also introduces new security concerns. This is because current encryption methods such as RSA and elliptic curve cryptography depend on mathematical problems that are very hard to reverse — unless a powerful quantum computer is involved. Once quantum computers that powerful are launched, probably in the next few years, these algorithms can potentially be broken quickly, compromising these widely used encryption methods. A crucial concern today is the 'harvest now, decrypt later' tactic, where bad actors can intercept and store encrypted data to decrypt it in the future once quantum capabilities mature. HNDL protection is especially critical for sectors with long-term data sensitivity, such as healthcare, finance and government. (Think of any setting in which sensitive information — names, dates of birth, government ID numbers, bank account numbers, medical histories and the like — remains unchanged for many years.) A survey by the Information Systems Audit and Control Association found that 63% of cybersecurity professionals believe quantum computing will shift or expand cyber risks, and half expect it to create compliance challenges. This image shows how users can enable PQC within Commvault's CommCell environment by selecting a ... More checkbox in the group configuration settings. Commvault's Post-Quantum Cryptography Response Commvault has taken a practical, multi-stage approach to quantum-era risks. In August 2024, it introduced a cryptographic agility framework, which is meant to allow organizations to adopt new cryptographic standards for PQC without major system changes. The framework includes several NIST-recommended quantum-resistant algorithms — CRYSTALS-Kyber, CRYSTALS-Dilithium, SPHINCS+ and FALCON. (My colleague Paul Smith-Goodson, who has been covering quantum computing for years, went into more detail about these algorithms in the context of IBM's PQC efforts, also in August 2024.) Commvault's announcement earlier this month builds on last year's release by adding support for the Hamming Quasi-Cyclic algorithm, which uses quantum error-correcting codes to resist quantum decryption. But rather than focusing only on algorithm support, Commvault also emphasizes operational integration. Its Risk Analysis tools help organizations identify sensitive data, allowing quantum-resistant encryption to be applied where it's most needed. The crypto-agility framework offered by Commvault allows organizations to shift between cryptographic methods via relatively simple configuration changes, without needing to overhaul their existing environments. This flexibility helps minimize disruptions and lowers the costs associated with adapting to new standards as they emerge. Securing Critical Industries For The Quantum Era Commvault's PQC features should be especially helpful to organizations in healthcare, finance and government as they address compliance needs, ensure continuity and — most importantly — protect data that is held for decades. As touched on above, these industries are especially at risk for deferred decryption attacks, so implementing PQC features now should help address the risk of HNDL exploits later. Besides the benefits already mentioned, this could help organizations using Commvault maintain trust among regulators, customers and partners for the long haul. As data protection standards in these industries become stricter in anticipation of quantum threats, solutions that incorporate quantum-resistant encryption are increasingly necessary. Forward-looking IT organizations are already adopting these technologies. For instance, the Nevada Department of Transportation has adopted Commvault's PQC tools to meet government security requirements and protect sensitive information. The company also cited Peter Hands, CISO of the British Medical Association, who said, 'Commvault's rapid integration of NIST's quantum-resistant standards, particularly HQC, gives us great confidence that our critical information is protected now and well into the future.' The adoption of PQC is accelerating as both technological developments and regulatory requirements create a framework for organizations to address emerging threats from quantum computing. In the United States, for instance, federal agencies have been instructed to integrate post-quantum standards into their procurement and operational practices. Similar regulatory efforts are taking place in the European Union and other jurisdictions, where updates to data protection frameworks increasingly include provisions for quantum-safe encryption. To maintain security and compatibility during the transition, many organizations are implementing hybrid encryption methods that combine traditional and quantum-resistant algorithms. This approach allows for gradual migration to fully quantum-resistant systems while enabling protection against both current and future threats. PQC Challenges And The Push For Wider Adoption Commvault's phased introduction of PQC capabilities is a step forward, but current support is mostly limited to cloud-based customers using particular software versions. This creates a gap for organizations relying on hybrid or on-premises environments, which are still widely used in sensitive sectors like those already mentioned. To address this, Commvault would benefit from providing a clear roadmap for extending PQC support across all deployment models. Such a roadmap should outline which software versions will be supported, specify the technical requirements and offer a realistic timeline for implementation. The broader data protection market is also shifting as major technology providers such as IBM and Microsoft integrate quantum-safe features into their platforms. Other data protection vendors, such as Cohesity, Veeam and Rubrik, are expected to follow suit as industry standards become more established. This means Commvault will likely face growing competition in offering robust PQC solutions. Keeping pace will require not only technical expansion but also practical guidance for customers on how to adopt and apply PQC in various enterprise scenarios. Flexibility and clear communication about available features and best practices will be important for supporting a wide range of customer environments and needs. Aligning Data Security Strategies For A Quantum Future Commvault's early efforts in post-quantum cryptography and crypto-agility demonstrate a commitment to long-term data security. However, maintaining progress will depend on expanding access to PQC features for all customers, providing transparent information about costs and continuing to work closely with regulatory bodies. Quantum computing presents both new risks and opportunities. As traditional encryption methods become more vulnerable, the need for quantum-resistant security will grow. Commvault's PQC features offer a practical way for organizations to protect data that must remain secure for years. By focusing on adaptability, compliance and targeted encryption strategies, Commvault helps customers build stronger defenses for the future. The timeline for quantum decryption could be shorter than many anticipate, making it important for organizations to start preparing now. For enterprises, taking early action is important to avoid exposure and regulatory issues. For vendors, ongoing improvements in accessibility, transparency and alignment with emerging standards will determine long-term success. Simplifying the path to quantum readiness will be a key factor in supporting customers through this transition.

Beyond Operating Systems: Considerations For A Comprehensive Quantum Security Strategy
Beyond Operating Systems: Considerations For A Comprehensive Quantum Security Strategy

Forbes

time18-06-2025

  • Business
  • Forbes

Beyond Operating Systems: Considerations For A Comprehensive Quantum Security Strategy

Antonio Sanchez is Chief Strategy Officer at Quantum Xchange, a post-quantum crypto-agility solution provider. The recent integration of post-quantum cryptography (PQC) into Windows 11 and Red Hat Enterprise Linux 10 marks a pivotal moment in cybersecurity. As quantum computing continues advancing, the industry is responding to the existential threat these powerful machines pose to our current encryption standards, which are embedded everywhere in our digital lives. However, security is an end-to-end concern, and while OS-level quantum resistance represents significant progress, it addresses only one layer of what must be a comprehensive strategy. Operating system PQC integration provides a foundation for quantum security, but several critical vulnerabilities remain unaddressed: • Enterprises maintain diverse and dynamic IT footprints. They span multiple OS vendors, versions, legacy systems, cloud services and specialized applications. A quantum-secure operating system cannot protect outdated systems or anything beyond its ecosystem. The heterogeneous environment creates security gaps that require comprehensive solutions beyond the OS layer. • Data in motion remains vulnerable. An operating system handles encryption requirements on the local machine, but those systems have to connect with other servers and clients across the network. This means your data travels across your IT footprint with varying security implementations. A quantum-secure strategy must address the entire journey. • Cryptographic agility—the ability to quickly swap encryption algorithms—requires infrastructure and planning beyond the OS on the systems. As quantum-resistant cryptography evolves, organizations need frameworks for rapid adoption and implementation of future algorithms. There are several key elements of a robust security posture that includes quantum: • Cryptographic Inventory Discovery And Management: Organizations must conduct thorough audits to identify all systems and cryptography in use. This cryptographic inventory should ideally be continuous due to the dynamic nature of IT estates. This becomes the foundation for prioritized remediation efforts. • Risk-Based Implementation: Not all data requires the same level of protection. A nuanced strategy allocates quantum-resistant resources based on data sensitivity and retention requirements. Information that must remain secure for decades demands immediate quantum protection, while short-lived data may follow a more gradual transition timeline. • Application-Level Security: Applications typically implement their own cryptographic protocols independent of the underlying operating system. Each must be individually assessed and updated to quantum-resistant standards—a process that OS-level PQC cannot address. • Key And Certificate Management: The transition to quantum-resistant algorithms necessitates comprehensive key management systems that can handle longer keys, different certificate formats and hybrid cryptographic approaches during the migration period. • Hardware Security Integration: Many organizations rely on hardware security modules (HSMs) and trusted platform modules (TPMs) for their most sensitive operations. These specialized components require quantum-resistant updates that align with broader security strategies. • Cross-Platform Standardization: Enterprise environments typically span Windows, Linux, macOS, mobile operating systems, IoT devices and other specialized systems. A comprehensive security strategy must harmonize quantum-resistant approaches across this diverse landscape. Organizations must navigate a hybrid reality where quantum-vulnerable and quantum-resistant systems coexist, sometimes processing the same data. This transition requires: • Crypto-Agile Infrastructure: Solutions designed to accommodate algorithm changes without major architectural overhauls or operational interruption. • Hybrid Cryptographic Approaches: Implementing both traditional and post-quantum algorithms during the transition, providing defense-in-depth while building confidence in new cryptographic methods. • Policy And Governance Frameworks: Updated security policies that account for quantum threats and establish governance for the transition to quantum-resistant technologies. The integration of PQC into major operating systems represents an important milestone, but it's not the destination. It signals the beginning of a broad transformation in how we secure digital assets against quantum threats. Organizations must look beyond operating system protections to develop holistic strategies addressing their entire digital footprint. As quantum computing continues its rapid advancement, the window for preparation narrows. Those who view OS-level PQC as a step in a comprehensive security evolution will be best positioned to protect their most valuable information assets in the post-quantum era. The quantum security journey extends far beyond operating system updates. It requires rethinking security architecture, implementation priorities and transition strategies. Only through this comprehensive approach can organizations truly prepare for the quantum computing revolution that lies ahead. Forbes Communications Council is an invitation-only community for executives in successful public relations, media strategy, creative and advertising agencies. Do I qualify?

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store