We're proud to announce that we've been selected as a 2015 SINET16 Innovator!
Strengthen your Security
using High Speed True Random Numbers
Protect your valuable information from the weaknesses of pseudo-random.
Securing your World
through Quantum Innovation
Leveraging the quantum properties of nature to deliver next generation cyber security, today.
Unleashing the Full Power
of Encryption in the Enterprise
Enable encryption across new and legacy infrastructure, with our advanced interoperable key and policy manager and the uncompromising quality of high throughput true random keys.
Ultimate Data Security for Enduring Trust®
High Rate True Random Numbers
Key & Policy Manager
Quantum Enhanced Encryption
World’s fastest true random number generator unleashes the true power of encryption.
High speed true random source delivering:
- 1 Gbit/s uniform output
- KMIP interface
- FIPS 140-2 crypto module
- High performance and availability
- 8 Gbit/s quantum entropy
- Raw and conditioned output modes
Vendor neutral solution seamlessly delivers best practice key management and security policies across your legacy infrastructure.
Centralized enterprise-wide management and control for:
- symmetric keys
- asymmetric key pairs
- X.509 certificates
- split keys
- secret objects
- opaque data objects
- random objects
- random streams
Quantum enhanced encryption raises the bar on IT security.
- Integrated encryption solution
- With quantum key generation
- Advanced key and policy management
- Flexible deployment options:
– On premises
– In the cloud
One-time pad encryption
with key destruction
protects vulnerable high-security data during collection, at rest, and in transit.
- One-time pad cipher
- Automatic key destruction
- With high speed true random numbers
- With vendor neutral key and policy management
– Secure logging etc.
Learn MoreQuintessence Labs
Secure Data on Mission
Critical Mobile Assets
qProtect delivers fail-safe protection for confidential data on mobile data collection devices. Proven one-time pad encryption with permanent key destruction keep your data safe at rest and in transit, even if the device falls into the wrong hands.
Sophisticated tamper detection, physical zeroization circuitry or manually initiated zeroization not required.