Skip to main content

Discover what assets are using

encryption.

Inventory all encryption mechanisms on endpoints
The third pillar involves discovering how encryption is ap

Step 1 for Post-Quantum Cryptography Transition is Inventory: The Five Pillars of Cryptographic Discovery & Inventory.

Asset Encryption Scanning

External Network

Understand what encryption is visible externally from your infrastructure.

Internal Network

Identify internal encryption within your network and how it communicates.

IT Assets

Recognize how endpoints, IoT devices, and servers use encryption and for what purposes.

Databases

Pinpoint the location of databases and understand how they are encrypted.

Code

Search for and inventory the encryption used within your code and code libraries.
IT assets such as laptops, mobile devices, and IoT systems use a mix of encryption protocols that may vary depending on their purpose or operating system.

In many cases, IT assets such as laptops, mobile devices, and IoT systems use a mix of encryption protocols that may vary depending on their purpose or operating system. Organizations must:

Inventory all encryption mechanisms on endpoints

Ensure that encryption is applied to protect sensitive data stored on devices, such as employee laptops or mobile devices.

01

Review IoT encryption:

Outdated protocols like SSL and older versions of TLS should be flagged and replaced with quantum-resistant alternatives.

02

Ensure server-side encryption:

Critical data stored on servers should be encrypted both at rest and in transit. Outdated algorithms such as AES-128 should be upgraded to stronger quantum-safe standards, such as AES-256.

03

Cataloging and Securing Cryptographic Assets:

 

The final phase of the cryptographic inventory process is cryptographic identification. This step ensures that all cryptographic elements, from keys to algorithms, are properly cataloged and assessed for security.

Recognize how endpoints, IoT devices, and servers use encryption and for what purposes

 

Encryption is everywhere in your network: applications, databases, hardware… well everything. 

QryptoAsset Scanner

Solution Architecture: External (either Software As A Service, Private Cloud, Customer Provided environment), internally hosted as a docker image or consultant managed.

IT Assets Scan

Endpoints: Laptops/Desktops, Servers, Routers, Switches, Firewalls, Storage Devices, Printers/Scanners

Software Assets

OS, Applications, Cloud Services, Security software, Virtual Machines

IoT Assets

Phone OS, Cameras, Smart Devices, Connected keychains or location trackers, HVAC, Medical devices, Environmental Sensors, Gateways, Point-of-sale (POS) systems, Smart projectors and multimedia systems

IIoT

Programmable logic controllers (PLCs), Industrial robots and autonomous systems, Smart sensors (e.g., temperature, pressure, and motion sensors), SCADA systems (Supervisory Control and Data Acquisition)

Starting is the easiest part.

The problem won’t get easier with time. The first step is both the simplest and easiest. Put your foot on the path and start walking to the post quantum future.

Get a demo or ask for our video demo