[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [AI Cybersecurity](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-cybersecurity?ts=markdown) 3. [Quantum Security](https://www.paloaltonetworks.com/cyberpedia/what-is-quantum-security?ts=markdown) 4. [What Is Quantum Security? Preparing for the Post-Quantum Era](https://www.paloaltonetworks.com/cyberpedia/what-is-quantum-security?ts=markdown) Table of contents * [What does the industry really mean by "quantum security"?](#what-does-the-industry-really-mean-by-quantum-security) * [Why won't today's encryption hold up against quantum computers?](#why-wont-todays-encryption-hold-up-against-quantum-computers) * [What is post-quantum cryptography, and why is it relevant?](#what-is-post-quantum-cryptography) * [Where do QKD and QRNG fit into quantum security?](#where-do-qkd-and-qrng-fit-into-quantum-security) * [Why is quantum security so challenging to put in place?](#why-is-quantum-security-so-challenging-to-put-in-place) * [How are organizations getting quantum ready today?](#how-are-organizations-getting-quantum-ready-today) * [Is the quantum threat imminent --- or still years away?](#is-the-quantum-threat-imminent) * [Quantum security FAQs](#quantum-security-faqs) # What Is Quantum Security? Preparing for the Post-Quantum Era 6 min. read Table of contents * [What does the industry really mean by "quantum security"?](#what-does-the-industry-really-mean-by-quantum-security) * [Why won't today's encryption hold up against quantum computers?](#why-wont-todays-encryption-hold-up-against-quantum-computers) * [What is post-quantum cryptography, and why is it relevant?](#what-is-post-quantum-cryptography) * [Where do QKD and QRNG fit into quantum security?](#where-do-qkd-and-qrng-fit-into-quantum-security) * [Why is quantum security so challenging to put in place?](#why-is-quantum-security-so-challenging-to-put-in-place) * [How are organizations getting quantum ready today?](#how-are-organizations-getting-quantum-ready-today) * [Is the quantum threat imminent --- or still years away?](#is-the-quantum-threat-imminent) * [Quantum security FAQs](#quantum-security-faqs) 1. What does the industry really mean by "quantum security"? * [1. What does the industry really mean by "quantum security"?](#what-does-the-industry-really-mean-by-quantum-security) * [2. Why won't today's encryption hold up against quantum computers?](#why-wont-todays-encryption-hold-up-against-quantum-computers) * [3. What is post-quantum cryptography, and why is it relevant?](#what-is-post-quantum-cryptography) * [4. Where do QKD and QRNG fit into quantum security?](#where-do-qkd-and-qrng-fit-into-quantum-security) * [5. Why is quantum security so challenging to put in place?](#why-is-quantum-security-so-challenging-to-put-in-place) * [6. How are organizations getting quantum ready today?](#how-are-organizations-getting-quantum-ready-today) * [7. Is the quantum threat imminent --- or still years away?](#is-the-quantum-threat-imminent) * [8. Quantum security FAQs](#quantum-security-faqs) Quantum security is the practice of protecting information and communications from the risks created by quantum computing. It focuses on replacing cryptographic methods such as RSA and ECC that could be broken by quantum algorithms. The discipline recognizes post-quantum cryptography as the main solution, alongside research into quantum-based approaches like quantum key distribution. ## What does the industry really mean by "quantum security"? ![Graphic containing a centered heading reading 'What 'quantum security' really means' above two rectangular sections. The left section is blue and titled 'Post-quantum cryptography (PQC),' with supporting text that says 'New algorithms (e.g., lattice-based) that resist quantum attacks' and smaller text reading 'NIST standards, widely deployable, runs on today's systems.' The right section is orange and titled 'Quantum cryptography,' with text stating 'Technologies like QKD and QRNG' and smaller text below that reads 'Require specialized hardware, limited to pilots/research.' A sentence runs beneath both sections in smaller font: 'When people say 'quantum security,' they usually mean PQC — the primary path forward for securing data against quantum computers.'](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-quantum-security/What-quantum-security-really-means.png "Graphic containing a centered heading reading 'What 'quantum security' really means' above two rectangular sections. The left section is blue and titled 'Post-quantum cryptography (PQC),' with supporting text that says 'New algorithms (e.g., lattice-based) that resist quantum attacks' and smaller text reading 'NIST standards, widely deployable, runs on today's systems.' The right section is orange and titled 'Quantum cryptography,' with text stating 'Technologies like QKD and QRNG' and smaller text below that reads 'Require specialized hardware, limited to pilots/research.' A sentence runs beneath both sections in smaller font: 'When people say 'quantum security,' they usually mean PQC — the primary path forward for securing data against quantum computers.'") The phrase quantum security often gets used loosely. Some treat it as if it covers every quantum-related technology in cybersecurity. But in practice, most of the security community uses it as shorthand for one thing: post-quantum cryptography. In other words: "Quantum security" usually refers to the transition away from [encryption](https://www.paloaltonetworks.com/cyberpedia/data-encryption) methods like RSA (Rivest--Shamir--Adleman) and ECC (Elliptic-curve cryptography). These are the methods that could be broken by large-scale quantum computers running algorithms such as Shor's. Post-quantum cryptography, or PQC, focuses on new mathematical approaches that can withstand both classical and quantum attacks. So why do you also hear about things like quantum key distribution (QKD) and quantum random number generators (QRNGs)? That's why the standards community, led by NIST, has focused on advancing PQC first. ***Note:*** *The term "quantum security" often gets used in two very different ways. Some use it to describe how quantum technologies themselves can improve cybersecurity, such as through quantum key distribution. In this article, though, we focus on the other side of the equation: how to protect today's data and communications against the risks posed by quantum computers.* ## Why won't today's encryption hold up against quantum computers? "The Internet relies heavily on both public-key encryption schemes and digital signatures to ensure the confidentiality and authenticity of digital communications. However, many of these widely used cryptosystems could be broken by quantum algorithms, running on large-scale fault-tolerant quantum computers. Such machines do not yet exist, but could conceivably be built in the not-too-distant future." [- NIST, Post-Quantum Cryptography, and the Quantum Future of Cybersecurity, Yi-Kai Liu and Dustin Moody](https://www.nist.gov/publications/post-quantum-cryptography-and-quantum-future-cybersecurity) The encryption used to protect most digital systems today was designed with classical computers in mind. Common algorithms like RSA and elliptic curve cryptography rely on mathematical problems that are extremely difficult for current machines to solve. And that difficulty is what makes the encryption strong. Quantum computers change the equation. They use principles of quantum mechanics that allow certain problems to be solved far faster than classical machines ever could. Which means the math that underpins RSA and ECC is no longer safe once large-scale quantum computers exist. Here's why. A quantum algorithm called Shor's can factor large numbers and compute discrete logarithms efficiently. And those are the exact problems that make RSA and ECC secure today. ![Line graph titled 'Factoring efficiency: classical vs. Shor's algorithm' with the vertical axis labeled 'Number of operations' and the horizontal axis labeled 'Number of digits.' Blue curve labeled 'Classical algorithm' rises steeply at first and continues upward across the graph. Red curve labeled 'Shor's algorithm' starts lower, increases slightly, and then levels off well below the blue curve. Caption below reads 'Shor's algorithm factors large numbers far faster than classical methods, threatening RSA and ECC once quantum computers scale.'](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-quantum-security/Factoring-efficiency.png "Line graph titled 'Factoring efficiency: classical vs. Shor's algorithm' with the vertical axis labeled 'Number of operations' and the horizontal axis labeled 'Number of digits.' Blue curve labeled 'Classical algorithm' rises steeply at first and continues upward across the graph. Red curve labeled 'Shor's algorithm' starts lower, increases slightly, and then levels off well below the blue curve. Caption below reads 'Shor's algorithm factors large numbers far faster than classical methods, threatening RSA and ECC once quantum computers scale.'") So if an attacker had a sufficiently powerful quantum computer, they could use Shor's algorithm to break these systems outright. The effect would be immediate: encrypted traffic, digital signatures, and authentication systems that rely on RSA or ECC could be forged or exposed. Symmetric encryption such as AES is affected too, though in a different way. Another algorithm, Grover's, reduces the effective strength of symmetric keys by half. A 256-bit key would provide the equivalent of 128-bit security against a quantum attack. In other words, quantum computers make [brute force](https://www.paloaltonetworks.com/cyberpedia/brute-force) attacks faster. The good news: AES can remain secure with larger key sizes, which is why 256-bit AES is expected to continue protecting data even in a quantum era. This makes symmetric encryption more resilient than RSA or ECC, though it still requires updates to key management practices. That said, the danger isn't only in the future. Attackers can capture encrypted data now and hold onto it until quantum computers mature. This is called *harvest now, decrypt later* . [Sensitive information](https://www.paloaltonetworks.com/cyberpedia/sensitive-data) with long-term value, like financial records or government communications, could be exposed even if it's stored securely today. ![Horizontal process diagram titled 'Harvest now, decrypt later (HNDL)' showing five sequential steps connected by arrows. Step 1, in a blue square, reads 'Data exfiltration' with subtext 'Steals encrypted traffic or files.' Step 2, in a lighter blue square, reads 'Cold storage' with subtext 'Keeps ciphertext for years.' Step 3, in an orange square, reads 'Advances in quantum computing' with subtext 'Waits for quantum systems.' Step 4, in a white square with a blue lock icon, reads 'Decrypt later' with subtext 'Shor's breaks RSA/ECC.' Step 5, in a purple square, reads 'Use the plaintext' with subtext 'Read, sell, or forge identities.' Small text under several steps notes 'Years can pass' to indicate elapsed time between stages.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-quantum-security/harvest-now-decrypt-later.png "Horizontal process diagram titled 'Harvest now, decrypt later (HNDL)' showing five sequential steps connected by arrows. Step 1, in a blue square, reads 'Data exfiltration' with subtext 'Steals encrypted traffic or files.' Step 2, in a lighter blue square, reads 'Cold storage' with subtext 'Keeps ciphertext for years.' Step 3, in an orange square, reads 'Advances in quantum computing' with subtext 'Waits for quantum systems.' Step 4, in a white square with a blue lock icon, reads 'Decrypt later' with subtext 'Shor's breaks RSA/ECC.' Step 5, in a purple square, reads 'Use the plaintext' with subtext 'Read, sell, or forge identities.' Small text under several steps notes 'Years can pass' to indicate elapsed time between stages.") That's exactly why there's so much focus on quantum security. The core concern is that the encryption protecting internet traffic, digital identities, and critical systems will not stand up once quantum computing reaches practical scale. So cryptographic standards are being developed to protect against these risks. | ***Further reading:*** * [*8 Quantum Computing Cybersecurity Risks \[+ Protection Tips\]*](https://www.paloaltonetworks.com/cyberpedia/what-is-quantum-computings-threat-to-cybersecurity) * [*Harvest Now, Decrypt Later (HNDL): The Quantum-Era Threat*](https://www.paloaltonetworks.com/cyberpedia/what-is-quantum-computings-threat-to-cybersecurity) ## What is post-quantum cryptography, and why is it relevant? Post-quantum cryptography, or PQC, is a set of encryption methods designed to remain secure even when large-scale quantum computers exist. It provides the same functions as today's cryptography---like securing web traffic and digital signatures---but uses different mathematical foundations. ![Infographic titled 'Post-quantum cryptography explained'. The diagram is divided into five horizontal sections labeled Part 1 through Part 4, with a concluding takeaway bar. Part 1, labeled 'The problem', contains two red boxes: one labeled 'RSA \& ECC today' with text 'Secure against classical computers by using factoring and discrete logarithms', and the other labeled 'Quantum threat' with text 'Shor's algorithm on a quantum computer could break RSA and ECC'. Part 2, labeled 'The solution', shows a blue box reading 'Post-quantum cryptography (PQC)' with text 'New encryption methods based on math problems that remain hard for both classical and quantum computers'. Part 3, labeled 'Algorithm families', presents three purple boxes. The first, 'Lattice-based', reads 'Foundation of ML-KEM \& ML-DSA; uses high-dimensional algebraic structures'. The second, 'Hash-based', reads 'Relies on secure one-way hash functions; basis of SPHINCS+'. The third, 'Multivariate', reads 'Uses polynomial equations; still in research stages'. Part 4, labeled 'NIST standards', includes three gray circular icons with accompanying text: 'ML-KEM (FIPS 203) Standard for key establishment', 'ML-DSA (FIPS 204) Standard for digital signatures', and 'SLH-DSA (FIPS 205) Stateless hash-based digital signature scheme'. A dark gray bar at the bottom labeled 'Takeaway' contains the statement 'PQC is the standards-led path forward — practical and deployable today'.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-quantum-security/Post-quantum-cryptography-explained-new.png) Here's the key difference. RSA and elliptic curve cryptography depend on factoring and discrete logarithms. These are math problems that take classical computers so long to solve that they're considered secure in practice. But they're easy for a quantum computer running Shor's algorithm. So PQC avoids those weak points by relying on different kinds of problems that remain difficult for both classical and quantum systems. By changing the underlying math, PQC can provide the same functions as today's encryption without breaking once quantum computers reach scale. So what does that look like in practice? Researchers are working with several different families of algorithms: * Lattice-based cryptography is one of the main approaches. It uses high-dimensional algebraic structures that even a quantum computer cannot solve efficiently. * Other families, like hash-based and multivariate cryptography, offer additional options. The important point is that all of these algorithms can run on today's classical machines. Which means organizations don't need quantum hardware to start adopting them. "There is no need to wait for future standards. Go ahead and start using these three. We need to be prepared in case of an attack that defeats the algorithms in these three standards, and we will continue working on backup plans to keep our data safe. But for most applications, these new standards are the main event." [- NIST, Dustin Moody, Mathematician, NIST Releases First 3 Finalized Post-Quantum Encryption Standards](https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards) To make adoption practical, NIST has standardized three algorithms for real-world use: * [Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM)](https://csrc.nist.gov/pubs/fips/203/final) is used for key establishment. * [Module-Lattice-Based Digital Signature Algorithm (ML-DSA)](https://csrc.nist.gov/pubs/fips/203/final) is used for digital signatures. * [Stateless Hash-Based Digital Signature (SLH-DSA)](https://csrc.nist.gov/pubs/fips/203/final) is a stateless hash-based signature scheme built on the SPHINCS+ design. These algorithms are expected to become the backbone of future secure communications. The takeaway is this: PQC isn't experimental. It's the mainstream, standards-led path forward. While physics-based methods like quantum key distribution are interesting, PQC is the deployable solution that enterprises, governments, and vendors are preparing to implement now. | ***Further reading:** [What Is Post-Quantum Cryptography (PQC)? A Complete Guide](https://www.paloaltonetworks.com/cyberpedia/what-is-post-quantum-cryptography-pqc)* ## Where do QKD and QRNG fit into quantum security? Technologies like quantum key distribution (QKD) and quantum random number generators (QRNGs) often come up in conversations about quantum security. They're featured in research, standards development, and pilot projects---especially in telecom and government networks---so it's easy to assume they'll define the future of secure communication. Here's the reality. Quantum cryptography is different from post-quantum cryptography. PQC is about new mathematics that can run on today's classical machines. Quantum cryptography, on the other hand, uses the physics of quantum mechanics itself. The best-known example is QKD. ![Diagram titled 'Quantum key distribution' showing two participants labeled Leia on the left and Luke on the right. Leia is associated with blue circles labeled 'Diagonal polarizers' and purple circles labeled 'Horizontal-vertical polarizers.' Luke is associated with similar labels reading 'Diagonal beamsplitter' and 'Horizontal-vertical beamsplitter.' Between them, a horizontal path labeled 'Photon source' on Leia's side and 'Photon detector' on Luke's side shows alternating blue and purple dots representing transmitted photons. Below the diagram, rows of binary sequences are labeled 'Leia's bit sequence,' 'Luke's detection,' and 'Luke's measurements,' followed by a third line labeled 'Sifted key' showing a series of ones, zeros, and dashes.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-quantum-security/quantum-key-distribution.png "Diagram titled 'Quantum key distribution' showing two participants labeled Leia on the left and Luke on the right. Leia is associated with blue circles labeled 'Diagonal polarizers' and purple circles labeled 'Horizontal-vertical polarizers.' Luke is associated with similar labels reading 'Diagonal beamsplitter' and 'Horizontal-vertical beamsplitter.' Between them, a horizontal path labeled 'Photon source' on Leia's side and 'Photon detector' on Luke's side shows alternating blue and purple dots representing transmitted photons. Below the diagram, rows of binary sequences are labeled 'Leia's bit sequence,' 'Luke's detection,' and 'Luke's measurements,' followed by a third line labeled 'Sifted key' showing a series of ones, zeros, and dashes.") It lets two parties exchange encryption keys by transmitting photons in quantum states. If anyone tries to intercept the transmission, the quantum state changes. That disturbance alerts the sender and receiver that the key has been compromised. In simple terms, eavesdropping becomes detectable. But while this provides a new level of assurance, it also requires very specialized hardware that makes it hard to scale. QRNGs work differently. ![Diagram labeled 'Example of a quantum random number generator (QRNG) using a beam splitter' showing a light source on the left emitting a dashed line toward a transparent cube at the center representing a beam splitter. Two dashed lines emerge from the splitter at right angles leading to two detectors labeled D0 and D1. Detector D0 is annotated with text 'click → 0,' and detector D1 is annotated with text 'click → 1.' To the right, a small horizontal sequence of boxes labeled 'Random bit sequence' displays alternating zeros and ones.](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-quantum-security/Example-of-a-quantum-random.png "Diagram labeled 'Example of a quantum random number generator (QRNG) using a beam splitter' showing a light source on the left emitting a dashed line toward a transparent cube at the center representing a beam splitter. Two dashed lines emerge from the splitter at right angles leading to two detectors labeled D0 and D1. Detector D0 is annotated with text 'click → 0,' and detector D1 is annotated with text 'click → 1.' To the right, a small horizontal sequence of boxes labeled 'Random bit sequence' displays alternating zeros and ones.") They harness unpredictable quantum processes to generate random numbers. Cryptography depends heavily on randomness, so better random numbers strengthen keys and reduce predictability. So QRNGs already have growing applications in hardware security modules and secure communications. While both technologies are advancing, their adoption remains concentrated in specialized use cases. For most organizations, PQC offers the most practical, software-deployable path to quantum-safe security today, while QKD and QRNG continue to evolve as complementary technologies for high-assurance environments. | ***Further reading:** [What Is a Quantum Random Number Generator?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-quantum-random-number-generator-qrng)* ## Why is quantum security so challenging to put in place? ![Infographic titled 'Quantum security adoption barriers' featuring a diamond-shaped design divided into four colored sections with icons and text labels. Top left section in blue is labeled 'Migration complexity' with text 'Encryption is everywhere. Updating it means rewriting code, cataloging dependencies, and coordinating supply chains.' Top right section in light blue is labeled 'Crypto-agility gap' with text 'Most systems can't swap algorithms easily. Adding flexibility takes major re-engineering.' Bottom left section in dark blue is labeled 'Performance + interoperability' with text 'Larger keys and heavier processing slow systems down. Secure communication also depends on cross-vendor compatibility.' Bottom right section in blue is labeled 'Early-stage alternatives' with text 'QKD and QRNG are still in pilots. They're not ready to replace PQC at scale.'](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-quantum-security/Quantum-security-adoption-barriers.png "Infographic titled 'Quantum security adoption barriers' featuring a diamond-shaped design divided into four colored sections with icons and text labels. Top left section in blue is labeled 'Migration complexity' with text 'Encryption is everywhere. Updating it means rewriting code, cataloging dependencies, and coordinating supply chains.' Top right section in light blue is labeled 'Crypto-agility gap' with text 'Most systems can't swap algorithms easily. Adding flexibility takes major re-engineering.' Bottom left section in dark blue is labeled 'Performance + interoperability' with text 'Larger keys and heavier processing slow systems down. Secure communication also depends on cross-vendor compatibility.' Bottom right section in blue is labeled 'Early-stage alternatives' with text 'QKD and QRNG are still in pilots. They're not ready to replace PQC at scale.'") On paper, adopting quantum-safe protections sounds straightforward. In reality, it requires complex changes that will take years to implement. * **The first challenge is migration.** Encryption is embedded in nearly every system, protocol, and application. Replacing algorithms isn't just a software update. It means cataloging every dependency, rewriting code, and coordinating across supply chains. Which means timelines stretch into years. Not months. * **Performance is another hurdle.** Many post-quantum algorithms require larger keys and more processing. And that creates concerns about efficiency on constrained devices and in high-volume systems. Plus, interoperability across networks and vendors adds another layer of difficulty. If systems can't communicate securely with each other, adoption stalls. * **Then there's the issue of crypto-agility.** Most systems today aren't designed to switch cryptographic algorithms easily. And that means migrations often require re-engineering entire architectures. The absence of this flexibility makes transitions slower and riskier. * **Finally, there's the early-stage nature of quantum-enabled approaches like QKD and QRNG.** They're still limited to pilots and niche deployments. As discussed, organizations can't rely on them as a broad solution. To sum up: moving to quantum security isn't a one-time project. It's a gradual process that combines new standards, infrastructure updates, and operational changes. That's why governments and vendors emphasize preparation today, even though large-scale quantum computers may still be years away. ## How are organizations getting quantum ready today? It can't be said enough: quantum security isn't something that can be adopted overnight. Even with NIST standards in place, moving from today's encryption to post-quantum algorithms requires careful planning and years of work. So most organizations are starting with small steps. ![Infographic titled 'Quantum preparation across industries' showing five illustrated panels with icons and short text descriptions. The first panel labeled 'Government' shows a domed government building and text 'Mandates require agencies to inventory cryptographic systems and plan migration paths. PKI updates are a major focus.' The second panel labeled 'Finance' shows a gray bank building with text 'Banks and payment networks trial PQC in secure transactions and digital signatures.' The third panel labeled 'Telecoms' shows a person working on telecommunications towers with text 'Running pilots in 5G authentication and TLS handshakes to validate performance at scale.' The fourth panel labeled 'Defense \& intelligence' shows a rocket launch structure with text 'Testing PQC for secure communications where long-term confidentiality is critical.' The fifth panel labeled 'Enterprise IT' shows a person working at a computer with text 'Most organizations start with cryptographic inventories and build crypto-agility into new systems.'](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-quantum-security/Quantum-preparation-across-industries.png "Infographic titled 'Quantum preparation across industries' showing five illustrated panels with icons and short text descriptions. The first panel labeled 'Government' shows a domed government building and text 'Mandates require agencies to inventory cryptographic systems and plan migration paths. PKI updates are a major focus.' The second panel labeled 'Finance' shows a gray bank building with text 'Banks and payment networks trial PQC in secure transactions and digital signatures.' The third panel labeled 'Telecoms' shows a person working on telecommunications towers with text 'Running pilots in 5G authentication and TLS handshakes to validate performance at scale.' The fourth panel labeled 'Defense & intelligence' shows a rocket launch structure with text 'Testing PQC for secure communications where long-term confidentiality is critical.' The fifth panel labeled 'Enterprise IT' shows a person working at a computer with text 'Most organizations start with cryptographic inventories and build crypto-agility into new systems.'") **Governments are leading the way.** Some have issued mandates requiring agencies to begin inventorying cryptographic systems and planning migration paths. Updates to public key infrastructure (PKI) are also a major priority, since certificates and trust hierarchies are some of the hardest components to transition. PKI migration is especially complex because it touches nearly every secure transaction, from websites to email to digital identities. Defense and intelligence sectors are also testing PQC for secure communications where long-term confidentiality is critical. **Telecom providers are running pilots too.** PQC has been tested in 5G authentication and subscriber identity protection. It's also been trialed in TLS handshakes by browser vendors and major libraries to test compatibility with secure web traffic. These trials help validate how the algorithms perform at scale and in high-speed environments. They also highlight performance trade-offs and the need for hardware acceleration. **Financial institutions are exploring PQC as well.** Banks and payment networks are beginning to trial PQC in secure transactions and digital signatures. The goal is to protect sensitive data with long-term value, such as customer records and high-value financial contracts. **For most organizations, the first step is a cryptographic inventory.** That means cataloging where algorithms like RSA and ECC are embedded across infrastructure, applications, and vendor products. Without this visibility, planning a migration is almost impossible. **Another priority is building crypto-agility into new systems, as mentioned earlier.** That means designing infrastructure so algorithms can be swapped out quickly and at scale. Because even approved standards may face future weaknesses. So organizations need the ability to adapt without repeating costly rebuilds. The bottom line: governments, telecoms, and finance are already running pilots and preparing for migration. Most organizations are still in the planning and inventory stage. The shift to quantum-safe cryptography will take time, but readiness efforts are well underway. ## Is the quantum threat imminent --- or still years away? The quantum threat is already here. As explained, encrypted data can be stolen today and unlocked later when quantum computers mature. The "harvest now, decrypt later" approach puts long-lived information---like medical files, financial records, and government communications---at risk. The reality is that urgency really isn't about predicting when quantum computers will arrive. It's about the fact that data stolen now could still hold value in ten or twenty years, long after it's been compromised. The timeline for large-scale quantum computers is still uncertain. Some predictions point to breakthroughs within a decade, while others suggest it could take much longer. But even if the exact date is unclear, the risk is already material. That's why preparation can't wait. "While it's true that experts predict it could be more than a decade before quantum computers can crack existing encryption, the time for cybersecurity preparations is now. The potential threat of quantum computing to existing encryption demands immediate action. Organizations are strongly advised to implement defense-in-depth strategies, prioritize data protection during both transmission and storage, and most importantly, remain adaptable in the face of new threats." [- S. B. Goyal, Vidyapati Kumar, Sardar M. N. Islam, Deepika Ghai (Eds.), Quantum Computing, Cyber Security and Cryptography](https://link.springer.com/book/10.1007/978-981-96-4948-8) Migrating cryptographic systems takes years. Algorithms need to be integrated into protocols, tested for performance, and deployed across vast infrastructures. Certificates and keys in public key infrastructures also have to be replaced. And none of that can be done quickly. The inflection point may not be pinned to a calendar. But the danger is already looming. So organizations that begin preparing now will be ready when quantum computers reach scale. Those that wait risk being caught unprotected with years of work still ahead. ![Quantum assessment icon](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-quantum-security/icon-quantum-readiness.svg) ## Get your quantum readiness assessment. * Overview of your cryptographic landscape * Quantum-safe deployment recommendations * Guidance for securing legacy apps \& infrastructure [Request assessment](https://www.paloaltonetworks.com/resources/ebooks/quantum-security#assessment) ## Quantum security FAQs #### What is quantum safe security? Quantum safe security is the use of cryptographic methods, such as post-quantum algorithms, designed to remain secure even if large-scale quantum computers become practical. It focuses on replacing vulnerable schemes like RSA and ECC while maintaining protection against both classical and quantum attacks. #### What is a quantum secure network? A quantum secure network uses quantum-resistant cryptography or quantum key distribution to protect data in transit. The goal is to ensure communications remain confidential and authenticated even if quantum computers eventually emerge that could break today's encryption. #### How long until quantum computers break encryption? The timeline is uncertain. Some forecasts suggest a decade or more before quantum computers can break RSA or ECC at scale. However, the immediate risk is "harvest now, decrypt later," where attackers store encrypted data today to unlock once quantum capabilities exist. #### Should I be worried about quantum computers? Yes, but in context. Quantum computers are not yet able to break encryption. The concern is future risk combined with stolen data that remains valuable for decades. Organizations should start preparing now by planning for post-quantum cryptography and building crypto-agility. #### How does quantum randomness improve security? Quantum Random Number Generators (QRNGs) create truly random numbers based on quantum processes, unlike pseudo-random numbers generated by classical algorithms. This enhances encryption strength by ensuring keys are unpredictable and secure. #### How does post-quantum cryptography differ from quantum cryptography? Post-quantum cryptography (PQC) uses new math-based algorithms that run on classical computers to resist quantum attacks. Quantum cryptography relies on quantum physics---like photon transmission---for security. PQC is software-based and widely deployable, while quantum cryptography requires specialized hardware and remains limited to research and pilot use. Related content [YouTube playlist: A CISO's Guide to Quantum Security Binge a 6-video series breaking down why quantum computing is closer than you think but not as difficult.](https://www.youtube.com/playlist?list=PLqATPiC_Bcl8ZGx_EAxQHq0PKa2ii6pNE) [Podcast: Threat Vector | Is the Quantum Threat Closer Than You Think? Hear how to start your transition to quantum-resistant cryptography now.](https://www.paloaltonetworks.com/resources/podcasts/threat-vector-is-the-quantum-threat-closer-than-you-think) [TechDocs: Quantum Security Concepts Get the facts on resisting the quantum computing threat straight from PANW's solutions documentation.](https://docs.paloaltonetworks.com/network-security/quantum-security/administration/quantum-security-concepts) [Interactive experience: Is Your Organization Ready for a Quantum-Safe Future? Dive into an immersive overview on quantum threats, PQC, and NIST's new standards.](https://www.paloaltonetworks.com/resources/ebooks/quantum-security) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Quantum%20Security%3F%20Preparing%20for%20the%20Post-Quantum%20Era&body=Quantum%20security%20is%20the%20practice%20of%20protecting%20information%20and%20communications%20from%20the%20risks%20created%20by%20quantum%20computing.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-quantum-security) Back to Top {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language