Palo Alto Networks and IBM are jointly developing a new Quantum Safe Readiness offering to help organizations transition to quantum-safe cryptography.
Palo Alto Networks and IBM Consulting are jointly creating a quantum-safe security solution. The service combines advisory services from IBM Consulting with the network-level cryptographic intelligence of Palo Alto Networks’ security platforms. The solution targets businesses that need to inventory their current cryptography, assess risks, and develop a migration plan towards post-quantum security. The companies expect to roll out the service in early 2026.
Quantum-ready
The question is not if, but when quantum computers will be able to break classical encryption. With this new security service, Palo Alto Networks and IBM aim to address the advent of these powerful computers. Organizations are advised to inventory their cryptographic systems now, especially in an era where AI applications process increasingly large and sensitive datasets.
read also
Palo Alto: “Quantum Computers in 2029 Will Force Replacement of Security Hardware”
The process begins with Quantum Risk Discovery and Assessment. IBM Consulting, together with the client, examines which systems, applications, and data streams use cryptography and how vulnerable they are to future quantum attacks. Palo Alto Networks provides visibility into cryptographic usage within the enterprise network.
According to Palo Alto Networks, organizations primarily need a concrete roadmap and guidance for the implementation of quantum-safe measures. The combined service should immediately show which components are at the highest risk and what priorities companies should set.
Inventory
Palo Alto Networks’ Quantum Readiness solution creates an automated inventory of cryptographic assets and their usage within the network.
A central component is the so-called Cipher Translation function. This detects vulnerable encryption in network traffic and immediately converts communication to quantum-safe algorithms. This allows organizations to deploy additional protection while a broader migration is still underway.
IBM Consulting Cybersecurity Services uses network insights to link assets, analyze risks, and outline a strategic migration path. Attention is also paid to so-called “harvest-now-decrypt-later” attacks, where attackers intercept data now to decrypt it later with quantum computers.
The joint solution from Palo Alto Networks and IBM is expected in early 2026.
