ISARA Corp. Introduces Advance Crypto Agility SuiteISARA Corp. Introduces Advance Crypto Agility Suite
ISARA Corp. Introduces Advance Crypto Agility Suite
June 29, 2021
WATERLOO, Ontario, June 29, 2021 — ISARA Corp., the world’s leading provider of quantum-safe security solutions, today announced the launch of the ISARA Advance® Crypto Agility Suite, a first-of-its-kind enterprise solution that allows organizations to discover their cryptographic blind spots and equip them to take action against the looming threat of encryption-breaking quantum computers. Cryptography is located throughout today’s enterprises and government organizations. Yet, because it is so deeply embedded, it is almost always overlooked, exposing vulnerabilities and risks.
Cryptography that secures data in motion is the foundation of identification, authentication, confidentiality, and verification. To secure enterprises today, keep them secure tomorrow, and comply with increasingly stringent regulations and audits, the cryptography used by organizations needs to be visible, managed, and upgraded without business disruption.
Revealing what lurks within organizations’ information security infrastructures forms the foundation of cryptographic agility and risk management. The challenge of building and maintaining cryptographic systems has created an immense information security black hole with costly consequences. Expensive, prolonged, and ineffective upgrades are notoriously complicated — and they are even more challenging when cryptographic assets are unknown or poorly understood. The National Institute of Standards and Technology (NIST) and the National Cybersecurity Center of Excellence (NCCoE, part of the United States Department of Homeland Security) recently issued a document outlining migration recommendations: Migration to Post-Quantum Cryptography.
ISARA Advance: Cryptographic Management from a Single Pane of Glass
“Cryptography is a key element of enterprise security and prioritizing cryptographic management is a critical success factor,” said Alan Panezic, chief product officer at ISARA. “We created ISARA Advance to enable the discovery, management, and remediation of cryptographic infrastructure from a central dashboard, to help organizations account for cryptography, save time, and reduce upgrade disruptions.”
ISARA Advance increases organizations’ cryptographic agility, mitigates cryptographic risk, and ensures organizations are optimally positioned and prepared for upgrades — whether as part of a large-scale generational migration or simply to manage risks in the shorter term. ISARA Advance integrates into and ingests data from already-deployed network and end-point detection and response solutions (NDR & EDR), creating an elegant dashboard for customers to properly view and manage their cryptography. It provides all of the tools to manage cryptography, with the flexibility to quickly and cost-effectively modify them as new threats emerge. For more information, download the ISARA Advance® Crypto Agility Suite product sheet.
“Our customers were clear about not wanting to implement yet another network probe or agent, so our design was deliberate to utilize already-deployed solutions to pull the data required to build our management control from a single pane of glass,” said ISARA CEO and co-founder, Scott Totzke. “ISARA Advance brings clarity to a complex domain by discovering and cataloging cryptographic assets and generating a list of prioritized actions.”
About ISARA Corporation
ISARA is a Canadian-based company, founded in 2015, whose mission is to help customers on their journey to transition to quantum-safe security and enable cryptographic agility, with crypto-agile and quantum-safe cryptography tools and solutions for today’s information technology ecosystems. Our mission is to enable seamless cryptography upgrades to clear the path to quantum-safe security for enterprises and government agencies. For more information, please visit isara.com.
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks