{"id":25176,"date":"2025-01-21T09:32:04","date_gmt":"2025-01-21T08:32:04","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=25176"},"modified":"2025-04-21T14:26:59","modified_gmt":"2025-04-21T13:26:59","slug":"2025-radar-of-post-quantum-safety-solutions","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/","title":{"rendered":"Radar 2025 of Post Quantum Migration Solutions"},"content":{"rendered":"\n<p style=\"text-align: justify;\">Quantum computing threatens today\u2019s asymmetric cryptography and would render current algorithms obsolete, both RSA and ECC. As for symmetric cryptography, (AES, hash functions) doubling the key size ensures maintained security guarantees. To address the threat, the NIST has standardized three post-quantum (resistant to quantum computers) asymmetric algorithms in August 2024.<\/p>\n<p style=\"text-align: justify;\">Fortunately, quantum computers are not performant enough yet to conduct such attacks. Estimates vary as to when this will be a reality, though most expect it between <a href=\"https:\/\/blog.cloudflare.com\/pq-2024\/\">2033 and 2037<\/a>. Furthermore, regulators have begun outlining end-of-life timelines for existing algorithms, with Australia\u2019s ASD <a href=\"https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cyber-security\/ism\/cyber-security-guidelines\/guidelines-cryptography\">planning<\/a> to designate them as obsolete by 2030 and the NIST <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2024\/NIST.IR.8547.ipd.pdf\">drafting<\/a> its own retirement schedule for 2035. We expect such announcements to pick up during the coming months from other nations.<\/p>\n<p style=\"text-align: justify;\">As such, regardless of the exact date of emergence of quantum computers capable of breaking current cryptographic algorithms, a transition will be obligatory from a regulation standpoint.<\/p>\n<p style=\"text-align: justify;\">Migrating a complicated IT infrastructure is no trivial feat: in a 2022 <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/05\/04\/national-security-memorandum-on-promoting-united-states-leadership-in-quantum-computing-while-mitigating-risks-to-vulnerable-cryptographic-systems\/\">memorandum<\/a>, the Biden administration expected the migration of all U.S. Federal Agencies to cost more than $7 billion. Such a complex endeavor entails a plethora of aspects from assessing risks, to executing the technical migration, with many intermediary steps. Solutions exist to accompany or accelerate those stages.<\/p>\n<p style=\"text-align: justify;\">Wavestone\u2019s 2025 Post-Quantum Migration Migrations radar offers a first visual panorama of market leading cybersecurity solutions for this migration. This radar has been and will continue to be updated in the coming months. Any company that feels it should be part of the radar is encouraged to reach out.<\/p>\n<p style=\"text-align: justify;\">The goal of the radar is not to inventory solutions that completed their PQC migration, but rather solutions that help and accelerate the PQC migration.<\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-25862\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/01\/radar.png\" alt=\"Radar 2025 Post Quantum Migration Solutions\" width=\"1295\" height=\"785\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/01\/radar.png 1295w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/01\/radar-315x191.png 315w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/01\/radar-64x39.png 64w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/01\/radar-768x466.png 768w\" sizes=\"auto, (max-width: 1295px) 100vw, 1295px\" \/><\/p>\n<h2 style=\"text-align: justify;\">Categories\u00a0<\/h2>\n<ul style=\"text-align: justify;\">\n<li><b><span data-contrast=\"auto\">Inventory<\/span><\/b><span data-contrast=\"auto\">:<\/span> <span data-contrast=\"auto\">Automatically inventory the type and locations of all cryptography in use<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Migration Management<\/span><\/b><span data-contrast=\"auto\">:<\/span> <span data-contrast=\"auto\">Provide the big picture view of the post quantum transition, often based on inventory outputs<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">PQC Compliant HSM \/ PKI \/CLM<\/span><\/b><span data-contrast=\"auto\">:<\/span> <span data-contrast=\"auto\">Provide quantum resistant core trust components necessary for most company services<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Libraries \/ Embedded Services<\/span><\/b><span data-contrast=\"auto\">:<\/span> <span data-contrast=\"auto\">Encrypt and sign data with polyvalent libraries or directly integrated cloud solutions<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Edge Protection<\/span><\/b><span data-contrast=\"auto\">:<\/span> <span data-contrast=\"auto\">Protect against quantum computing attack by providing an extra layer of security, be it at network or application level<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Network Analysis:<\/span><\/b> <span data-contrast=\"auto\">Detect network flows which use obsolete cryptography with probes<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Key Market Trends\u00a0<\/h2>\n<h3 style=\"text-align: justify;\">\u00a0<\/h3>\n<h3 style=\"text-align: justify;\">Size disparities<\/h3>\n<p style=\"text-align: justify;\">The market landscape for post-quantum security solutions exhibits significant disparities in the size and maturity of players. On one end of the spectrum, tech giants and established cybersecurity firms leverage extensive resources to develop and promote robust solutions. On the other end, niche start-ups and pure players are driving rapid advancements in specialized areas. We expect this diversity to foster:<\/p>\n<ol style=\"text-align: justify;\">\n<li><strong>Innovation<\/strong>: Diversity in the market landscape, with contributions from both tech giants and pure players which enhances the pace and quality of innovation.<\/li>\n<li><strong>Fragmentation<\/strong>: smaller players may struggle to achieve the scale required to implement their solutions broadly<\/li>\n<li><strong>Partnerships<\/strong>: we are already witnessing how Thales and IBM are leveraging innovation in specific areas of pure players with their own resources and expertise.<\/li>\n<\/ol>\n<p style=\"text-align: justify;\">As the market matures, it will be exciting to follow how its landscape evolves.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h3 style=\"text-align: justify;\">Several open-source libraries\u2026 with Big Tech support<\/h3>\n<p style=\"text-align: justify;\">Already, several open-source libraries propose post-quantum cryptograph. The most high-profile libraries, such as OpenSSL, are not the most advanced on this, with their own implementations currently ongoing, while Open Quantum Safe\u2019s liboq is already ready. Nevertheless, it is a promising sight for the cybersecurity ecosystem that a topic as crucial as post-quantum security has solutions deeply rooted in open-source principles.<\/p>\n<p style=\"text-align: justify;\">Yet, Big Tech companies play a pivotal role in supporting open-source libraries for post-quantum cryptography, recognizing their potential to accelerate adoption and innovation. Initiatives like Open Quantum Safe\u2019s liboq has supporters that include Microsoft, Amazon and IBM; Bouncy Castle\u2019s PQC was developed with Keyfactor\u2019s sizeable participation, and Tink, Google\u2019s open-source library offer PQC as well. However, most of the implementation has not been fully formally verified, though the process is underway.<\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: revert; color: initial;\">\u00a0<\/span><\/p>\n<h3 style=\"text-align: justify;\">A lack of certification for HSMs\u2026<\/h3>\n<p style=\"text-align: justify;\">Hardware Security Modules (HSMs) play a crucial role in the digital trust chain, but the market for these hardware solutions is not yet ready. Initially, providers resorted to software implementations for experimental purposes while waiting for the new standard to be published by NIST. However, hardware implementations have advanced since then, even though their certification is not expected until Q3 or Q4 2025.<\/p>\n<p style=\"text-align: justify;\">Furthermore, although HSMs are designed to resist tampering and reduce the risks of key exposure, they will have to face challenges related to side-channel attacks due to the still limited maturity of current implementations of these new algorithms.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h3 style=\"text-align: justify;\">And a lack of hardware for IoT, embedded devices, and smart cards<\/h3>\n<p style=\"text-align: justify;\">The lack of hardware is particularly problematic for connected objects (IoT), embedded devices, and smart cards, which operate under severe constraints \u2013 limited power, reduced computing capacity, and restricted storage space \u2013 thus requiring efficient algorithms and specialized dedicated hardware for cryptographic operations. Unfortunately, the current absence of dedicated processors remains a major obstacle.<\/p>\n<p style=\"text-align: justify;\">Moreover, the decentralized nature of embedded devices will represent a considerable challenge to overcome, as upgrading legacy equipment will be complex and costly.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h3 style=\"text-align: justify;\">A strong market dynamism<\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-size: revert; color: initial;\">Post-quantum security is very much an emerging topic. Yet, today\u2019s market for solutions is extremely dynamic, Companies, governments, and institutions are mobilizing to address emerging risks, fueling a surge in innovative and specialized technological offerings. This momentum will be further accelerated by expected regulatory pressures, such as those from NIST, ASD, and ENISA, compelling organizations to adopt robust and compliant solutions.<\/span><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h3 style=\"text-align: justify;\">An international and sovereign Market: digital sovereignty at stake<\/h3>\n<p style=\"text-align: justify;\">The quantum computing market is both global and deeply intertwined with questions of national sovereignty. Quantum computers are considered a strategic issue by the world\u2019s leading nations, which invest hundreds of billions to ensure their sovereignty in that emergent field.<\/p>\n<p style=\"text-align: justify;\">On the other hand, the market for post-quantum security is framed in a much more international prism. Companies in our radar span many nations, with the U.S. being nevertheless the uncontested leader. Moreover, international partnerships have also taken place such as Thales, which partners with IBM, CryptoNext and many more to combine their respective expertise and provide clients with advanced solutions.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">A promising but incomplete market coverage<\/h2>\n<p style=\"text-align: justify;\">As we have covered, the market is extremely dynamic. The question remains whether the ecosystem\u2019s needs for a post quantum transition are currently met. Currently, there is a lack of true hardware post-quantum solutions, as most of what exists is only a post-quantum layer. Nevertheless, our understanding of the market is very much that it is under development and should be more and more available this year already. Based on how we advise clients in planning and implementing their migration, the market solutions address or will address shortly most of our client\u2019s needs.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">Our evolving radar constitutes the first edition in this field. In that sense, we strongly encourage any absent company to contact us to remedy the situation.<span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quantum computing threatens today\u2019s asymmetric cryptography and would render current algorithms obsolete, both RSA and ECC. As for symmetric cryptography, (AES, hash functions) doubling the key size ensures maintained security guarantees. To address the threat, the NIST has standardized three&#8230;<\/p>\n","protected":false},"author":15,"featured_media":25172,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3266,3977],"tags":[],"coauthors":[837,3578,4477,4612],"class_list":["post-25176","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security-en","category-focus"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Radar 2025 of Post Quantum Migration Solutions - RiskInsight<\/title>\n<meta name=\"description\" content=\"Wavestone&#039;s 2025 radar of post-quantum migration solutions offers a first visual overview of the market-leading solutions that support and accelerate this migration.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Radar 2025 of Post Quantum Migration Solutions - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Wavestone&#039;s 2025 radar of post-quantum migration solutions offers a first visual overview of the market-leading solutions that support and accelerate this migration.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-21T08:32:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-21T13:26:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/01\/quantum-computer-9218308_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois, Michel Girier, Johann Pl\u00fcss, Ma\u00ebl LEPROUST\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois, Michel Girier, Johann Pl\u00fcss, Ma\u00ebl LEPROUST\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Radar 2025 of Post Quantum Migration Solutions\",\"datePublished\":\"2025-01-21T08:32:04+00:00\",\"dateModified\":\"2025-04-21T13:26:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/\"},\"wordCount\":1162,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/01\/quantum-computer-9218308_1280.jpg\",\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/\",\"name\":\"Radar 2025 of Post Quantum Migration Solutions - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/01\/quantum-computer-9218308_1280.jpg\",\"datePublished\":\"2025-01-21T08:32:04+00:00\",\"dateModified\":\"2025-04-21T13:26:59+00:00\",\"description\":\"Wavestone's 2025 radar of post-quantum migration solutions offers a first visual overview of the market-leading solutions that support and accelerate this migration.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/01\/quantum-computer-9218308_1280.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/01\/quantum-computer-9218308_1280.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Radar 2025 of Post Quantum Migration Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Radar 2025 of Post Quantum Migration Solutions - RiskInsight","description":"Wavestone's 2025 radar of post-quantum migration solutions offers a first visual overview of the market-leading solutions that support and accelerate this migration.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Radar 2025 of Post Quantum Migration Solutions - RiskInsight","og_description":"Wavestone's 2025 radar of post-quantum migration solutions offers a first visual overview of the market-leading solutions that support and accelerate this migration.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/","og_site_name":"RiskInsight","article_published_time":"2025-01-21T08:32:04+00:00","article_modified_time":"2025-04-21T13:26:59+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/01\/quantum-computer-9218308_1280.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois, Michel Girier, Johann Pl\u00fcss, Ma\u00ebl LEPROUST","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois, Michel Girier, Johann Pl\u00fcss, Ma\u00ebl LEPROUST","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Radar 2025 of Post Quantum Migration Solutions","datePublished":"2025-01-21T08:32:04+00:00","dateModified":"2025-04-21T13:26:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/"},"wordCount":1162,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/01\/quantum-computer-9218308_1280.jpg","articleSection":["Cloud &amp; Next-Gen IT Security","Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/","name":"Radar 2025 of Post Quantum Migration Solutions - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/01\/quantum-computer-9218308_1280.jpg","datePublished":"2025-01-21T08:32:04+00:00","dateModified":"2025-04-21T13:26:59+00:00","description":"Wavestone's 2025 radar of post-quantum migration solutions offers a first visual overview of the market-leading solutions that support and accelerate this migration.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/01\/quantum-computer-9218308_1280.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/01\/quantum-computer-9218308_1280.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/01\/2025-radar-of-post-quantum-safety-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Radar 2025 of Post Quantum Migration Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/25176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=25176"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/25176\/revisions"}],"predecessor-version":[{"id":25872,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/25176\/revisions\/25872"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/25172"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=25176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=25176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=25176"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=25176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}