The quantum-safe cryptography platform
PostQ provides a unified control plane to discover, migrate, and enforce post-quantum cryptography across your entire cloud infrastructure.
How PostQ fits into your stack
PostQ sits between your applications and key management systems, intercepting cryptographic operations and layering in post-quantum algorithms transparently.
Quantum Risk Scanner
PostQ scans your entire cloud environment to build a comprehensive map of cryptographic algorithm usage. It identifies every instance of RSA, ECC, and other quantum-vulnerable algorithms, then calculates a risk score and generates a prioritized migration plan.
- TLS certificate inventory across all endpoints
- Signing key algorithm analysis
- Encrypted storage cipher detection
- "Harvest now, decrypt later" risk assessment
- Prioritized remediation roadmap
72% of cryptographic operations use quantum-vulnerable algorithms
// Verify a hybrid signature
const result = await fetch("https://api.postq.io/v1/verify", {
method: "POST",
headers: {
"Authorization": "Bearer pq_live_...",
"Content-Type": "application/json"
},
body: JSON.stringify({
payload: "SGVsbG8gUXVhbnR1bSBXb3JsZA==",
signature: sig.combined,
key_id: "vault://signing/production"
})
});
const { valid, classical_valid, pq_valid } = await result.json();
// → valid: true (both components verified)Classical + post-quantum, combined
PostQ’s hybrid signing layer combines classical algorithms (Ed25519, ECDSA) with post-quantum algorithms (Dilithium, Falcon) in a single composite signature. If either algorithm is compromised, the other still protects your data.
Policy as code for cryptography
Define cryptographic policies in YAML and apply them across your entire infrastructure. Enforce rules like “no classical-only signatures in production” and get alerts when services deviate.
- Declarative YAML-based policy definitions
- Enforce, warn, or audit modes per rule
- Per-environment and per-service granularity
- Integration with Slack, PagerDuty, and webhooks
- Compliance reports for NIST SP 800-208
# postq-policy.yaml
apiVersion: postq.io/v1
kind: CryptoPolicy
metadata:
name: production-enforcement
spec:
environments:
- production
- staging
rules:
- name: require-hybrid-signing
action: enforce
match:
operation: sign
require:
algorithm_class: hybrid
- name: block-rsa-1024
action: deny
match:
algorithm: "RSA-1024"
- name: warn-classical-only
action: warn
match:
algorithm_class: classical
notify:
channel: "#security-alerts"Full visibility into your cryptographic posture
Track PQ adoption, monitor algorithm usage, and detect insecure patterns in real time across all your systems.
Ready to get started?
Run your first quantum risk scan and see exactly where your infrastructure is vulnerable.