Certes v7 Offers Rapid Quantum-Safe Shield for Legacy and Edge Data

📊 Key Data
  • $7.8 billion: Projected market size for Post-Quantum Cryptography (PQC) by 2030
  • Days, not years: Time required to deploy Certes v7 for quantum-safe encryption
  • 2030s (or late 2020s): Expert consensus on the arrival of quantum computers capable of breaking current encryption
🎯 Expert Consensus

Experts agree that Certes v7 provides a pragmatic, rapid solution for securing legacy and edge data against quantum threats, emphasizing data-centric protection over infrastructure-focused security.

4 days ago

Certes v7 Offers Rapid Quantum-Safe Shield for Legacy and Edge Data

PITTSBURGH, PA – April 09, 2026 – As the countdown to "Q-Day"—the moment a quantum computer can break today's encryption—grows louder, cybersecurity firm Certes has launched a new platform aimed at making quantum-safe data protection a present-day reality, not a future overhaul. The company today released v7, a significant extension of its Data Protection and Risk Mitigation (DPRM) platform, promising to secure any application, across any infrastructure, from the data center to the vulnerable network edge.

The release challenges a common industry roadblock: the belief that preparing for the quantum era requires years of complex, expensive projects to rewrite legacy applications or redesign networks. Certes claims its v7 platform can be deployed in days, enforcing quantum-resistant encryption and granular segmentation without demanding a single line of code be changed. This positions the 20-year industry veteran as a pragmatic choice in a market bracing for a paradigm shift in digital security.

The Looming Quantum Threat and a Pragmatic Defense

The urgency driving solutions like v7 stems from the "harvest-now, decrypt-later" threat. Adversaries, including nation-states, are believed to be exfiltrating and storing vast amounts of encrypted data today, betting on the future availability of a quantum computer to unlock its secrets. With expert consensus placing the arrival of such a machine in the early 2030s, and some projections suggesting even the late 2020s, the window for action is closing. The Post-Quantum Cryptography (PQC) market is responding, with projections showing it could surpass $7.8 billion by 2030.

Certes' strategy is to shift the security focus inward, from protecting infrastructure to protecting the data itself. "For too long, cybersecurity has focused on protecting infrastructure and identities, yet attackers continue to bypass those controls," said Paul German, CEO of Certes, in the company's announcement. "The reality is that organizations must now assume breaches will occur and focus on protecting the data itself."

This philosophy is embedded in v7, which applies quantum-safe encryption to individual data flows. The platform is designed to ensure that even if an attacker compromises a network or steals credentials, the data they access remains a useless, encrypted block. This approach directly counters the "harvest-now" strategy by rendering stolen data unreadable both today and in a post-quantum future.

Securing the Unsecurable: Legacy Systems and the Edge

One of the most significant challenges in the migration to PQC is the vast number of legacy applications critical to business operations that cannot be easily updated. Certes v7 aims to solve this by creating a protective layer around these systems without altering them. By intercepting and securing data flows to and from these applications, the platform extends modern, quantum-safe protection to systems that would otherwise remain vulnerable.

This capability is equally critical for the rapidly expanding and notoriously insecure network edge. Edge environments, comprising everything from IoT sensors to remote operational technology, are often resource-constrained and physically exposed, making them prime targets. Traditional perimeter defenses are ill-suited for this distributed landscape.

"Traditional security controls do less than half the job because they focus on defending the network rather than the data," noted Certes CTO Simon Pamplin. The v7 platform extends its per-flow encryption and segmentation directly to these endpoints. This "crypto-segmentation" ensures that a breach on one device is contained, preventing an attacker from moving laterally across the network. The data remains protected, even if the device itself is compromised.

Redefining Control with Data Sovereignty and Crypto-Agility

In an era of stringent data privacy regulations and residency requirements, proving control over data is paramount. Certes v7 emphasizes data sovereignty, giving organizations ownership of their own post-quantum encryption keys. According to the company, these keys are never visible to cloud providers like AWS, Azure, or GCP, nor to other third parties. This provides organizations with demonstrable proof of who can decrypt sensitive data and where, a critical component for meeting compliance mandates like GDPR and ensuring control in multi-cloud environments.

Furthermore, the platform is built to be "crypto-agile." The world of post-quantum cryptography is still evolving, with standards bodies like NIST finalizing their recommendations. Rather than locking customers into a single cryptographic algorithm, v7 is designed to adapt. This allows organizations to implement quantum-safe protections today with the confidence that they can evolve their cryptography as standards mature, without needing to re-architect their systems.

"With v7 we help boards and CISOs move to quantum–safe data protection in weeks, not years, without refactoring applications, redesigning networks and infrastructure, or grinding operations to a halt," stated Dan Panesar, CRO at Certes. "This is about protecting what matters, cutting operational drag, and materially reducing financial risk, not funding another science project."

A Data-Centric Shift in a Crowded Market

Certes enters a bustling PQC market populated by a mix of established players and specialized startups focusing on everything from quantum hardware to orchestration platforms. However, its distinct focus on a rapidly deployable, data-centric software solution for complex enterprise environments, including legacy and edge systems, carves out a specific niche. The platform also extends its protection to the data flowing into and out of AI engines, securing training data and model interactions in hybrid environments.

By focusing on making data inherently secure and unusable to attackers, Certes argues that organizations can significantly reduce the blast radius and financial fallout of an inevitable breach. The v7 release is a clear statement that the tools to prepare for the quantum threat are available now, offering a path for businesses to protect their most valuable asset without waiting for a complete digital transformation.

📝 This article is still being updated

Are you a relevant expert who could contribute your opinion or insights to this article? We'd love to hear from you. We will give you full credit for your contribution.

Contribute Your Expertise →
UAID: 25396