F5 Launches Post-Quantum Cryptography Solutions to Protect Applications and APIs from Emerging Threats

The U.S. company incorporates PQC tools into its platform to anticipate the impact of quantum computing on cybersecurity.

F5, a leading provider of application delivery and security, has announced the launch of new integrated solutions for post-quantum cryptography (PQC) to help its clients prepare for the risks posed by the future arrival of quantum computing. These capabilities are now available on the F5 Application Delivery and Security Platform and are designed to protect sensitive data, maintain performance, and ensure compatibility with hybrid and multi-cloud environments.

The Quantum Threat is Approaching

Quantum computing represents a turning point in cybersecurity, as it promises to overcome the limitations of classical asymmetric encryption. According to a Gartner report, these algorithms are expected to be insecure by 2029 and completely vulnerable by 2034, forcing organizations to take action early.

“Post-quantum threats are not a problem for tomorrow, but a driving force for security modernization today,” said Kunal Anand, F5’s Chief Innovation Officer. “Our platform makes the adoption of PQC practical and realistic, enabling companies to fortify their applications and trust models without sacrificing performance.”

An Integrated and Scalable Approach

Unlike other piecemeal proposals, F5 offers a unified platform that combines application delivery and security, integrating post-quantum encryption on both the server and client sides. This hybrid architecture allows for a gradual transition that combines traditional algorithms with new standards defined by NIST, without causing disruptions to existing systems.

Additionally, F5 provides centralized visibility over encrypted traffic and all managed APIs and applications, enhancing threat detection and simplifying monitoring during the transition process.

Key Features of F5’s PQC Solutions

  • Validated post-quantum encryption: use of NIST-standardized algorithms to protect data, intellectual property, and operational assets.
  • End-to-end security: client-side encryption, in-transit protection, high-performance firewalls, and proactive threat analysis.
  • Multi-cloud and hybrid compatibility: ensures availability and efficiency of critical applications throughout the migration cycle.
  • Unified management: AI-driven assessment and automation tools to control the entire security ecosystem.
  • Simplified regulatory compliance: eases adaptation to evolving regulatory frameworks, such as GDPR and future quantum standards.

Paving the Way for a Secure Quantum Infrastructure

F5’s strategy also addresses a growing phenomenon known as “harvest now, decrypt later,” where malicious actors store encrypted data using current techniques, waiting to decrypt it when quantum computing allows. This directly impacts personal, financial, health records, and industrial secrets.

With its new offering, F5 not only protects against this scenario but also positions organizations to gradually adopt hybrid cryptographic models, ensuring a risk-free adaptation to the next major technological revolution.

Availability and Resources

The post-quantum cryptography preparedness solutions are already available as part of the F5 Application Delivery and Security Platform. The company has also released several supporting resources, including its transition guide to PQC and analyses of the state of post-quantum cryptography on the web.

With this step, F5 reaffirms its commitment to resilient application and API security for the future, anticipating one of the largest challenges of the digital era: the breaking of traditional cryptographic foundations due to the rise of quantum computing.

Source: f5.com

Scroll to Top