Inteligencia artificial 

Acelerador de productividad. Catalizador de innovación. Colaborador creativo. Sea cual sea su visión de la IA, Unisys proporciona las soluciones, la experiencia y las herramientas para lograr todo el potencial empresarial de su organización.
Explorar

Optimización logística

Mantenga la carga en movimiento, a pesar de las interrupciones. Descubra cómo los modelos de IA pendientes de patente que utilizan datos en tiempo real pueden ahorrar tiempo y aumentar los ingresos al mejorar la utilización de la capacidad, la planificación de rutas y la gestión del inventario.
Explorar

Consultoría

The nature of work is changing. Let's evolve your business together. Future-proof your organization with consulting services from Unisys and advance as a digital-first entity.
Explorar

Industrias

Tu sector te diferencia. Tiene una visión clara del camino por delante. Vamos a unir fuerzas y hacer realidad esa visión. Unisys aporta los conocimientos técnicos para complementar su amplia experiencia.
Explorar

Historias de clientes

Explore vídeos e historias donde Unisys ha ayudado a empresas y gobiernos a mejorar las vidas de sus clientes y ciudadanos.
Explorar

Investigación

Embárquese en un viaje hacia un futuro resiliente con acceso a la investigación integral de Unisys, desarrollada en colaboración con los principales analistas del sector y empresas de investigación.
Explorar

Centro de recursos

Encuentre, comparta y explore activos que respalden sus objetivos operativos clave.
Explorar

Carreras

Curiosidad, creatividad y un deseo constante de mejorar. Nuestros asociados dan forma al mañana yendo más allá de la experiencia para dar vida a las soluciones.
Explorar

Relaciones con los inversionistas

Somos una empresa global de soluciones tecnológicas dedicada a impulsar el progreso para las principales organizaciones del mundo.
Explorar

Socios

Colaboramos con un ecosistema de socios para ofrecer a nuestros clientes productos y servicios de vanguardia en muchas de las industrias más grandes del mundo.
Explorar

Opciones de idiomas

Idioma seleccionado:

Español
7 Min Read

Tools and techniques for gaining effective cryptographic visibility

marzo 18, 2025 / Ranga Sai Manduva

Short on time? Read the key takeaways:

  • Understanding your cryptographic landscape is the first and most crucial step when setting strategies for post-quantum cryptography (PQC). 
  • Comprehensive visibility into your cryptographic landscape lets you analyze and assess your assets’ quantum vulnerabilities.  
  • Identifying the right cryptographic asset discovery method makes assessing your organization’s cryptographic posture easier. 
  • The digital twin platform is a PQC readiness evaluation technique that allows organizations to simulate the impact of transitioning to PQC algorithms. 

The race to achieve quantum resiliency features several hurdles. Adopting the right strategies can put you leaps ahead of your peers and competitors.

The incentive for this race is that data secured with current cryptographic methods are at risk from future quantum threats. Post-quantum cryptography (PQC) advocates and cybersecurity experts advocate for a deeper understanding of your assets to protect them.

Cryptographic visibility is key for an organization’s preparedness for PQC along with digital twins, which provide additional ammunition for a better success rate in PQC transition. 

The quantum security threat is serious, but organizations with a detailed cryptographic inventory can prioritize their PQC migration efforts more effectively to achieve higher success rates. The inventory can provide the necessary understanding of how cryptographic assets are used within their business and the potential risks and vulnerabilities.

Taking an inventory of all cryptographic assets 

A complete cryptographic inventory should list all of your organization’s managed data, all cryptographic assets, both hardware and software, and all suppliers providing cryptographic assets. Keeping the asset information as granular as possible will help you determine if the asset might be vulnerable to quantum attacks and help identify the appropriate quantum-resistant solution.

For an effective quantum threat assessment, document these details of your cryptographic assets: 

  • Asset type (hardware, software, network, infrastructure, etc.) 
  • Cryptographic algorithms and protocols in use (AES-128, SHAv2, TLSv1.2, etc.) 
  • Key length usage (RSA-2048, etc.) 
  • Ownership details of the asset (department, supplier, etc.) 
  • Certificate details (type, validity, etc.) 
  • Attack surface (vulnerabilities, threats and impact score, etc.) 

And document these details for data assets: 

  • Type of data (data in transit, data at rest or data in use) 
  • Location of the data 
  • Value of the data (confidentiality, availability and lifespan) 

The method and tools you choose to discover the organization’s cryptographic assets will depend on the scope of your inventory. However, for a comprehensive cryptographic asset inventory, take time to discover the cryptography usage at all open systems interconnection levels, including the application, session and network levels. Installing agent software on target systems, such as servers, endpoints and containers, supports the detection and classification of cryptographic assets. This software works best for active scanning, while agentless and telemetry-based tools are most effective for passive scanning. When installing agents is impractical, use passive scanning. It also lets you gather insights for a wide range of assets.

To achieve complete cryptographic landscape visibility, consider collecting additional telemetry and logs from other security infrastructure, such as key stores, PKI systems for certificates, and credential vaults. This view allows organizations to evaluate compliance with cryptographic policies and eventual gaps or even discover unknown cryptography methods and assets. 

After gaining visibility into your cryptographic assets through the ongoing discovery process, the next step is to assess each asset’s risk from quantum threats. As business evolves, so does the cryptographic landscape, and you need to update your inventory and safeguard it from unauthorized access. 

Preparing for PQC with the digital twin platform 

After understanding and prioritizing the risk from quantum threats, you must select the appropriate risk mitigation strategy. This reduces the impact on business operations during the transition. One strategy is to adopt a digital twin platform as a PQC readiness evaluation technique. It builds a virtual representation of systems mirroring your organization’s real-world infrastructure. This lets you safely conduct what-if analysis and test quantum-resistant solution strategies for their PQC transition. 

Use this platform to simulate different attack scenarios and gauge their impact. Digital twins can also be used to test and validate new cryptographic algorithms for interoperability and performance issues before deployment.

The digital twin approach increases your PQC preparedness by providing the following: 

  • Comprehensive risk assessment to detect cryptographic “hotspots” where quantum threats pose the biggest risk 
  • Evaluation of cryptographic dependence and interoperability with existing infrastructure 
  • Risk-free simulation environment to study the impact of moving toward PQC algorithms and define the best migration path 
  • Performance validation to simulate the impact on performance when increasing key sizes or latency in key exchanges and identify bottlenecks 
  • Live data from real-world environments to inform your migration planning 
  • Support of your ability to build failure playbooks for increased operational readiness 
  • Detailed compliance reporting of the current model and the future model 

Take steps toward a more quantum-resilient future 

Effective and efficient cryptographic posture discovery tools can boost your readiness for emerging quantum threats. While current PQC algorithms offer promising resistance to quantum attacks, their practical limitations — such as large key sizes, performance overhead and emerging implementation — highlight the need for careful planning during adoption.

Unisys’ cryptographic posture assessment uses a comprehensive assessment methodology that includes the digital twin platform. It allows you to simulate, test and validate the different aspects of your PQC transition before finalizing the strategy. This prepares you for quantum and reduces the failure risks, putting you on the path toward quantum resiliency.