Inventory every quantum-vulnerable cipher, certificate, and key exchange across your entire external attack surface — before "Harvest Now, Decrypt Later" catches up with you.
Standards & frameworks we align with
Quantum Readiness
Two tools that turn the PQC migration from a research project into a checklist.
Every TLS endpoint you expose, classified as safe, hybrid, or vulnerable. ML-KEM, ML-DSA and SLH-DSA detection. Full certificate chain inspection. Weak key and legacy protocol alerts. Per-service drill-down and a board-ready readiness dashboard.
Turn findings into fixes. Copy-paste-ready hardened configs for nginx, Apache, HAProxy, Caddy, Traefik, and Envoy — with X25519MLKEM768 hybrid key exchange built in and classic fallbacks handled.
What we detect
Based on NIST FIPS 203/204/205 and current IETF hybrid key-exchange drafts. No black boxes.
| Category | Vulnerable | Hybrid | Safe |
|---|---|---|---|
| Key exchange | RSA, DH, ECDHE | X25519MLKEM768 | ML-KEM-768 / 1024 |
| Signatures | RSA, ECDSA, Ed25519 | — | ML-DSA, SLH-DSA |
| Certificates | RSA-2048, ECDSA P-256 | — | ML-DSA certificates |
| TLS versions | 1.0, 1.1 | 1.2 (limited) | 1.3 with PQC groups |
Built on a full attack surface pipeline
To inventory your quantum-vulnerable TLS, we first find every asset you own. The full ASM pipeline comes with it — at no extra cost.
Map your external footprint end-to-end — domains, subdomains, IPs, open ports, and running services — from a single starting point.
Finds every TLS endpoint you own — the input that feeds the PQC scanner.
A prioritized list of fixes for classic CVEs and misconfigurations — not a 10,000-row dump.
New TLS endpoint appears? Scanned immediately. Get alerted before attackers find it.
Why Shields Up
A platform designed around the full recon workflow — from asset discovery to remediation.
Enterprise-grade isolation with complete data separation and organization-level access controls.
Not just data — get prioritized recommendations and clear remediation steps for every finding.
RESTful API for seamless integration with your existing security workflows and tooling.