Open Pilot Shields Up is in open pilot — registrations are open and the platform is free to use during this phase. No credit card Full access Free during pilot Sign up free
Coming Q2/2026
Aligned with BSI · ANSSI · NIST · EU PQC Roadmap

Is your TLS ready for
the quantum era?

Inventory every quantum-vulnerable cipher, certificate, and key exchange across your entire external attack surface — before "Harvest Now, Decrypt Later" catches up with you.

Free during pilot No credit card Results in minutes
2033
CNSA 2.0 PQC deadline for national security systems — enforcement begins 2027 for new systems
FIPS 203 / 204 / 205
ML-KEM, ML-DSA, and SLH-DSA finalized by NIST in August 2024 — the post-quantum standards are here
Harvest Now, Decrypt Later
Encrypted traffic captured today can be broken retroactively once cryptographically relevant quantum computers arrive
NIS2 Article 21
EU essential and important entities must use state-of-the-art cryptography — regulators increasingly expect a documented PQC migration plan

Standards & frameworks we align with

🇩🇪
BSI
TR-02102 · PQC Migration Handbook
🇫🇷
ANSSI
PQC Transition Views · Hybrid mandate
🇪🇺
EU Commission
C(2024) 2393 · PQC Roadmap
🇪🇺
ENISA
Post-Quantum Cryptography Reports
🇪🇺
NIS2
Article 21 · State-of-the-art crypto
🇺🇸
NIST
FIPS 203 / 204 / 205

The first attack surface scanner built for the post-quantum migration

Two tools that turn the PQC migration from a research project into a checklist.

Coming Q2/2026

PQC Readiness Scanner

Every TLS endpoint you expose, classified as safe, hybrid, or vulnerable. ML-KEM, ML-DSA and SLH-DSA detection. Full certificate chain inspection. Weak key and legacy protocol alerts. Per-service drill-down and a board-ready readiness dashboard.

Coming Q2/2026

Hybrid-PQC Config Generator

Turn findings into fixes. Copy-paste-ready hardened configs for nginx, Apache, HAProxy, Caddy, Traefik, and Envoy — with X25519MLKEM768 hybrid key exchange built in and classic fallbacks handled.

Classification rules, in plain sight

Based on NIST FIPS 203/204/205 and current IETF hybrid key-exchange drafts. No black boxes.

Category Vulnerable Hybrid Safe
Key exchange RSA, DH, ECDHE X25519MLKEM768 ML-KEM-768 / 1024
Signatures RSA, ECDSA, Ed25519 ML-DSA, SLH-DSA
Certificates RSA-2048, ECDSA P-256 ML-DSA certificates
TLS versions 1.0, 1.1 1.2 (limited) 1.3 with PQC groups

You can't secure what you can't see

To inventory your quantum-vulnerable TLS, we first find every asset you own. The full ASM pipeline comes with it — at no extra cost.

Attack Surface Discovery

Map your external footprint end-to-end — domains, subdomains, IPs, open ports, and running services — from a single starting point.

Service Fingerprinting

Finds every TLS endpoint you own — the input that feeds the PQC scanner.

Vulnerability Scanning

A prioritized list of fixes for classic CVEs and misconfigurations — not a 10,000-row dump.

Continuous Monitoring

New TLS endpoint appears? Scanned immediately. Get alerted before attackers find it.

Built for Security Teams

A platform designed around the full recon workflow — from asset discovery to remediation.

Multi-Tenant Security

Enterprise-grade isolation with complete data separation and organization-level access controls.

Actionable Insights

Not just data — get prioritized recommendations and clear remediation steps for every finding.

API Access

RESTful API for seamless integration with your existing security workflows and tooling.