Cybersecurity 2026Updated

List of Post-Quantum Cryptography Solution Vendors

Directory of vendors offering quantum-resistant cryptographic solutions, including PQC algorithm implementations, crypto-agility platforms, hybrid migration tooling, and quantum-safe HSMs for enterprises preparing for the post-quantum transition.

Available Data Fields

Company Name
Headquarters
Solution Type
PQC Algorithms Supported
Target Sector
Hardware/Software
Compliance Standards
Integration Type
Certifications
API / SDK Available

Data Preview

* Full data requires registration
Company NameHeadquartersSolution TypePQC Algorithms
PQShieldOxford, UKPQC IP for hardware & softwareML-KEM, ML-DSA, SLH-DSA
ISARA CorporationWaterloo, CanadaCrypto-agility & certificate managementML-KEM, ML-DSA, XMSS
EntrustShakopee, MN, USAPKI platform & HSMsML-KEM, ML-DSA, SLH-DSA
CryptoNext SecurityParis, FranceDiscovery, remediation & migration platformML-KEM, ML-DSA, FrodoKEM
QuSecureSan Mateo, CA, USAOrchestration layer for PQC deploymentML-KEM, ML-DSA, BIKE

100+ records available for download.

* Continue from free preview

Understanding the Post-Quantum Cryptography Vendor Landscape

The NIST finalization of ML-KEM (FIPS 203), ML-DSA (FIPS 204), and SLH-DSA (FIPS 205) in 2024 transformed post-quantum cryptography from a research topic into an urgent procurement decision. With the U.S. government estimating a $7.1 billion spend on PQC migration and executive mandates setting 2035 as the deadline for federal systems, CISOs at financial institutions and government contractors face a narrowing window to evaluate and select vendors.

Vendor Categories

The PQC vendor ecosystem breaks into distinct categories, each addressing different layers of the migration challenge:

Cryptographic IP Providers
Companies like PQShield and Xiphera supply hardware and software IP cores implementing NIST-standardized algorithms. These are embedded into chips, firmware, and applications by semiconductor manufacturers and device OEMs.
Crypto-Agility Platforms
Vendors such as ISARA, Keyfactor, and InfoSec Global offer platforms that discover existing cryptographic assets, assess quantum vulnerability, and orchestrate phased migrations — critical for organizations with thousands of certificates and keys to rotate.
Enterprise Security Suites
Established players including Thales, Entrust, and DigiCert have integrated PQC algorithms into their existing PKI, HSM, and certificate management products, offering hybrid certificates that combine classical and quantum-resistant algorithms during the transition period.
Network-Layer PQC
QuSecure, Quantum Xchange, and similar vendors deploy PQC at the network transport layer, protecting data in transit without requiring application-level changes — a pragmatic first step for many organizations.

Key Selection Criteria for CISOs

CriterionWhy It Matters
Algorithm agilityNIST may update standards; vendors must support algorithm swaps without re-architecting
Hybrid mode supportRunning classical + PQC in parallel ensures backward compatibility during migration
FIPS 140-3 validationRequired for U.S. federal and financial sector deployments
Discovery & inventoryYou cannot migrate what you cannot find — cryptographic asset visibility is step one
Performance overheadPQC key sizes and signature sizes are larger; hardware acceleration matters for latency-sensitive applications

Market Dynamics

The PQC market is projected to grow from $0.42B in 2025 to $2.84B by 2030 (CAGR 46.2%). Five major players — NXP, Thales, AWS, Palo Alto Networks, and IDEMIA — currently hold 59–70% market share, but specialized vendors are gaining ground with purpose-built solutions that larger platforms cannot replicate. The "harvest now, decrypt later" threat means organizations handling long-lived sensitive data — financial records, health data, classified information — face the most acute urgency.

Frequently Asked Questions

Q.Which NIST-standardized PQC algorithms does the dataset track?

The dataset covers vendors implementing ML-KEM (FIPS 203), ML-DSA (FIPS 204), and SLH-DSA (FIPS 205), as well as those supporting additional candidates like BIKE, HQC, and Classic McEliece. Algorithm support is captured per vendor so you can filter by specific standards.

Q.How is vendor data collected and how current is it?

When you request a download, AI crawls public sources — vendor websites, NIST validation lists, press releases, and technical documentation — to compile the latest information. This is not a static database; data is gathered fresh at request time from publicly available information.

Q.Does the dataset include pricing or contract terms?

No. PQC vendor pricing is typically under NDA and varies significantly by deployment scale. The dataset focuses on technical capabilities, supported algorithms, integration methods, and compliance certifications that inform your initial vendor shortlist.

Q.Can I filter vendors by deployment model (on-premise vs. cloud)?

Yes. Each vendor entry indicates whether solutions are available as on-premise software, hardware appliances, cloud-hosted services, or as embeddable IP cores, allowing you to match against your infrastructure requirements.

Q.How do you distinguish PQC-native vendors from legacy security companies adding PQC features?

The dataset captures both. Each entry indicates whether PQC is the vendor's core product or an extension of existing security infrastructure. Both categories serve different migration strategies — greenfield PQC deployments versus integration into established security stacks.