Cryptographic Observability
for the Quantum Era

You can't migrate what you can't see.

A distributed cryptographic observability platform that unifies static and runtime analysis across hybrid infrastructure — enabling enterprise-grade CBOM governance at scale.

CycloneDX · NIST PQC Standards · GPL 3.0 · GitHub

What you configure ≠ what runs in production

Static analysis tells you what should be there. Runtime tells you what actually is. The gap between them is where risk lives.

⚙️

Configuration says TLS 1.3

vs

Production servers negotiating TLS 1.2 with RSA-2048 due to client compatibility fallbacks.

📦

SBOM lists OpenSSL 3.2

vs

Containers running OpenSSL 1.1.1 from a cached base image with known vulnerabilities.

🔑

Policy mandates AES-256-GCM

vs

Legacy microservices still calling 3DES through deprecated library paths at runtime.

How It Works

CipherIQ deploys distributed collectors and correlators that continuously map and verify cryptography across your estate — from cloud and data center to OT, embedded, and endpoint systems.

1

Scan

Static Discovery & CBOM

Analyze filesystems, firmware, and containers. Generate a CycloneDX Cryptographic Bill of Materials. Classify every algorithm against 48+ NIST PQC standards.

2

Monitor

Runtime eBPF + Network

Zero-overhead kernel tracing of actual cryptographic operations. Passive network analysis of TLS, SSH, IKEv2, and QUIC. See what's really running.

3

Correlate

Drift Detection

Match static assets against runtime observations. Detect configuration drift, shadow crypto, and migration gaps. Alert on policy violations in real time.

Why CipherIQ

🔍

Dual-Layer Visibility

Static + runtime analysis in one platform. No other tool gives you both what's configured and what's actually executing.

🔓

Open-Core Model

Four open-source tools under GPL 3.0. Start free, scale to enterprise when you're ready. No vendor lock-in on your data.

📐

Standards-Based

Built on CycloneDX CBOM and NIST PQC standards. Every output is interoperable, auditable, and future-proof.

🛡️

Production-Safe

Read-only eBPF probes. Passive network capture. Zero performance impact. Designed for production from day one.

Built for the Teams That Need It Most

🛡️

Security & Risk Teams

Full cryptographic asset visibility across hybrid infrastructure. Identify weak algorithms and shadow cryptography before they become incidents.

📋

Compliance & Audit Officers

Continuous compliance evidence and audit-ready reports. Map cryptographic posture directly to regulatory framework controls.

🏗️

Infrastructure Architects

Understand cryptographic dependencies across services, networks, and endpoints. Plan PQC migration with data-driven prioritization.

DevSecOps & Platform Engineering

Integrate cryptographic observability into CI/CD pipelines. Lightweight agents deploy with zero application changes.

Built for Critical Infrastructure

Enable audit-ready evidence for regulatory frameworks such as HIPAA, SOX, CNSA 2.0, and long-term PQC readiness for critical infrastructure. Emphasize evidence and governance — not just compliance names.

IoT & OT

Continuous cryptographic inventory for devices with 20–30 year lifecycles. Generate evidence of PQC readiness across firmware, embedded systems, and industrial control networks.

UN R155 · IEC 62443

Healthcare

Audit-ready cryptographic posture reporting for patient data with 50+ year retention. Automated evidence generation for HIPAA compliance and quantum-safe requirements across medical devices.

HIPAA · FDA

Financial Services

Cryptographic governance for transaction security and long-lived financial records. Continuous compliance evidence for SOX and PCI DSS, with harvest-now-decrypt-later risk assessment.

SOX · PCI DSS

Government & Defense

Full CNSA 2.0 compliance tracking with migration evidence and attestation reports. Measurable PQC readiness scores and roadmaps for national security system migration by 2033.

CNSA 2.0 · NIST

The quantum risk isn't coming — it's already here.

"Harvest now, decrypt later" attacks mean your encrypted data is being collected today for decryption by future quantum computers. The migration timeline is measured in years, not months.

2024
NIST finalizes first PQC standards
(ML-KEM, ML-DSA, SLH-DSA)
2027
CNSA 2.0 Phase 1: Software & firmware
must support PQC algorithms
2033
CNSA 2.0 Phase 2: Full PQC-only
for national security systems
2035
Projected: Cryptographically-relevant
quantum computers operational

Open Source + Commercial

Start with free tools. Scale with the enterprise platform.

Open Source

Free forever
  • cbom-generator — static CBOM discovery
  • cbom-explorer — web-based visualization
  • crypto-tracer — eBPF runtime monitoring
  • pqc-flow — passive network analysis
  • CycloneDX standard output
  • PQC classification (48+ algorithms)
  • GPL 3.0 license
  • Community support
View on GitHub

Ready to see your cryptographic posture?

Get complete visibility into what's configured, what's running, and where the gaps are.