Certes has launched v7 of its Information Safety and Threat Mitigation (DPRM) platform, extending post-quantum cryptography (PQC) safety to the sting and positioning the replace as a direct response to the rising “harvest now, decrypt later” menace going through enterprise safety groups.
The discharge addresses a particular assault sample that has been gaining traction amongst nation-state and superior persistent menace actors: the majority exfiltration of at present encrypted knowledge, stockpiled in anticipation of commercially viable quantum computing, usually referred to within the business as “Q-Day.” Certes argues that organisations which haven’t already moved to quantum-resistant encryption are accumulating cryptographic debt which will show catastrophic as soon as that threshold is crossed.
“For too lengthy, cybersecurity has centered on defending infrastructure and identities, but attackers proceed to bypass these controls. The fact is that organisations should now assume breaches will happen and give attention to defending the information itself.” – Paul German, CEO, Certes
The v7 replace introduces per-flow quantum-safe encryption and cryptographic segmentation enforced throughout on-premises, hybrid cloud, and edge environments. Certes says the platform could be deployed in days quite than months, with no software refactoring required, a big declare on condition that legacy software modernisation is steadily cited by CISOs as one of many main blockers to adopting newer cryptographic requirements.
Critically, v7 maintains customer-owned post-quantum keys which can be by no means uncovered to cloud suppliers, together with AWS, Azure, GCP, or Oracle, a function the corporate frames as addressing knowledge sovereignty necessities more and more demanded by regulators throughout monetary companies, healthcare, and important nationwide infrastructure sectors.
CTO Simon Pamplin described the core architectural shift: conventional controls give attention to community perimeter defence, whereas v7 brings encryption and segmentation to the endpoint stage. The impact, he argued, is that even a profitable breach doesn’t translate into usable stolen knowledge, as a result of attackers can’t decrypt what they’ve exfiltrated.
The platform additionally extends safety to AI workloads, securing coaching knowledge, prompts, and mannequin interactions as they traverse hybrid cloud environments, an more and more related consideration as organisations combine third-party AI infrastructure into delicate operational pipelines.
On the operational aspect, Certes claims v7 reduces the “blast radius” of a breach by way of cryptographic micro-segmentation, containing lateral motion and limiting the regulatory fallout that sometimes follows an information exfiltration incident beneath GDPR, NIS2, and sector-specific frameworks.
v7 is accessible instantly as a part of the Certes DPRM platform.

