Enterprise Cryptography Platform

Cryptography Discovery,
Inventory & Management

Discover your cryptographic assets across enterprise systems. Assess quantum risk. Plan your post-quantum migration โ€” powered by AI.

4 Data Sources
10+ Risk Factors
AI Powered Analysis
3 Migration Phases

The Quantum Threat Is Real

Quantum computers will break RSA, ECDSA, and other widely-used cryptographic algorithms. Organizations need to discover what cryptography they're using, understand the risk, and plan their migration to quantum-safe alternatives.

Most enterprises don't have visibility into their cryptographic inventory. pqAgility changes that.

๐Ÿ”“

HNDL Threat

Harvest Now, Decrypt Later โ€” attackers record encrypted traffic today to decrypt when quantum computers arrive

โœ๏ธ

TNFL Threat

Trust Now, Forge Later โ€” long-lived signing certificates become forgeable once quantum breaks the algorithm

Two Complementary Approaches

Top-down architecture modeling meets bottom-up operational discovery

๐Ÿ—๏ธ

Top-Down

Enterprise Architects

Model desired cryptographic architecture using the ArchiMate toolkit with CycloneDX CBOM integration. Define target state and track compliance.

๐Ÿ”

Bottom-Up

Security Operations

Discover and catalog actual cryptographic assets from production systems. Assess risk in real-time and track remediation progress.

Platform Capabilities

Everything you need to manage your cryptographic landscape

Multi-Source Ingestion

Ingest from CycloneDX CBOM, Qualys, AWS S3, and ServiceNow CMDB. Connectors, API integrations, and manual upload.

CBOMQualysAWSCMDB

Risk Assessment

Animated radar visualization with 10+ risk factors. Quantum vulnerability detection, HNDL/TNFL threat identification, weak cipher detection.

ScoringHNDLTNFLRadar

AI-Powered Analysis

RAG pipeline with Qdrant vector search. Ask natural language questions about your cryptographic inventory. Powered by OpenAI.

RAGLLMQdrantFreeform

Architecture Visualization

Mermaid-based diagrams per application with risk-color-coded nodes. Infrastructure topology with crypto protocol annotations.

MermaidTopologyRisk Colors

Asset Correlation

Deterministic matching by hostname, fingerprint, and bomRef. Semantic fallback via vector embeddings for unlinked assets.

HostnameFingerprintSemantic

Migration Planning

Phased PQC migration roadmap. Per-application plans with algorithm replacement recommendations (ML-KEM-768, ML-DSA-65).

3 PhasesML-KEMML-DSA

ArchiMate Export

Export to Archi-compatible XML with 7 crypto specialization types. Custom icon set and jArchi automation scripts.

ArchiMate7 TypesjArchi

CBOM Support

Full CycloneDX 1.6 Cryptographic Bill of Materials support. Import/export scripts for CI/CD pipeline integration.

CycloneDXv1.6CI/CD

How It Works

From raw data to actionable migration plans in four steps

1

Ingest

Upload or connect data sources โ€” CBOM, Qualys SSL scans, AWS S3 inventories, CMDB exports. Each source has a dedicated parser with validation.

โ†’
2

Correlate

Assets are normalized to a common schema, stored with vector embeddings, then linked across sources using deterministic and semantic matching.

โ†’
3

Assess

Each asset is scored on algorithm strength, protocol version, key length, certificate expiry, service criticality, and quantum threat exposure.

โ†’
4

Migrate

Generate phased migration roadmaps, architecture diagrams, ArchiMate exports, and use AI to answer questions about your crypto landscape.

See It In Action

Dark-themed UI built with React, Material UI, and custom SVG visualizations

Risk Dashboard with animated radar visualization

Risk Dashboard

Animated concentric-ring radar with severity-proportional arcs, risk cards, and detailed findings

Data source connectors and integrations

Data Sources

Connector cards, API integrations, manual upload, and data source usage summary

Mermaid-based architecture diagram with risk coloring

Architecture View

Per-application Mermaid diagrams with risk-color-coded nodes and protocol annotations

ArchiMate XML export

ArchiMate Export

Export architecture to Archi-compatible XML with crypto specialization types

Supported Data Sources

Ingest from the tools your organization already uses

๐Ÿ“œ

CycloneDX CBOM

Certificates, algorithms, keys, and protocols from your software bill of materials

๐Ÿ”’

Qualys

TLS/SSL configuration scanning with vulnerability and cipher suite detection

โ˜๏ธ

AWS S3

Cloud storage encryption status, KMS key configuration, and bucket inventory

๐Ÿข

ServiceNow CMDB

Business context โ€” ownership, service tier, data classification, and hostnames

Tech Stack

Modern, production-ready architecture

Frontend React 18 ยท TypeScript ยท Material UI ยท Mermaid.js
Backend NestJS ยท TypeScript ยท TypeORM
Database PostgreSQL ยท JSONB for flexible asset storage
Vector DB Qdrant ยท Semantic search for RAG pipeline
AI OpenAI API (configurable) ยท RAG pipeline
Architecture Archi + jArchi ยท ArchiMate modeling toolkit
Testing Jest ยท fast-check (property-based testing)
Infrastructure Docker Compose ยท Full stack orchestration

Get Started in Minutes

Docker Compose brings up the full stack โ€” PostgreSQL, Qdrant, backend, and frontend

Terminal
# Start all services
docker-compose up -d

# Frontend: http://localhost:3001
# Backend API: http://localhost:3000

# Load sample data (15 apps, 72 assets)
# Upload files from examples/ via the Data Sources tab
Request a Demo

Get In Touch

Interested in pqAgility for your organization? Have questions about post-quantum migration? We'd love to hear from you.