Skip to main content
Arrow Electronics, Inc.
Silicon wafer containing microchips
Article

Arrow Quick Hit: Secure organisations from threat with Quantum Safe IT

July 28, 2023 | Dave Waddell

Quantum computing and IBM Power: A safer future

What is quantum computing?

Quantum computing uses tiny particles called qubits instead of regular bits. Qubits can be both 0 and 1 simultaneously, allowing quantum computers to solve complex problems much faster than the technology many organisations use today.

Experts believe that quantum computers will change the face of cyber security in the coming years. Once quantum computers can reliably factor products of large prime numbers (the basis of current cryptography), existing cyber defense mechanisms will be rendered obsolete. While quantum computers are not strong enough (or stable enough) today to break into most encrypted data files and systems using current encryption technologies, experts predict they will be.

Updating current systems, solutions/software and infrastructure will take time, and it is important that businesses start today to protect their existing data and systems from the hackers who are stealing data today to break in tomorrow.

The IBM Power10 system provides the basis for a Quantum-safe computing platform as it helps protect the data created and stored on IBM Power10.

(click image for larger version)

Why should you care?

Quantum Safe technology leverages mathematical principles that are inherently resistant to quantum attacks. These algorithms, such as lattice-based cryptography, code-based cryptography and multivariate cryptography, provide a robust defense against quantum threats. IBM's research and development efforts in this area are focused on ensuring that these algorithms are efficient, secure, and compatible with existing infrastructure, enabling a smooth transition for organisations.

IBM's commitment to Quantum Safe technology extends beyond its Power architecture. The company is actively collaborating with industry partners, standard bodies, and academic institutions to drive the adoption and standardisation of quantum-resistant algorithms across various domains. By promoting open collaboration, IBM is fostering a community-driven approach to developing secure solutions that can withstand the computational power of quantum computers.

(click image for larger version)

How does Quantum Safe technology work?

Quantum Safe technology leverages mathematical principles that are inherently resistant to quantum attacks. These algorithms provide a robust defence against quantum threats. IBM's research and development efforts in this area are focused on ensuring that these algorithms are efficient, secure, and compatible with existing infrastructure, enabling a smooth transition for organisations.

IBM's commitment to Quantum Safe technology extends beyond its Power architecture. The company is actively collaborating with industry partners, standard bodies, and academic institutions to drive the adoption and standardisation of quantum-resistant algorithms across various domains. By promoting open collaboration, IBM is fostering a community-driven approach to developing secure solutions that can withstand the computational power of quantum computers.

Differentiation in the market

IBM Power and Quantum Safe technology offer a compelling solution to the imminent threat by quantum computers. By incorporating post-quantum cryptography algorithms into the Power architecture and driving industry-wide adoption, IBM is empowering organisations to protect their sensitive data and stay ahead of the quantum revolution. With their extensive research and commitment to innovation, IBM is poised to lead the way in creating a secure and quantum-resistant future.

How do you position and sell IBM Power and Quantum Safe?

Today, the risk of security incidents and potential breaches is higher than ever before. Breaches affect large numbers of financial organisations, healthcare organisations, public-sector entities and organisations in every industry. Effectively maintained and adaptable security programs can mitigate these risks and respond to incidents quickly.

Security has become the single most important requirement of a digital enterprise. When IDC surveys organisations about their priorities, security is invariably at or near the top of the list. Indeed, when asked, for example, to select the top AI infrastructure items that businesses feel are not optimal within their server and storage vendors or providers, security scores highest, with 30% saying that they are unhappy with the security features.1

Why IBM Power?

As businesses adapt to capitalise on digital, trust will be the currency that drives this new economy. Trust is why 44 of the top 50 banks and 90% of the largest airlines run on IBM Power systems.

System integrity has many facets, including the ongoing commitment to excellence in system security, design and development practices. These are all intended to prevent unauthorised application programs, subsystems and users from bypassing system security, preventing them from gaining access, circumventing, disabling, altering, or obtaining control of key system processes and resources unless allowed by the installation.

One of the firm's most valuable resources is its data, such as client lists, accounting data and employee information. This critical data must be securely managed and controlled and simultaneously made available to those users who are authorised to see it. The system can simultaneously share and protect the firm's data among multiple users. Capabilities for securing data moving over the network and within the Power system include:

  • Secure socket layers (SSL): Client-server authentication using encryption protocols.
  • Cryptography was built into the Power hardware (HW), providing exceptional performance and advanced functions using cryptographic coprocessors and specialised accelerators that address various encryption needs.

The Power system was designed for security. Security was designed into the processor, hypervisor, operating systems, communications, storage, applications and built-in hardware cryptography. Security features are designed specifically to help users comply with security-related regulatory requirements, including identity and access management, hardware (HW)and software (SW) encryption, communication security capabilities, and extensive logging and reporting of security events.

Engage your Arrow IBM team to help you position and sell IBM Power in the Quantum era.

(click image for larger version)

Arrow and IBM

Leverage cutting-edge technologies, increased revenue opportunities and enhanced sales and technical support when you become an IBM channel partner. Get ahead of the competition and propel your business to the next level.

Source
1. https://www.idc.com/getfile.dyn?containerId=IDC_P41414&attachmentId=47399864
Subscribe to Arrow Channel Advisor
Sign Up