skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration

Introduction

The quantum computing advances made over the past couple of years have led to the pronouncement of "Q-day" – the day a quantum computer will be able to break any current encryption in seconds.

Highlights

  • This report explores how a new, different approach of quantum key exchange can provide a quantum-resistant security solution today.

Features and Benefits

  • Discover how Quantum Xchange provides a secure way to protect data in a post-quantum computer era
  • Understand how Quantum Xchange uses trusted nodes to extend the range of a dark fiber network so that it can transmit a photon over 100km.

Key questions answered

  • What are the key security risks in a quantum computing era?
  • What technologies are quantum resistant?

Table of contents

Summary

  • Catalyst
  • Key messages
  • Ovum view

Recommendations for enterprises

  • Why put Quantum Xchange on your radar?

Highlights

  • Background
  • Current position

Data sheet

  • Key facts

Appendix

  • On the Radar
  • Author

Recommended Articles

;

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700


Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

Email us at ClientServices@ovum.com

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Call us at +44 788 597 5160 or email us at pr@ovum.com

Contact marketing - 
marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now