QNSP

QNSP

Start building free

Platform architecture

18 Production Services. Hardware Enclaves. Unified Policy.

End-to-end quantum-native security: PQC-TLS termination, HSM-integrated KMS, encrypted storage (SSE-X), secrets vault, signed audit trails, and AI orchestration — deployed as a single coherent platform.

18Production services
8Enclave types
93PQC algorithms
15TypeScript SDKs
4HSM vendors

18 Production Services

Edge Gateway, Auth Service, Vault Service, Storage Service, Search Service, Tenant Service, Billing Service, KMS Service, Audit Service, Access Control Service, Security Monitoring Service, Observability Service, AI Orchestrator, AI Intelligence Service, Crypto Inventory Service, Platform API, Terraform Provisioner, PQC-TLS Canary — all deployed as optimized containers (~85 MB average) to AWS ECR.

Hardware Enclaves

Intel SGX (MEE), AMD SEV (Memory Guard + SEV-SNP), NVIDIA CC (GPU memory encryption), Intel TDX (TME - supports Google Cloud Confidential VMs/GKE), ARM TrustZone, ARM CCA/RME (supports Google Cloud Confidential GKE), AWS Nitro Enclaves, IBM Secure Execution with cryptographic attestation.

Scheduler Backends

Kubernetes (Jobs API), AWS Batch (job queues), GPU Fleet, TPU Fleet (with attestation).

HSM Integration

Thales Luna, Entrust nShield, AWS CloudHSM, Azure HSM (PKCS#11 integration; certification level depends on the selected HSM and customer deployment).

Developer Platform

Official TypeScript SDK/client packages, REST APIs (OpenAPI), WebSocket API, CLI tools, and CI/CD usage guides (GitHub Actions, GitLab CI, Jenkins, CircleCI).

Observability & Compliance

OTLP streaming, Merkle tree checkpoints, automated remediation, 8 integration providers (Slack, GitHub, AWS, Azure, GCP, Datadog, Splunk, Okta) via edge gateway, real-time collaboration.

XIIS Assurance

XIIS-backed control-plane verification for trust summary, evidence packs, attestation verification, environment verification, and release-bundle enforcement across the live QNSP cloud path.

Security framework

Threat modelling, policy enforcement, signed audit trails, incident response

Quantum Threat Model v2.0

Comprehensive threat modeling aligned with NIST PQC standards and CRQC timeline assumptions.

  • 6 attacker classes: Opportunistic → Nation-State with CRQC
  • HNDL (Harvest Now, Decrypt Later) timeline modeling
  • 22 security controls mapped to specific threats
  • Data classification: ephemeral → long-lived secrets
  • Legacy migration milestones: staged classical deprecation (PQC-Native is the default)

Cryptographic Attestation

Forensic-grade cryptographic evidence with NIST algorithm lifecycle tracking and compliance assessment.

  • NIST algorithm registry with lifecycle status (Final/Draft/Deprecated)
  • CBOM (Cryptographic Bill of Materials) export with SHA3-256 hash
  • Automated CNSA 2.0 and FIPS 140-3 compliance checks
  • Policy enforcement: audit mode or hard-block mode
  • Migration planning for deprecated algorithms (platform-wide)
  • Machine-verifiable compliance snapshots with PQC signatures

Cryptographic Policy Engine

Tenant-configurable PQC enforcement with algorithm allowlists and HSM requirements.

  • KEM: ML-KEM-512/768/1024 (FIPS 203), HQC, BIKE, Classic McEliece, FrodoKEM, NTRU
  • Signatures: ML-DSA-44/65/87 (FIPS 204), SLH-DSA (FIPS 205), FN-DSA (FIPS 206 draft), MAYO, CROSS, UOV, SNOVA
  • Symmetric: AES-256-GCM, ChaCha20-Poly1305
  • 90 PQC algorithms across 14 families, 4 policy tiers: Default → Government/Defense
  • HSM-enforced root key protection (HSM-backed root keys; certification depends on deployment)

Signed Audit Evidence

Cryptographically signed, hash-chained audit trail for compliance and forensics.

  • 59 crypto-critical event types across 12 services
  • PQC-signed events with ML-DSA-65 (Dilithium-3) signatures
  • SHA3-256 event hash chains with SHA3-512 Merkle checkpoints
  • Severity inference: info → critical
  • SIEM/monitoring export (Splunk, Datadog) + 6 additional integrations (Slack, GitHub, AWS, Azure, GCP, Okta) via deployment-specific forwarding

Key Compromise Response

Automated incident response for suspected or confirmed key compromises.

  • 6-step remediation: record → rotate/revoke → rewrap → revoke capabilities → audit → notify
  • KMS, Vault, Storage service integration
  • Automatic capability token revocation
  • 5s per-call timeout with retry for remediation actions
  • Correlation tracking across services

Downgrade Attack Remediation

Real-time detection and response to cryptographic downgrade attempts.

  • Protocol tracking: PQC-TLS → TLS 1.3 → TLS 1.2
  • Algorithm monitoring: ML-DSA → ECDSA downgrades
  • Automatic IP/user blocking on critical severity
  • Token revocation and resource quarantine
  • Escalation to key compromise handler

Capability comparison

How QNSP compares — feature by feature

QNSP vs cloud providers, security tools, and PQC tooling vendors across every capability dimension.

Feature
QNSP
Cloud Providers
Security Tools
PQC Tooling
Cryptography & Key Material
86 PQC algorithms (28 KEMs + 58 signatures) via native liboqs
Native
Partial
Partial
Partial
NIST FIPS 203/204/205 (ML-KEM, ML-DSA, SLH-DSA) + HQC + FN-DSA
Native
Varies
Partial
Native
Dual-provider cross-verification (liboqs + noble for 18 FIPS algorithms)
Native
Not focus
Not focus
Not focus
KMS / key management (create, rotate, BYOK, per-tenant isolation)
Native
Native
Partial
Partial
Secrets vault (CRUD, rotation, leases, PQC-encrypted at rest)
Native
Native
Native
Not focus
HSM integration (BYOH + QNSP-managed CloudHSM) with FIPS 140-3 gates
Native
Varies
Varies
Partial
Browser SDK — client-side PQC encryption, signing, and key encapsulation
Native
Not focus
Not focus
Not focus
Encrypted Storage & Search
SSE-X (PQC-encrypted object storage with ML-KEM envelope encryption)
Native
Partial
Not focus
Not focus
Encrypted vector search (SSE-X semantic search over encrypted data)
Native
Not focus
Not focus
Not focus
Storage up to 25 TB included (S3 backend, QNSP handles all encryption)
Native
Native
Not focus
Not focus
Secure Ingress & Access
PQC-TLS termination at edge gateway + PQC-signed JWT access control
Native
Partial
Native
Not focus
SPIFFE/SVID identity for service-to-service authentication
Native
Varies
Partial
Not focus
Entitlement-enforced API gateway (access + capability layer per route)
Native
Varies
Not focus
Not focus
Confidential Compute & AI
Enclave AI (PQC-attested inference, training, and fine-tuning)
Native
Varies
Not focus
Not focus
AI model governance (lineage tracking, PQC signing, provenance graph)
Native
Not focus
Not focus
Not focus
Confidential compute orchestration + hardware attestation
Native
Varies
Not focus
Not focus
Policy & Crypto Governance
Per-tenant crypto policy tiers (default → strict → maximum → government)
Native
Not focus
Varies
Partial
Algorithm allowlist/blocklist enforcement with NIST lifecycle tracking
Native
Not focus
Not focus
Partial
Cryptographic Bill of Materials (CBOM) — full crypto asset inventory
Native
Not focus
Not focus
Native
Policy engine (create policies + evaluate requests) + capability tokens
Native
Varies
Partial
Not focus
Audit, Compliance & Evidence
Tamper-evident audit trail (hash-chained events + commitment signatures)
Native
Varies
Partial
Partial
Compliance evidence packs (SOC 2, ISO 27001, FIPS 140-3, NIST SP 800-208)
Native
Varies
Partial
Not focus
Real-time attestation streaming + provider attestation records
Native
Not focus
Not focus
Not focus
Conformance testing (L0–L3 signed reports)
Native
Not focus
Not focus
Partial
Platform & Developer Experience
Self-serve developer tiers ($0 → $149 → $590) with instant provisioning
Native
Native
Partial
Not focus
Full CLI (12 command groups) + typed SDKs for every service
Native
Native
Varies
Not focus
Usage metering + quota enforcement (fail-open) at the gateway
Native
Native
Not focus
Not focus
Automated remediation (block / rate-limit / quarantine / revoke session)
Native
Varies
Partial
Not focus
NativeCore product capability
PartialSupported, but not end-to-end
VariesCapability depends on vendor / SKU
Not focusNot their primary product focus
Sources — public references

Competitive landscape

Where incumbents fall short — and where QNSP fills the gap

Cloud Providers

Cloud providers are rolling out PQC primarily through primitives (KMS, certificates, TLS endpoints) and managed services. This lowers the barrier to adoption, but customers still assemble end-to-end enforcement across ingress, policy, audit evidence, storage/search workflows, and incident automation.

Vendors

  • PQC primitives in KMS / secrets / certificate services and selected TLS endpoints
  • Broad managed service catalogs (storage, search, AI) with varying security/enforcement cohesion
  • Identity + policy products exist, but cross-service, evidence-grade enforcement is usually an integration project

Strengths

  • Global footprint, managed services, and operational maturity
  • PQC exposure through standard interfaces (TLS, KMS) accelerates early adoption
  • Compliance programs and enterprise procurement pathways

Gaps vs. QNSP

  • Often focused on primitives rather than end-to-end tenant policy + audit evidence
  • Customers still stitch together ingress enforcement, signed ingestion, retention, and incident automation
  • Consistency across services varies; strong outcomes often require additional control-plane buildout

Security Tools

Security tools deliver best-in-class point capabilities (vaults, PAM, edge access, SIEM/SOAR). They can be critical building blocks, but the end-to-end outcome (tenant policy, capability enforcement, signed audit evidence, and secure data workflows) is usually assembled across multiple vendors and systems.

Vendors

  • Vaults / PAM for secrets and credential rotation
  • Edge access + WAF/Zero Trust posture controls
  • SIEM/SOAR for monitoring and response automation

Strengths

  • Mature deployments for identity/edge/PAM use cases
  • Good fit for incremental adoption (swap one control at a time)
  • Broad ecosystem integrations

Gaps vs. QNSP

  • Often focused on one layer rather than cross-service, tenant-scoped enforcement
  • Doesn't typically unify storage/search/AI workflows under a single policy + capability model
  • Audit evidence exists, but it's rarely delivered as a single, tamper-evident platform trail

PQC Tooling

PQC tooling vendors focus on crypto-agility and migration readiness (PKI lifecycle, discovery, HSM options, and PQC primitives). They can accelerate planning and rotation, but typically don't deliver the full platform surface: secure ingress + signed ingestion, per-tenant policy enforcement, evidence-grade audit, and secure data workflows.

Vendors

  • Crypto posture / inventory + certificate lifecycle automation
  • Hardware-backed key protection options and PQC primitives
  • Rotation orchestration for PKI and machine identity surfaces

Strengths

  • Deep cryptographic specialization and migration readiness tooling
  • Helpful for inventory, policy design, and lifecycle automation at scale

Gaps vs. QNSP

  • Usually not a full stack for tenants, audit trails, storage/search workflows, or billing/metering
  • Integration and operational ownership remains with the customer or SI

Ready to deploy quantum-native security?

Free tier available. Enterprise deployments provisioned within 48 hours. No credit card required.