Automated scanners and analyzers to help you discover cryptographic assets and assess quantum readiness across your organization
Discover and inventory cryptographic assets in your codebase. CryptoScan scans source code, configurations, and dependencies to identify cryptographic implementations vulnerable to quantum attacks.
Analyze TLS/SSL configurations across your infrastructure for quantum readiness. Evaluates cipher suites, protocols, and certificates against CNSA 2.0 compliance timelines.
Identify quantum-vulnerable cryptographic algorithms hiding in your software dependencies. Analyzes Go, npm, Python, and Maven packages for cryptographic usage and quantum risk exposure.
Enterprise cryptography as a service. CryptoServe provides a unified API for encryption, signatures, and key management with built-in support for NIST post-quantum algorithms (ML-KEM, ML-DSA, SLH-DSA).
Choose the right tool based on your assessment needs
| Feature | CryptoScan | TLS Analyzer | CryptoDeps | CryptoServe |
|---|---|---|---|---|
| Primary Use | Source code and configuration scanning | Network endpoint and certificate analysis | Dependency and package scanning | Cryptography API service |
| Scan Target | Codebases, repositories, config files | TLS endpoints, SSL certificates | Go, npm, Python, Maven dependencies | Application integration (REST API) |
| Output Formats | SARIF, CycloneDX CBOM, JSON, CSV | HTML reports, CycloneDX CBOM, JSON | SARIF, CycloneDX CBOM, JSON | JSON API, CBOM, Audit logs |
| CI/CD Integration | GitHub Actions, GitLab CI, Jenkins | Any CI/CD pipeline | GitHub Actions, any CI/CD pipeline | REST API, Python SDK |
| Compliance Mapping | NIST PQC, CNSA 2.0 | CNSA 2.0 timelines | NIST PQC, quantum risk levels | FIPS 140-2/3, NIST PQC (FIPS 203/204/205) |
Combine these automated tools with the QRAMM Assessment Toolkit for a comprehensive organizational evaluation.