Learning Library

← Back to Library

IBM Unveils Quantum‑Safe Crypto, Automation Growth, Analyst Praise

Key Points

  • IBM helped develop three of the four algorithms selected by NIST for its upcoming post‑quantum cryptographic standard, enabling quantum‑safe public‑key encapsulation and digital signatures.
  • The Crypto Express 8S HSM on IBM Z 16 now supports these new quantum‑safe schemes (e.g., Dilithium signatures), allowing developers to begin integrating quantum‑resistant cryptography alongside classic methods.
  • IBM’s business automation suite is expanding with two open‑source products—IBM Process Automation Manager Open Edition and IBM Decision Manager Open Edition—originating from Red Hat to complement its low‑code/no‑code platform for IT‑centric workflow and decision use cases.
  • Recent analyst reports have named IBM a leader in three evaluations of RPA and intelligent‑automation service providers, strengthening its market position in automation solutions.

Full Transcript

# IBM Unveils Quantum‑Safe Crypto, Automation Growth, Analyst Praise **Source:** [https://www.youtube.com/watch?v=3NKQfKCyxXo](https://www.youtube.com/watch?v=3NKQfKCyxXo) **Duration:** 00:03:35 ## Summary - IBM helped develop three of the four algorithms selected by NIST for its upcoming post‑quantum cryptographic standard, enabling quantum‑safe public‑key encapsulation and digital signatures. - The Crypto Express 8S HSM on IBM Z 16 now supports these new quantum‑safe schemes (e.g., Dilithium signatures), allowing developers to begin integrating quantum‑resistant cryptography alongside classic methods. - IBM’s business automation suite is expanding with two open‑source products—IBM Process Automation Manager Open Edition and IBM Decision Manager Open Edition—originating from Red Hat to complement its low‑code/no‑code platform for IT‑centric workflow and decision use cases. - Recent analyst reports have named IBM a leader in three evaluations of RPA and intelligent‑automation service providers, strengthening its market position in automation solutions. ## Sections - [00:00:00](https://www.youtube.com/watch?v=3NKQfKCyxXo&t=0s) **IBM Quantum‑Safe Cryptography Update** - IBM helped develop three of the four NIST‑selected post‑quantum algorithms and is beginning to integrate these quantum‑resistant cryptographic tools into its products and services. ## Full Transcript
0:00post-quantum cryptographic standards the 0:02expansion of the ibm business automation 0:04portfolio and ibm's inclusion in three 0:07recent analyst reports all on this 0:10episode of ibm tech now 0:12what's up y'all my name is ian and i am 0:14back to bring you the latest and 0:15greatest news and announcements about 0:17ibm technology 0:18to start things off this week let's talk 0:20about how you can protect yourself from 0:22attacks by quantum computers in the 0:24future i know i know it sounds like 0:26something out of a sci-fi movie but i'm 0:28talking about quantum safe cryptography 0:31back in july the u.s national institute 0:33of standards and technology selected the 0:35first group of cryptographic tools that 0:37are designed to withstand attacks posed 0:40by quantum computers that will be 0:41created in the future 0:43the four selected cryptographic 0:45algorithms will become part of nist's 0:47post-quantum cryptographic standard and 0:49ibm was involved in the development of 0:51three of the four standards 0:54the algorithms are designed for two main 0:55tasks public key encapsulation and 0:58digital signatures 0:59now it would take a lot more time and 1:01i'd probably need a few more degrees to 1:03completely explain these cryptographic 1:05tasks here but to just focus on the 1:07basics of one digital signatures are 1:09used for identity authentication and 1:11non-repudiation 1:13now adopting quantum state cryptography 1:15at scale will be a decades-long process 1:17but the new schemes are entering the 1:19market in different products and 1:20services offered by ibm and others 1:23in particular the crypto express 8s 1:25hardware security module which is 1:27available as a feature of the z16 1:29platform allows application developers 1:31to use the new quantum safe algorithms 1:34this means that you can generate 1:35crystals dilithium digital signatures 1:37with z16 1:38so all that to say 1:40ibm z16 positions you to begin using 1:43quantum safe cryptography along with 1:44classical cryptography as you start 1:46modernizing existing applications and 1:49building new ones 1:50to learn more about this fascinating 1:51topic check out the link i've got in the 1:53description of this post 1:55next up ibm is expanding its business 1:58automation portfolio to include two new 2:00open source offerings ibm process 2:03automation manager open edition and ibm 2:05decision manager open edition 2:07these offerings which were previously 2:09delivered by red hat complement our 2:11current low code no code platform to 2:13address it-centric build-your-own use 2:15cases 2:16they allow us to deliver intelligent 2:18business automation capabilities for 2:20workflow and decision management that 2:22meet the needs of all kinds of 2:23organizations 2:25we're really excited about these 2:26offerings because they provide a great 2:27opportunity to extend our long-standing 2:29commitment to open source to learn more 2:31about these new offerings hit the link 2:33below 2:35to wrap things up today i'm proud to 2:36announce that ibm was named a leader in 2:39three recent analyst reports that 2:41evaluate rpa and intelligent automation 2:43service providers these types of analyst 2:45reports can help potential customers 2:47compare and evaluate providers as they 2:49look to adopt intelligent automation 2:51solutions 2:52and based on the extensive work we've 2:53been doing in the field it's no 2:55coincidence that ibm was named a leader 2:57in all three 2:58the three reports are the forester wave 3:00for robotic process automation services 3:03idc marketscape worldwide intelligent 3:05automation services 2022 vendor 3:07assessment and everest group's 3:09intelligent process automation solution 3:11provider compendium 2022 3:14to see some of the report highlights or 3:16download the whole thing check out the 3:17link below 3:19thanks so much for joining me today for 3:20this episode of ibm tech now if you're 3:22interested in learning more about the 3:23topics i've covered make sure you 3:24explore the links in the description of 3:26this video and again please don't forget 3:28to subscribe to our channel to stay up 3:30to date on what's going on in tech now