{"id":174259854,"date":"2025-07-30T07:39:59","date_gmt":"2025-07-30T15:39:59","guid":{"rendered":"https:\/\/www.netscaler.com\/blog\/?p=174259854"},"modified":"2025-07-30T07:39:59","modified_gmt":"2025-07-30T15:39:59","slug":"leading-the-quantum-ready-transition-how-netscaler-helps-prevent-a-silent-data-breach-decades-in-the-making","status":"publish","type":"post","link":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/leading-the-quantum-ready-transition-how-netscaler-helps-prevent-a-silent-data-breach-decades-in-the-making\/","title":{"rendered":"Leading the Quantum-Ready Transition: How NetScaler Helps Prevent a Silent Data Breach Decades in the Making"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">The Quantum Threat is No Longer Theoretical<\/h2>\n\n\n\n<p>Today, every sensitive piece of data you create, transmit, and store is encrypted. The algorithms that have underpinned modern encryption standards have generally been viewed as robust and \u201cunbreakable\u201d \u2014- but that foundation is about to collapse.<\/p>\n\n\n\n<p>Current encryption standards like RSA or ECDHE, which is infeasible to decrypt by brute force, can be cracked in a matter of hours with quantum computers.&nbsp;<\/p>\n\n\n\n<p>But what\u2019s the real danger? Attackers don\u2019t need quantum computers to start exploiting this. <strong>They\u2019re already collecting encrypted data as you read this right now, knowing they can decrypt it later once quantum computers mature.&nbsp;<\/strong><\/p>\n\n\n\n<p>This is the essence of the <a href=\"https:\/\/www.technologyreview.com\/2021\/11\/03\/1039171\/hackers-quantum-computers-us-homeland-security-cryptography\/\">\u201cHarvest Now, Decrypt Later\u201d (HNDL<\/a>) attack. HNDL represents a silent and irreversible threat to decades of sensitive communications and creates a fundamentally different threat model than traditional security breaches.<\/p>\n\n\n\n<p>Consider the scope: every document, every encrypted database backup, every secure communication your organization has transmitted that has a lifespan of 5 or more years, is potentially sitting in a bad actor\u2019s data warehouse, waiting for quantum decryption. When those quantum computers become available, decades of communications that were presumed secure become instantly readable.&nbsp;<\/p>\n\n\n\n<p>Large-scale quantum computers that can break current encryption standards could become practical in the next 5 to 10 years. This time horizon means that this isn\u2019t a problem for tomorrow\u2019s CISOs but a strategic imperative for today\u2019s business leaders. And the scariest part is that no-one will know\u2014-there\u2019s no telltale signs such as ransom demands. It\u2019s a silent timebomb, just waiting for quantum to arrive.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who is most at risk?&nbsp;<\/h2>\n\n\n\n<p>The organizations most at risk are predominantly those that handle long-lived, sensitive data, especially governments, healthcare providers, financial institutions, and other regulated industries. Long term data that is relevant for 5 to 10 years is a prime target for a HNDL attack. This includes data such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Medical records and patient data<\/li>\n\n\n\n<li>Financial statement and tax information<\/li>\n\n\n\n<li>State secrets and classified communications<\/li>\n\n\n\n<li>Intellectual property and valuable research<\/li>\n\n\n\n<li>Even private conversations and encrypted backups<\/li>\n<\/ul>\n\n\n\n<p>All of it is vulnerable to decryption, unless companies do something about it, now.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What should you do about it?&nbsp;<\/h2>\n\n\n\n<p>The transition to post-quantum cryptography (PQC) isn&#8217;t a future problem but rather a current infrastructure planning requirement. Concrete vendor timelines and immediate testing opportunities are already taking shape, and the economics strongly favor early planning to avoid the cost and disruption of reactive migrations.<\/p>\n\n\n\n<div style=\"background-color:#f2f2f2;color:#32373c\" class=\"wp-block-genesis-blocks-gb-testimonial left-aligned gb-font-size-18 gb-block-testimonial\"><div class=\"gb-testimonial-text\"><em>Gartner claims <\/em><strong><em>proactive planning<\/em><\/strong><em> to avoid the &#8220;devastating and widespread\u201d impact of quantum computers on asymmetric cryptography will <\/em><strong><em>reduce costs and improve operational efficiency<\/em><\/strong><em>.<\/em><\/div><div class=\"gb-testimonial-info\"><h2 class=\"gb-testimonial-name\" style=\"color:#32373c\"><em>Gartner, \u201cJustify, Build and Launch a Postquantum Response&#8221;<\/em><\/h2><small class=\"gb-testimonial-title\" style=\"color:#32373c\"><a href=\"https:\/\/www.gartner.com\/analyst\/b9c807b972af\"><em>Sarah Almond<\/em><\/a><em>, <\/em><a href=\"https:\/\/www.gartner.com\/analyst\/becb07ba7b\"><em>Mark Horvath<\/em><\/a><em>, <\/em><a href=\"https:\/\/www.gartner.com\/analyst\/b9c805b979a5\"><em>Elizabeth Davis<\/em><\/a><em>, November 2024&nbsp;<\/em><\/small><\/div><\/div>\n\n\n\n<p>If that all sounds daunting, you\u2019re not alone. <a href=\"https:\/\/thequantuminsider.com\/2025\/04\/28\/organizational-quantum-readiness-remains-low-poll-finds-only-5-of-organizations-have-a-quantum-computing-roadmap\/\">Only 5% of organizations<\/a> have a roadmap to address quantum computing. But having a sense of urgency is key, as quantum computing continues accelerating with breakthrough announcements becoming routine. <a href=\"https:\/\/blog.google\/technology\/research\/google-willow-quantum-chip\/\">Google\u2019s Willow chip<\/a> and <a href=\"https:\/\/news.microsoft.com\/source\/features\/innovation\/microsofts-majorana-1-chip-carves-new-path-for-quantum-computing\/\">Microsoft\u2019s recent Majorana 1 processor<\/a> represent advances happening in months, not years.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Start Now While You Control the Timeline:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Q2 2025:<\/strong> Begin internal validation of quantum-safe encryption in non-production environments<\/li>\n\n\n\n<li><strong>Q3 2025:<\/strong> Identify and map all systems where data confidentiality is critical<\/li>\n\n\n\n<li><strong>Q4 2025:<\/strong> Begin phased rollout, starting with external-facing services<\/li>\n<\/ul>\n\n\n\n<p><strong>NIST Requires Migration to PQC Standards\u2014Fast<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>By <strong>2030<\/strong>, deprecated classical encryption (~112\u2011bit) must be phased out<\/li>\n\n\n\n<li>By <strong>2035<\/strong>, such encryption must be fully disallowed, and PQC fully implemented<\/li>\n<\/ul>\n\n\n\n<p>Organizations that come out ahead will be those building modern, unified infrastructure capable of coordinated security updates across hybrid multicloud environments.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How is Citrix helping the readiness to new standards?&nbsp;<\/h2>\n\n\n\n<p>NetScaler is delivering on a long-term vision to help organizations prepare for the post-quantum era\u2014while continuing to invest in practical, modern protections across the stack. This continues the path of innovation with our market leading modern networking and security platform, which deploys anywhere, cloud or on-premises, with a single control plane and API, reducing complexity, risk, and cost for enterprise organizations. Here\u2019s a look at some of the critical milestones we\u2019ve hit:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Post-Quantum Cryptography Milestones<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>April 2025:<\/strong> NetScaler became the first application delivery platform to offer NIST-aligned hybrid post-quantum cryptography (X25519 + ML-KEM768) through a Private Tech Preview, giving early access customers a head start on preparing for the quantum era.<\/li>\n\n\n\n<li><strong>August 2025:<\/strong> NetScaler makes its NIST-aligned hybrid PQC capabilities generally available, enabling all customers to deploy quantum-resistant encryption in production environments while maintaining compatibility with existing systems.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Additional Security Investment Highlights<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-adc-achieves-certification-for-dodin-approved-products-list\/\"><strong>DoDIN APL<\/strong><\/a><strong> + FIPS:<\/strong> NetScaler is listed on the Department of Defense Information Network Approved Products List (DoDIN APL), reinforcing its readiness for highly regulated environments. Also NetScaler hardware appliances running version 13.1 are fully validated for FIPS 140-3 Level 2, while version 13.1 virtual appliances are currently in the <a href=\"https:\/\/csrc.nist.gov\/projects\/cryptographic-module-validation-program\/modules-in-process\/modules-in-process-list\">Coordination phase<\/a> with NIST. Version 12.1 remains FIPS 140-2 validated.&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/docs.netscaler.com\/en-us\/citrix-adc\/current-release\/system\/http3-over-quic-protocol.html\"><strong>HTTP\/3 over QUIC<\/strong><\/a><strong>: <\/strong>NetScaler now supports HTTP\/3 over QUIC, helping organizations adopt modern protocols that deliver better performance and stronger security for real-time applications.<\/li>\n\n\n\n<li><a href=\"https:\/\/docs.netscaler.com\/en-us\/citrix-adc\/current-release\/security\/dns-security-options.html\"><strong>DNS Security Enhancements<\/strong><\/a><strong>: <\/strong>Built-in DNS security features now provide defense against spoofing, cache poisoning, and other common threats to DNS infrastructure.<\/li>\n\n\n\n<li><a href=\"https:\/\/docs.netscaler.com\/en-us\/netscaler-console-service\/instance-advisory\/security-advisory-dashboard.html\"><strong>Security Advisory Dashboard<\/strong><\/a><strong>: <\/strong>A new instance-level security advisory dashboard in NetScaler Console makes it easier to track vulnerabilities, prioritize updates, and stay in compliance.<\/li>\n\n\n\n<li><a href=\"https:\/\/docs.netscaler.com\/en-us\/citrix-adc\/current-release\/aaa-tm\/authentication-methods\/nfactor-recaptcha-configuration.html\"><strong>reCAPTCHA v3 Support<\/strong><\/a><strong>: <\/strong>NetScaler now supports reCAPTCHA v3 for advanced bot detection and low-friction user validation as part of multi-factor authentication flows.<\/li>\n<\/ul>\n\n\n\n<p>These milestones reflect NetScaler\u2019s commitment to continuous security innovation, helping organizations defend against today\u2019s threats while preparing for those on the horizon. From encryption modernization and zero-trust enforcement to visibility and automation, NetScaler continues to invest across the full security lifecycle.<\/p>\n\n\n\n<p>NetScaler\u2019s quantum-resistant capabilities, a unified management architecture, and automated deployment options, provide organizations a stable foundation for proactive, well-planned transitions\u2014rather than disruptive, last-minute responses.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">More information:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>For more detailed information of our work in PQC for the July release and details on how quantum computing will break these encryptions, check out our <a href=\"https:\/\/community.citrix.com\/techzone-blogs\/netscaler\/post-quantum-cryptography-2025-timeline-threats-action-plan-r1146\/\">multi-part blog series<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p> Explore how NetScaler is strengthening enterprise security with post-quantum cryptography, FIPS validation, and platform-wide innovations.<\/p>\n","protected":false},"author":12,"featured_media":174259855,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[5],"tags":[41,54,103,102,101,99,65,94,98,97,100],"class_list":{"0":"post-174259854","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-application-and-api-security","8":"tag-application-security","9":"tag-citrix","10":"tag-decrypt-later","11":"tag-harvest-now","12":"tag-hndl","13":"tag-ml-kem","14":"tag-netscaler","15":"tag-netscaler-security-updates","16":"tag-post-quantum-cryptography","17":"tag-pqc","18":"tag-quantum-computers","19":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Leading the Quantum-Ready Transition: How NetScaler Helps Prevent a Silent Data Breach Decades in the Making<\/title>\n<meta name=\"description\" content=\"Explore how NetScaler is strengthening enterprise security with post-quantum cryptography, FIPS validation, and platform-wide innovations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Leading the Quantum-Ready Transition: How NetScaler Helps Prevent a Silent Data Breach Decades in the Making\" \/>\n<meta property=\"og:description\" content=\"Explore how NetScaler is strengthening enterprise security with post-quantum cryptography, FIPS validation, and platform-wide innovations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition\" \/>\n<meta property=\"og:site_name\" content=\"NetScaler Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-30T15:39:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2025\/07\/GettyImages-1347310666-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Abhilash Verma\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@NetScaler\" \/>\n<meta name=\"twitter:site\" content=\"@NetScaler\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abhilash Verma\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/leading-the-quantum-ready-transition-how-netscaler-helps-prevent-a-silent-data-breach-decades-in-the-making\/\"},\"author\":{\"name\":\"Abhilash Verma\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/f154892e78a4ef5b9c5d3736d1fda658\"},\"headline\":\"Leading the Quantum-Ready Transition: How NetScaler Helps Prevent a Silent Data Breach Decades in the Making\",\"datePublished\":\"2025-07-30T15:39:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/leading-the-quantum-ready-transition-how-netscaler-helps-prevent-a-silent-data-breach-decades-in-the-making\/\"},\"wordCount\":1008,\"publisher\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2025\/07\/GettyImages-1347310666-scaled.jpg\",\"keywords\":[\"Application security\",\"Citrix\",\"Decrypt Later\",\"Harvest Now\",\"HNDL\",\"ML-KEM\",\"NetScaler\",\"NetScaler security updates\",\"Post-Quantum Cryptography\",\"PQC\",\"Quantum Computers\"],\"articleSection\":[\"Application and API security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/leading-the-quantum-ready-transition-how-netscaler-helps-prevent-a-silent-data-breach-decades-in-the-making\/\",\"url\":\"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition\",\"name\":\"Leading the Quantum-Ready Transition: How NetScaler Helps Prevent a Silent Data Breach Decades in the Making\",\"isPartOf\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2025\/07\/GettyImages-1347310666-scaled.jpg\",\"datePublished\":\"2025-07-30T15:39:59+00:00\",\"description\":\"Explore how NetScaler is strengthening enterprise security with post-quantum cryptography, FIPS validation, and platform-wide innovations.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition#primaryimage\",\"url\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2025\/07\/GettyImages-1347310666-scaled.jpg\",\"contentUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2025\/07\/GettyImages-1347310666-scaled.jpg\",\"width\":2560,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.netscaler.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Leading the Quantum-Ready Transition: How NetScaler Helps Prevent a Silent Data Breach Decades in the Making\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#website\",\"url\":\"https:\/\/www.netscaler.com\/blog\/\",\"name\":\"NetScaler Blog\",\"description\":\"Application delivery and security blog\",\"publisher\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.netscaler.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#organization\",\"name\":\"NetScaler Blog\",\"url\":\"https:\/\/www.netscaler.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png\",\"contentUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png\",\"width\":2032,\"height\":486,\"caption\":\"NetScaler Blog\"},\"image\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/NetScaler\",\"https:\/\/www.linkedin.com\/company\/netscaler\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/f154892e78a4ef5b9c5d3736d1fda658\",\"name\":\"Abhilash Verma\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/3ab1630cf31b64f50005e5118c41c9def230e0e068441ba1437bba728dc3ac00?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3ab1630cf31b64f50005e5118c41c9def230e0e068441ba1437bba728dc3ac00?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3ab1630cf31b64f50005e5118c41c9def230e0e068441ba1437bba728dc3ac00?s=96&d=mm&r=g\",\"caption\":\"Abhilash Verma\"},\"description\":\"this is a test bio\",\"url\":\"https:\/\/www.netscaler.com\/blog\/author\/abhilashv\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Leading the Quantum-Ready Transition: How NetScaler Helps Prevent a Silent Data Breach Decades in the Making","description":"Explore how NetScaler is strengthening enterprise security with post-quantum cryptography, FIPS validation, and platform-wide innovations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition","og_locale":"en_US","og_type":"article","og_title":"Leading the Quantum-Ready Transition: How NetScaler Helps Prevent a Silent Data Breach Decades in the Making","og_description":"Explore how NetScaler is strengthening enterprise security with post-quantum cryptography, FIPS validation, and platform-wide innovations.","og_url":"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition","og_site_name":"NetScaler Blog","article_published_time":"2025-07-30T15:39:59+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2025\/07\/GettyImages-1347310666-scaled.jpg","type":"image\/jpeg"}],"author":"Abhilash Verma","twitter_card":"summary_large_image","twitter_creator":"@NetScaler","twitter_site":"@NetScaler","twitter_misc":{"Written by":"Abhilash Verma","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition#article","isPartOf":{"@id":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/leading-the-quantum-ready-transition-how-netscaler-helps-prevent-a-silent-data-breach-decades-in-the-making\/"},"author":{"name":"Abhilash Verma","@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/f154892e78a4ef5b9c5d3736d1fda658"},"headline":"Leading the Quantum-Ready Transition: How NetScaler Helps Prevent a Silent Data Breach Decades in the Making","datePublished":"2025-07-30T15:39:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/leading-the-quantum-ready-transition-how-netscaler-helps-prevent-a-silent-data-breach-decades-in-the-making\/"},"wordCount":1008,"publisher":{"@id":"https:\/\/www.netscaler.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition#primaryimage"},"thumbnailUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2025\/07\/GettyImages-1347310666-scaled.jpg","keywords":["Application security","Citrix","Decrypt Later","Harvest Now","HNDL","ML-KEM","NetScaler","NetScaler security updates","Post-Quantum Cryptography","PQC","Quantum Computers"],"articleSection":["Application and API security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.netscaler.com\/blog\/application-and-api-security\/leading-the-quantum-ready-transition-how-netscaler-helps-prevent-a-silent-data-breach-decades-in-the-making\/","url":"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition","name":"Leading the Quantum-Ready Transition: How NetScaler Helps Prevent a Silent Data Breach Decades in the Making","isPartOf":{"@id":"https:\/\/www.netscaler.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition#primaryimage"},"image":{"@id":"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition#primaryimage"},"thumbnailUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2025\/07\/GettyImages-1347310666-scaled.jpg","datePublished":"2025-07-30T15:39:59+00:00","description":"Explore how NetScaler is strengthening enterprise security with post-quantum cryptography, FIPS validation, and platform-wide innovations.","breadcrumb":{"@id":"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition#primaryimage","url":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2025\/07\/GettyImages-1347310666-scaled.jpg","contentUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2025\/07\/GettyImages-1347310666-scaled.jpg","width":2560,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/www.citrix.com\/blogs\/2025\/07\/30\/leading-the-quantum-ready-transition#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.netscaler.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Leading the Quantum-Ready Transition: How NetScaler Helps Prevent a Silent Data Breach Decades in the Making"}]},{"@type":"WebSite","@id":"https:\/\/www.netscaler.com\/blog\/#website","url":"https:\/\/www.netscaler.com\/blog\/","name":"NetScaler Blog","description":"Application delivery and security blog","publisher":{"@id":"https:\/\/www.netscaler.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.netscaler.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.netscaler.com\/blog\/#organization","name":"NetScaler Blog","url":"https:\/\/www.netscaler.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png","contentUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png","width":2032,"height":486,"caption":"NetScaler Blog"},"image":{"@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/NetScaler","https:\/\/www.linkedin.com\/company\/netscaler\/"]},{"@type":"Person","@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/f154892e78a4ef5b9c5d3736d1fda658","name":"Abhilash Verma","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3ab1630cf31b64f50005e5118c41c9def230e0e068441ba1437bba728dc3ac00?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3ab1630cf31b64f50005e5118c41c9def230e0e068441ba1437bba728dc3ac00?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3ab1630cf31b64f50005e5118c41c9def230e0e068441ba1437bba728dc3ac00?s=96&d=mm&r=g","caption":"Abhilash Verma"},"description":"this is a test bio","url":"https:\/\/www.netscaler.com\/blog\/author\/abhilashv\/"}]}},"featured_image_src":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2025\/07\/GettyImages-1347310666-600x400.jpg","featured_image_src_square":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2025\/07\/GettyImages-1347310666-600x600.jpg","author_info":{"display_name":"Abhilash Verma","author_link":"https:\/\/www.netscaler.com\/blog\/author\/abhilashv\/"},"_links":{"self":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/posts\/174259854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/comments?post=174259854"}],"version-history":[{"count":0,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/posts\/174259854\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/media\/174259855"}],"wp:attachment":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/media?parent=174259854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/categories?post=174259854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/tags?post=174259854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}