09/22/2025 | News release | Distributed by Public on 09/23/2025 01:54
Zscaler Blog
Get the latest Zscaler blog updates in your inbox
SubscribeQuantum computing is set to redefine the world's computational capabilities. Classical computers manipulate data in binary 0s and 1s, but quantum computers allow for a single quantum bit (or qubit) to represent multiple states simultaneously-this means that tasks formerly deemed computationally infeasible, like factoring large numbers, will be solved exponentially faster.
Of course, this comes with risk. When quantum computing achieves large-scale usage, malicious actors will be able to use these powerful machines to break certain traditional encryption algorithms. Threat actors are already using a tactic called "harvest now, decrypt larger" in which they capture and steal encrypted data with the intention to decrypt it down the road. Therefore, transitioning to quantum-resistant algorithms, known as Post-Quantum Cryptography (PQC), is on the short-term roadmap for many CISOs.
Zscaler is committed to providing the highest level of security for our customers and that includes timely adoption of the latest innovations in the encryption space. In that spirit, we're excited to launch the Post-Quantum Cryptography Visibilityreport, now generally available to all customers in the Zscaler Admin Portal which can be accessed under Analytics > Interactive Reports > Web Activity > Post Quantum Cryptography Visibility.
The new interactive report provides insights including details on PQC algorithms as applied to customer traffic including:
We know our customers need to access data in different ways that suit their workflows, and to that end we've updated the Web Insights Log report also to include quantum algorithm data at a granular level. The new fields and columns include:
Customers can also add the new fields listed below to the Feed Output Format when configuring an NSS or Cloud NSS feed for web logs. Once ingested via API into a SIEM or other data manipulation tool, IT or Security stakeholders can further examine the data for further analysis.
Access to more data about your organization's environment and the traffic it generates will reduce the friction of transitioning to post-quantum cryptography. With these new capabilities you can focus on three areas of activity to apply this new post-quantum cryptographic algorithm data for both strategic planning and operational execution:
This release marks the first of three phases of Zscaler's vision for a Post-Quantum Era:
Now that we're providing the visibility you need to know what quantum algorithms are in use on the traffic in your environment, we're working now towards our second phase milestone of enabling full decryption and inspection of TLS traffic leveraging post-quantum key exchange. In our third phase we'll support post-quantum digital signatures across the Zero Trust Exchange platform and fully transition to quantum-resistant algorithms. In summary, Zscaler is building the foundation for a secure digital future.
Disclaimer: This blog post has been created by Zscaler for informational purposes only and is provided "as is" without any guarantees of accuracy, completeness or reliability. Zscaler assumes no responsibility for any errors or omissions or for any actions taken based on the information provided. Any third-party websites or resources linked in this blog post are provided for convenience only, and Zscaler is not responsible for their content or practices. All content is subject to change without notice. By accessing this blog, you agree to these terms and acknowledge your sole responsibility to verify and use the information as appropriate for your needs.
ZIA Innovation Launch [Part-3]- IP is the New VIP: Dedicated IP and Granular Geolocalization
Zscaler Named a Leader in The Forrester Wave™ Secure Access Service Edge Solutions, Q3 2025: The Future is Zero Trust
Salesloft Drift Supply Chain Incident: Key Details and Zscaler's Response
By submitting the form, you are agreeing to our privacy policy.