-

Binarly Partners with QuSecure to Accelerate Enterprise Post‑Quantum Readiness

SANTA MONICA, Calif.--(BUSINESS WIRE)--Binarly, the industry leader in software and firmware supply‑chain security, is announcing a strategic technology alliance with QuSecure, a provider of post‑quantum cryptography (PQC) and crypto‑agility solutions, to deliver the most comprehensive solution available for enterprises facing quantum-safe compliance deadlines.

The Binarly/QuSecure solution captures the presence of weak, vulnerable, or potentially compromised cryptographic assets.

Share

The integration combines Binarly’s deep‑binary cryptographic analysis with QuSecure’s QuProtect platform, giving defenders a single pane of glass for discovering, inventorying and remediating cryptographic risk across every layer of the software stack.

By automating the creation and validation of Cryptographic Bills of Materials (CBOMs) for any binary, the joint solution dramatically shortens PQC‑migration timelines and streamlines compliance reporting.

The joint-solution uses software inspection to capture the presence of weak, vulnerable, or potentially compromised cryptographic assets. These include weak private and public keys, expired x509 certificates, PKCS7 bundles, leaked or compromised keys, cryptographic protocols and cryptographic algorithms.

The technology alliance provides:

  • Comprehensive PQC asset discovery: QuSecure’s lightweight agent uploads binaries to the QuProtect platform, where Binarly’s research-powered engine pinpoints every certificate, key, algorithm and protocol in use, even in opaque third‑party components.
  • CBOM/Software Bill of Materials (SBOM) generation: Automatically builds verifiable inventories that map ownership, validity periods, algorithm strength and reachability of each cryptographic element.
  • Cryptographic reachability: Shows which algorithms are executed at runtime so teams can prioritize what must be replaced before NIST, sector‑specific and government-ordered deadlines hit.
  • PQC compliance dashboards: Flags outdated or quantum‑vulnerable crypto, tracks NIST‑approved PQC algorithms and provides prescriptive guidance for upgrading.

“We set out with a mission to give organizations the X‑ray vision they need to navigate the post‑quantum era,” said Alex Matrosov, CEO and Head of Research at Binarly. “As the premier software CBOM platform trusted by the Fortune 500, pairing Binarly’s deep code‑level insights with QuSecure’s unmatched network‑level excellence translates directly into faster, lower‑risk PQC migrations and bullet‑proof compliance.”

“By joining forces with Binarly, we’re helping to accelerate a new required bar for cryptographic discovery, visibility and control,” said Rebecca Krauthamer, Co-Founder and CEO of QuSecure. “Many organizations need help meeting emerging government and industry requirements for SBOMs, with CBOM cryptographic component audit requirements. With our partnership, enterprises can get that much closer to a continuous lifecycle of identifying weaknesses, remediating them, automating reporting, and transitioning confidently to quantum-resilient security at both the binary and network level.”

About Binarly

Binarly is a U.S.‑based software and firmware supply‑chain security company founded in 2021. The Binarly Transparency Platform helps device manufacturers, OEMs and enterprise security teams detect vulnerabilities, misconfigurations, secrets and malicious code in firmware and software components—while accelerating the shift to post‑quantum cryptography. Visit https://binarly.io for more information.

About QuSecure

QuSecure is a leader in quantum-safe cybersecurity with a mission to use the advent of quantum computing to act as a catalyst to fix the foundation of data security infrastructure. The QuProtect platform can be purchased through the AWS Marketplace or direct outreach to QuSecure, Accenture, Dell, Cisco, or Carahsoft. QuSecure’s quantum-resilient and crypto-agile solutions provide the lowest friction transition path to inventory your cryptographic communications and transition to quantum-resiliency anytime, anywhere, on any device, and across any organization. For more information, see www.qusecure.com.

Contacts

Media Contact:
Igor Gonebnyy
igor@binarly.io
650-471-4591

Binarly


Release Versions

Contacts

Media Contact:
Igor Gonebnyy
igor@binarly.io
650-471-4591

Social Media Profiles
More News From Binarly

Binarly Transparency Platform 3.5 Introduces Java Ecosystem Support, Enterprise-Scale YARA Integration, Smarter Automation

SANTA MONICA, Calif.--(BUSINESS WIRE)--Binarly, a leading provider of software supply chain security solutions, today released the Binarly Transparency Platform 3.5 with Java ecosystem support, full enterprise-grade YARA integration, and operational upgrades designed to meet the speed and scale of modern product security workflows. With this update, Binarly’s cryptographic algorithm identification engine now supports Java archives (JARs) and JVM bytecode, scanning both standalone and embedded f...

Binarly Names Rick Congdon Independent Board Member and Strategic Advisor; Appoints AppSec Leader Chris Eng as Strategic Advisor

SANTA MONICA, Calif.--(BUSINESS WIRE)--Binarly, the industry leader in software and firmware supply‑chain security, today announced Rick Congdon has joined the company as an Independent Board Member and Strategic Advisor. Congdon will provide expert guidance to steer Binarly’s global go-to-market and enterprise sales strategy. The company also appointed software security veteran Chris Eng as a Strategic Advisor focused on product vision and long-range roadmap. Congdon, a proven growth leader wh...

Binarly Patents New Method for Reachability Analysis for Binary Executables

SANTA MONICA, Calif.--(BUSINESS WIRE)--Binarly, a leading firmware and software supply chain security company, has been awarded U.S. Patent No. 12,287,885 for its invention of a new method for computing context-sensitive reachability analysis metrics across binary executables. The patented invention empowers security teams to determine not only whether a vulnerability exists, but how easily it could be exploited in a given real-world environment. Read the full patent (PDF). The reachability ana...
Back to Newsroom