Webinar Recording - No More Blind Spots in Your Cryptographic Inventory Learn more

CryptoNext Compass

Inventory all your cryptography

Take back control of your cryptography with CryptoNext COMPASS and discover your cryptographic assets, create a complete inventory, and manage your post-quantum transition with a centralized approach.
COMPASS cryptography Discovery

Uncover your Cryptography with the CryptoNext COMPASS Suite

Cryptography is everywhere but rarely documented. It can be found in hardware equipment, applications and communication protocols. For this reason, migrating to post-quantum cryptography must begin with a comprehensive mapping phase. CryptoNext COMPASS Discovery is designed to provide you with this visibility: it is the first fully open solution specializing in the identification, inventory and governance of your cryptographic assets. In addition to building a migration strategy to PQC, it allows you to reveal your actual exposure today and regain long-term control over your cryptography.


CryptoNext COMPASS Analytics

The Platform for Cryptographic Discovery, Inventory, and Analysis

CryptoNext COMPASS Analytics aggregates and analyzes all relevant information from your IT system to simplify its overall management.

  • Automatically correlate data from heterogeneous sources to get a unified view of your cryptographic risks
  • Benefit from an open and scalable platform that easily integrates sensors (CryptoNext COMPASS Network Probe, EDR, CLM, source code scanner, etc.) through APIs and standard data formats
  • Customize CryptoNext COMPASS to fit your business and regulatory requirements
  • Quickly pinpoint the critical applications and systems that should be prioritized in your PQC migration strategy
  • Ensure traceability of your cryptographic assets to meet long-term audit requirements

Key Features

  • An interactive web interface offers data analysis and visualization, security policy compliance monitoring and customized reports
  • The centralized inventory storage of enriched CBOM objects is contained within a single database
  • Multi-sensor management provides simple integration and configuration of all your cryptographic sensors from the web interface
  • Multi-user management helps with authentication and permissions based on predefined roles (administrator, cryptography manager, user, etc.)
  • Enhanced security ensures secure boot, hardened OS, integrity checks and encrypted communications (post-quantum TLS 1.3)

CryptoNext COMPASS Network probe

High-performance Passive Network Probe

The CryptoNext COMPASS Network Probe detects and extracts all cryptographic data exchanged on your network in real time, ensuring continuous monitoring and protection of your data in transit.

  • Gain complete visibility into your network traffic with real-time, uninterrupted monitoring via TAP, extensive protocol detection and advanced packet analysis
  • Focus on what matters: only relevant data related to cryptographic vulnerabilities or critical services is reported
  • Deploy the probe easily without modifying the existing infrastructure by installing it passively via TAP, avoiding latency
  • Easily connect the probe to your ecosystem using standard APIs and formats. It is already seamlessly integrated with CryptoNext COMPASS Analytics
  • Scale your deployment at your own pace, beginning with a single probe that can be easily expanded to broaden network analysis coverage
  • Ensure the longevity of your cryptographic audits by broadly adopting the CBOM format to extend the scope and depth of your analyses over time
Network Probe, back of a server with cables

Key Features

  • In-depth packet analysis for TLS, SSH, and ISAKMP protocols
  • Automatic detection of over 100 IT/OT protocols
  • Supported throughput: real-time analysis up to 1 Gbps, soon extendable to 10 Gbps
  • Remote probe management via a REST API
  • Interoperability with any inventory platform via standard CBOM formats and REST/Kafka APIs
  • Enhanced security with secure boot, hardened OS, integrity checks and encrypted communications (post-quantum TLS 1.3)

Regulatory Landscape

The European Union Establishes Its PQC Vision

In a memo published on June 23, 2025, the European Commission outlined its roadmap for the transition to post-quantum cryptography. It recommends that by the end of 2026, all organizations complete and maintain a full inventory of their cryptographic assets. The Commission also recommends leveraging specialized tools and creating a Cryptographic Bill of Materials (CBOM). This step is described as a “no regret move,” as it helps structure risk management, prepare testing phases and prioritize the migration of critical use cases to PQC solutions.

European Commission

25+ Years of Post-Quantum Research

Backed by our internationally recognized expertise, we are at the forefront of the NIST standardization efforts.

20+ Implemented Use Cases

We have successfully deployed our post-quantum solutions in the banking, finance, defense, energy, aerospace, and public sectors.

Top 5 PCQ Leader

CryptoNext Security is recognized as a leading player in PQC by ABI Research, Bain Capital Ventures and IDC Innovators.

Cryptography: An Underestimated Risk with Real-World Consequences

Cryptographic risk remains significantly underestimated. In most organizations, there is limited visibility into where, how, and with which algorithms cryptography is deployed. This lack of awareness creates a blind spot in IT risk management that requires immediate attention. Taking back control over cryptography begins with a comprehensive mapping of cryptographic assets.


To address quantum risk, embrace crypto-agility