A probe scans every protocol surface that negotiates cryptography—TLS, SSH, SMTP, IMAP, RDP, database protocols, healthcare protocols, message brokers, filesystem sharing. Over twenty protocols across roughly thirty port variations. Each scan is graded A through F against CNSA 2.0 compliance timelines, and every result feeds a temporal trajectory—IMPROVING, DEGRADING, or STABLE—so you always know whether your migration is on pace. Seven discovery methods feed one cryptographic inventory. Pick the one that fits your workflow, or use them all.
Source code, dependencies, filesystems, networks, endpoints. Each method feeds the same inventory.
Find cryptographic usage in source code before it ships. Block weak crypto in CI/CD with exit-code gating.
Which dependencies use cryptography, whether they're quantum-safe, and the minimum version to upgrade to.
Scan filesystems for certificates, keys, and crypto configs. Know what's stored where.
Find every cryptographic service on your network. 80+ service types across 20+ protocols, graded A–F.
Analyze captured traffic from SPAN ports or network taps. 13-protocol detection. No agents, no active connections. Ideal for medical devices, SCADA, and OT networks.
Audit local machine crypto configuration. Registry settings, security policies, NTLM authentication.
Import Microsoft Defender for Endpoint software inventory exports. Zero-deployment crypto library census across large fleets.
Every scan adds to the history. Trends emerge automatically.
See grades improve or regress across your inventory.
Full scan history for every asset, every method.
What changed between scans — new findings, resolved issues, grade shifts.
Focus on what matters most for your deadlines.
At your current rate, will you hit CNSA 2027? 2030? 2035? Extrapolate compliance trajectory against real deadlines.
Standards-based outputs. Fits into existing workflows.
Single binary. Zero external dependencies. No data leaves your network.
Tarball with binaries, systemd unit, config template, and step-by-step install guide. Extract, configure, start.
Set PQPROBE_REQUIRE_AUTH to gate all non-public routes behind API key or OAuth. Bootstrap admin key generated on first run.
Container images for server, CLI, and static analyzer. Single-container deployment with embedded workers and SQLite.
No telemetry, no license server, no update checks. The only outbound connections are to the targets you scan.
We assess your cryptographic posture, deploy PQProbe on your infrastructure, and leave you with continuous monitoring that runs on your network.