Home
News
Tech Grid
Data & Analytics
Data Processing Data Management Analytics Data Infrastructure Data Integration & ETL Data Governance & Quality Business Intelligence DataOps Data Lakes & Warehouses Data Quality Data Engineering Big Data
Enterprise Tech
Digital Transformation Enterprise Solutions Collaboration & Communication Low-Code/No-Code Automation IT Compliance & Governance Innovation Enterprise AI Data Management HR
Cybersecurity
Risk & Compliance Data Security Identity & Access Management Application Security Threat Detection & Incident Response Threat Intelligence AI Cloud Security Network Security Endpoint Security Edge AI
AI
Ethical AI Agentic AI Enterprise AI AI Assistants Innovation Generative AI Computer Vision Deep Learning Machine Learning Robotics & Automation LLMs Document Intelligence Business Intelligence Low-Code/No-Code Edge AI Automation NLP AI Cloud
Cloud
Cloud AI Cloud Migration Cloud Security Cloud Native Hybrid & Multicloud Cloud Architecture Edge Computing
IT & Networking
IT Automation Network Monitoring & Management IT Support & Service Management IT Infrastructure & Ops IT Compliance & Governance Hardware & Devices Virtualization End-User Computing Storage & Backup
Human Resource Technology Agentic AI Robotics & Automation Innovation Enterprise AI AI Assistants Enterprise Solutions Generative AI Regulatory & Compliance Network Security Collaboration & Communication Business Intelligence Leadership Artificial Intelligence Cloud
Finance
Insurance Investment Banking Financial Services Security Payments & Wallets Decentralized Finance Blockchain Cryptocurrency
HR
Talent Acquisition Workforce Management AI HCM HR Cloud Learning & Development Payroll & Benefits HR Analytics HR Automation Employee Experience Employee Wellness Remote Work Cybersecurity
Marketing
AI Customer Engagement Advertising Email Marketing CRM Customer Experience Data Management Sales Content Management Marketing Automation Digital Marketing Supply Chain Management Communications Business Intelligence Digital Experience SEO/SEM Digital Transformation Marketing Cloud Content Marketing E-commerce
Consumer Tech
Smart Home Technology Home Appliances Consumer Health AI Mobile
Interviews
Anecdotes
Think Stack
Press Releases
Articles
  • Home
  • /
  • News
  • /
  • Cloud
  • /
  • Cloud Security
  • /
  • Arqit delivers quantum-safe protection enhanced by confidential computing Changing the rules of trust in cloud computing
  • Cloud Security

Arqit delivers quantum-safe protection enhanced by confidential computing Changing the rules of trust in cloud computing


Arqit delivers quantum-safe protection enhanced by confidential computing Changing the rules of trust in cloud computing
  • by: Source Logo
  • |
  • June 19, 2025

Arqit Quantum Inc. (Nasdaq: ARQQ, ARQQW), a leader in quantum-safe encryption, has announced the delivery of quantum-safe protection enhanced by confidential computing; data protection that helps ensure no third party, not even the cloud provider, can access a customer’s encryption keys or workloads, even when distributed across multiple hosts. Powered by Intel Trust Domain Extensions (Intel TDX) and Arqit NetworkSecure™, this solution strengthens the security of Arqit’s quantum-resistant crypto key delivery system.

With the right approach, organisations can now overcome long-standing cloud security challenges: gaining full control over encryption keys, securing data in transit, enabling trusted collaboration, and reducing the cost and complexity of additional hardware.

Protecting sensitive data in the cloud has always depended on placing trust in infrastructure providers despite the theoretical risk that they could access encryption keys or data as it moved between environments. This risk is now addressed.

With Arqit NetworkSecure running inside a Trusted Domain (TD) created by Intel TDX, encryption keys are:

  • Generated inside the Intel TDX enclave
  • Visible only to the TD owner
  • Rotated frequently
  • Protected with quantum-safe symmetric encryption between enclaves

Even Arqit and Intel are outside the trust boundary. This architecture provides advanced data sovereignty by design.

How It Works

In the Intel TDX environment, each TD is encrypted and isolated from other software, the hypervisor, and the infrastructure host. Arqit’s software operates inside this confidential VM, generating and managing encryption keys that never leave the TD. Keys are used to secure communications between TDs across hosts, enabling safe, quantum-secure data flows without exposing any secrets to the infrastructure.

Use Cases

  1. Network Security for Telcos
    Telcos deploying Network-as-a-Service (NaaS) or virtual RAN (vRAN) on white-box hardware face new security demands. Arqit NetworkSecure can now run inside an Intel TDX trust domain on these platforms, designed to keep traffic encryption and key management isolated and quantum-safe. Remote attestation helps verify the environment hasn’t been tampered with.

  2. Enterprise Edge & AI Workloads
    Large enterprises moving sensitive workloads between on-prem environments and the cloud need strong isolation and secure communication. Arqit and Intel TDX isolate the workload and secure the channel using symmetric keys, all without exposing processes inside TD to the cloud or the infrastructure provider.

  3. Virtual Hardware Security Modules (HSMs) for Critical Infrastructure
    Instead of costly physical Hardware Security Modules (HSMs), organisations can now deploy Arqit’s symmetric key platform inside TDs as a “virtual HSM” – cutting costs while meeting the highest security standards for cryptographic operations.

  4. Secure Collaboration Across Domains
    In sectors like defence, finance, and public services, data collaboration often involves multiple parties. Using secure enclaves and Arqit’s ephemeral key model, organisations can now enable secure, privacy-preserving analytics across trusted domains.

Looking Ahead

Confidential computing can elevate security to the next level. Security enhancements include:

  • Infrastructure that meets the highest bar
  • Zero key access for operators
  • Quantum-safe encryption as standard
  • Hardware-based trust anchors
  • Attestation independent of the provider’s infrastructure
  • Verified isolation through TD attestation

This level of assurance is especially vital in regulated industries like finance, defence, and national infrastructure.

Andy Leaver, CEO of Arqit:
“This collaboration with Intel delivers a powerful enhanced model for securing data in the cloud. By combining Intel’s trusted hardware with Arqit’s quantum-safe encryption, we’re giving customers full control of their security, removing infrastructure providers from the trust equation entirely. It’s a significant step forward for digital sovereignty, and demonstrates the future of confidential computing can be both stronger and simpler.”

Bob Ghaffari, Vice President, Network and Edge Group, Intel Corporation:
“Arqit’s quantum-safe encryption technology running in Intel TDX creates a powerful addition to confidential computing where data sovereignty and protection of the information you process are ever more important to organizations of any size and form.”

Further information here:

https://arqit.uk/resources/data-sovereignty-wit...

Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. 

Notes to Editors

 

About Arqit

Arqit Quantum Inc. (Nasdaq: ARQQ, ARQQW) supplies a unique encryption software service which makes the communications links of any networked device, cloud machine or data at rest secure against both current and future forms of attack on encryption – even from a quantum computer. Compatible with NSA CSfC Components and meeting the demands of NSA CSfC Symmetric Key Management Requirements Annexe 1.2. and RFC 8784, Arqit’s Symmetric Key Agreement Platform uses a lightweight software agent that allows end point devices to create encryption keys locally in partnership with any number of other devices. The keys are computationally secure and facilitate Zero Trust Network Access. It can create limitless volumes of keys with any group size and refresh rate and can regulate the secure entrance and exit of a device in a group. The agent is lightweight and will thus run on the smallest of end point devices. The product sits within a growing portfolio of granted patents. It also works in a standards compliant manner which does not oblige customers to make a disruptive rip and replace of their technology. In September 2024, Arqit was named as an IDC Innovator for Post-Quantum Cryptography, 2024. Arqit is winner of two GSMA Global Mobile Awards, The Best Mobile Security Solution and The CTO Choice Award for Outstanding Mobile Technology, at Mobile World Congress 2024, recognised for groundbreaking innovation at the 2023 Institution of Engineering and Technology Awards and winner of the National Cyber Awards’ Cyber Defence Product of the Year 2024 and Innovation in Cyber Award 2022, as well as the Cyber Security Awards’ Cyber Security Software Company of the Year Award 2022. Arqit is ISO 27001 Standard certified. www.arqit.uk

 

Media relations enquiries:
Arqit: pr@arqit.uk

Investor relations enquiries:
Arqit: investorrelations@arqit.uk

News Disclaimer
  • Share