Menu

ITS Weak Cryptography Detection and Remediation System (WCDR)

WCDR combines methodology and software. It helps to find weak cryptography, assess the business impact, and securely implement remediation - algorithm upgrades, key rotations, protocol changes. The goal is crypto-agility: the ability to continuously modify cryptography according to current threats and standards.

What is the purpose of the WCDR?

ITS WCDR helps enterprises build a quantum-safe ecosystem. It is not a "plug & play" tool, but a combination of methodology and software that together provide true crypto agility - the ability to continuously adapt cryptography as threats and standards change. WCDR detects weak cryptography across applications and infrastructure, prioritizes remediation based on business impact, and securely manages change (algorithm upgrades, key rotation) with an emphasis on business continuity and audit trail. 

WCDR addresses both the formal dimension (audit preparation, supply chain requirements, governance) and the technological dimension (proper choice of algorithms, HSM/PKI, protocol configuration and integration points). The result is lower operational risk, better regulatory readiness (e.g. NIS2, GDPR, DORA, ISO 27001) and transparent evidence of progress. 

What do you get with WCDR?

  • Crypto agility: the sustained ability to flexibly change cryptography over time, not a one-off project. 
  • Visibility and control: authoritative inventory of cryptography (algorithms, keys, certificates, protocols, services, third parties). 
  • Faster decision-making and budgeting: backlog sorted by business impact and complexity, ready for management and board. 
  • Safely managed remediation: runbooks and controlled changes with evidence for audit and oversight bodies. 
  • Quick "quick wins": measurable steps that keep momentum and motivation up across the organization. 

How does WCDR work?

ITS methodology + orchestration platform: our platform (dTASK) unifies outputs into one workspace - tasks have owners, SLAs, runbooks; progress is visible in dashboards and audit-ready evidence (D-Tube) is created. 

Origin of the methodology and its validation: the WCDR methodology was prepared in collaboration with academic departments that have been working on post-quantum cryptography for a long time. We continu ously consult it with the professional community and confront it with current recommendations and standardization developments. At the same time, it is based on many years of practical experience with audits and deliveries of HW and SW (PKI/HSM, network elements, application integration). This makes the procedures realistic and feasible in real operation, not just theoretical. 

Automated core: WCDR leverages proven enterprise tools for inventory, risk analysis, and managed remediation (including integrations with IBM Quantum Safe and IBM Guardium Data Security Center family of products where appropriate for the client's environment). We tailor the Vendor stack to your standards and preferences. 

ITS WCDR framework

  • Clients education on quantum threats
  • Risk identification accross the infrastructure and applications
  • Automated scanning for weak cryptography
  • Classification of vulnerabilities
  • Integration of IBM Guardium Data Security Center
  • Roadmap for remediation and compliance
  • Custom remediation playbooks
  • Consultation with ITS security and infrastructure team
  • Cryptography upgrade using IBM remediator
  • Policy enforcement accross the hybrid cloud
  • Cryptoagility adoption
  • Ongoing threat detection
  • Agile adaptation to emerging quantum risks

Where can you be in 90 days*?

*Depending on the scope of the environment and the size of the organization, we are able to supply you with:

  • Authoritative inventory of cryptography across applications, certificates, protocols and services. 
  • Risk-ranked remediation plan with owners, effort estimates and milestones. 
  • First "quick wins": e.g. secure key rotation and priority algorithm upgrades. 
  • Dashboards and evidence for supply chain audits and questionnaires. 

Deployment and operation

  • On-prem/cloud/hybrid, with repeatable installation for multiple sites and teams. 
  • Sub-scripting model with optional packages according to the size of the environment and the required functions. 
  • Integration into existing tools(SIEM, ITSM/ServiceNow/Jira, PKI/HSM, CI/CD). 

Key elements of the WCDR service platform

  • dTASK - smart application for monitoring and management of services. 
  • Reduce operational risk - integration with PIM/PAM, MFA and other controls. 
  • Automatic detection, prioritization and correction of weak cryptography and configurations. 
  • Regulatory compliance support - d-Tube provides assignment, grouping, evaluation and archiving of tasks in accordance with requirements (e.g. GDPR, NIS2, DORA, ISO 27001). 

We are happy to help you too

Interested in more? Do you have questions?

Our awards

Společnost ITS nebo naši specialisté jsou držiteli následujících certifikací.

  • IBM Partner

    IBM Gold Partner

Looking for a partner for your IT?

Do not hesitate to contact us.

Michal Šon

Michal Šon

Director of Key Accounts

Anna Říhová

Anna Říhová

Business Development Manager

Jan Šafrata

Jan Šafrata

Business Development Manager

Sign up for our newsletter