SKA Central Controller (SKA-CC)
SKA-CC enables the deployment of a multi-tenant key management solution in virtualised data centre environments to facilitate the delivery of automated and scalable quantum-safe network services across thousands of endpoints.
SKA-Platform, deployed as SKA-CC, delivers telco-grade service SLAs for resilient network architectures through High Availability and Disaster Recovery capabilities.
Benefits of SKA-CC for Quantum-Safe Encryption
Operations
Real-time endpoint management with granular device policies for flexible network control, integration with current systems via REST APIs, and telco-grade resiliency options for high availability and disaster recovery.
Economics
Flexible tiered licensing, minimal infrastructure requirements and compatible with existing encryption standards, reducing operational and integration costs.
Compliance
Conforms to NIST SP 800-71 and CSNA 2.0, complies with NSM-10, NSA CSfC Symmetric Key Management Requirements Annex 2.1, FIPS 140-3 Inside.
Security
Provides dynamic key creation and rotation, zero-trust architecture support and future-proof cryptographic agility against evolving threats.
Protect your network today with quantum-safe encryption solutions
High-Assurance Security for Critical Sectors
Government, defence, telecommunications, and financial services rely on encryption that can withstand ever-evolving threats. Quantum safe encryption delivered through SKA-CC supports these requirements by aligning with emerging standards and providing consistent performance. Organisations that adopt early gain a security advantage and reduce long-term risk.
Use Case: uCPE-enabled NaaS
SKA-CC acts as the foundational security pillar in a Network-as-a-Service architecture. It enables automation and orchestration platforms to securely provision and manage quantum-safe, software-defined network services across uCPE deployments in any topology.

Additional use cases to follow.
SKA-CC enables the scalable and dynamic generation of quantum-safe keys on endpoints, which can be used for authentication and encryption across untrusted networks to safeguard sensitive data against both classical cyber threats and emerging quantum risks.