Encryption standards finalized. Federal deadlines set. The hardware to back it up has been quietly lagging. NEXCOM’s new edge server is a direct answer to that gap.
Adversaries are already collecting encrypted data. Not to read now. To read later, once quantum computers grow powerful enough to break the encryption protecting it. The attack has a name: harvest now, decrypt later. And it is active.
That context is what makes NEXCOM’s timing matter. The Taipei-based network appliance maker this week released the FTA 5190, a 1U edge server purpose-built for post-quantum cryptography workloads. The pitch is practical: support today’s encryption standards while running next-generation algorithms in parallel, without degrading performance at the edge.
The Mandate Is Already Written
NIST finalized three post-quantum encryption standards in August 2024 — FIPS 203, 204, and 205, derived from CRYSTALS-Kyber, CRYSTALS-Dilithium, and SPHINCS+. Federal agencies were told to begin transitioning immediately. The commercial sector watched and started doing the math on its own timelines.
The numbers since have gotten harder. Under Executive Order 14306, TLS 1.3 adoption is mandatory across federal systems by January 2, 2030. New National Security System acquisitions must meet CNSA 2.0 requirements by January 1, 2027. Defense contractors, financial institutions, and critical infrastructure operators sitting on long-lived sensitive data are not waiting for further instructions.
The problem is the algorithms themselves are expensive to run. Post-quantum schemes use larger key sizes and more complex math than their classical predecessors. On a general-purpose edge server already juggling AI inference, threat detection, and SD-WAN traffic management, that overhead lands badly.
What the FTA 5190 Actually Solves
Intel’s Xeon 6 SoC powers the platform, with up to 36 performance cores and up to 128GB DDR5 memory. Connectivity runs to eight 25GbE SFP+ ports and eight 1GbE ports, with an expansion slot for additional LAN modules.
The architecture decision that matters is Intel QuickAssist Technology. QAT offloads cryptographic operations entirely from the main processor, running them in parallel rather than competing with everything else the edge server is doing. The CPU stays available. Latency stays predictable.
NEXCOM’s performance testing shows the results: up to 3,500 connections per second per core under PQC algorithms, 2.1x TLS throughput improvement in hybrid deployments, and 2x performance gains with traditional cryptography. Vendor-measured, so independent validation is the next step — but the QAT offload mechanism behind those numbers is well-documented across prior deployments.
The 2.1x hybrid figure is the one that actually matters for most buyers right now.
Nobody Is Flipping a Switch
Clean migration to post-quantum cryptography is not how this plays out in practice. Enterprises will spend years running classical and post-quantum algorithms side by side — validating interoperability, updating protocols, cycling credentials across thousands of endpoints. Standards bodies including NIST and Germany’s BSI both back hybrid approaches as the realistic path forward.
That is the mode the FTA 5190 is designed for. The transition period, not the destination.
NEXCOM is not the only company selling into this space. Palo Alto Networks, Juniper, and Cisco have all flagged PQC readiness on their roadmaps. The FTA 5190 targets something more specific: organizations that need purpose-built edge hardware with dedicated cryptographic acceleration, rather than software patches applied to existing infrastructure. In financial services, defense supply chains, and critical infrastructure, that distinction tends to drive procurement decisions.
The Clock Running in the Background
Cryptographically relevant quantum computers are projected to arrive between 2030 and 2035. That feels distant. It is not, measured against enterprise upgrade cycles, procurement lead times, and the reality that data encrypted today under RSA may still need to be protected a decade from now.
NEXCOM has shipped edge appliances across SD-WAN, SASE, and 5G uCPE deployments since its 1992 founding. The FTA 5190 extends that footprint into quantum-era security without requiring enterprises to redesign their networks to get there.
The regulatory deadlines are not moving. The harvest is already underway. The infrastructure question is whether organizations are building to meet both or planning to catch up later.
Sources
- NEXCOM FTA 5190 Product Page
- NEXCOM FTA 5190 Solution Brief
- NIST Finalizes Post-Quantum Encryption Standards
- CISA PQC Product Categories
Editorial Disclosure
This article is based on a press release issued by NEXCOM International Co., Ltd. and expanded with independent regulatory and industry data. NEXCOM International Co., Ltd. is a privately held company headquartered in Taipei, Taiwan, and is not traded on any major public exchange. No securities are discussed in this article. Performance figures cited reflect vendor-published testing results and have not been independently verified; readers should refer to NEXCOM’s published solution brief for full methodology. Post-quantum cryptography regulatory timelines referenced are subject to revision as federal agencies issue updated guidance. This article does not evaluate, recommend, or endorse any cybersecurity product or vendor. The information provided on this website is for informational and educational purposes only. Our content is derived strictly from verified online sources to ensure accuracy and objectivity. This analysis does not constitute financial, investment, or professional advice. Readers are encouraged to consult with qualified professionals before making decisions based on this information. For more information, please see our full DISCLAIMER.


