Fast forward to 2025, and the urgency has only grown. Multiple U.S. federal agencies, along with leading universities and private-sector research labs, are running quantum computing prototypes. The U.S. National Quantum Initiative Act has been reauthorized and expanded, funding new quantum research hubs across the country. International competitors, especially China, have accelerated their own programs, making it clear that quantum leadership is as much a national security issue as it is a technology race.
While quantum computing's promise is enormous, agencies must now focus on how to prepare for the changes it will bring, especially in security, infrastructure, and IT operations.
Quantum Security: The Encryption Time Bomb
One of the biggest risks associated with quantum computing is its potential to render current encryption methods obsolete. Mature quantum computers will be able to solve certain mathematical problems exponentially faster than today’s systems. This includes the public-key cryptography that underpins secure internet communications, encrypted databases, email systems, and more.
The intelligence community has been sounding the alarm for years. The U.S. National Counterintelligence and Security Center released updated guidance in late 2024, warning that “strategic competitors” are actively working on quantum programs designed to break U.S. cyber defenses.
The National Institute of Standards and Technology (NIST) has already selected its first set of post-quantum cryptography (PQC) algorithms, and agencies are now expected to begin planning their transition. The bottom line is clear: agencies need to inventory their cryptographic assets, identify where vulnerable algorithms are in use, and set timelines for migrating to PQC before the threat becomes real.
Building a Quantum-Ready Infrastructure
Preparing for quantum computing is not just about new algorithms or faster processors. It is about ensuring the surrounding infrastructure can handle the unique demands of this technology.
Beyond R&D investments in computing components, a quantum-capable infrastructure may require:
- Significant increases in cooling capacity to handle quantum processors’ extreme environmental needs
- Higher power availability to support quantum data centers and labs
- Specialized networking for quantum communication protocols, which may or may not be compatible with existing fiber infrastructure
- Signal amplification solutions that can transmit quantum information across campuses, cities, and states without degrading fidelity
A coordinated approach will be critical. Federal agencies, educational institutions, standards bodies like NIST, and private-sector technology providers will need to collaborate closely. In addition, partnerships with international allies will help the United States create a trusted quantum ecosystem that aligns with shared values and security requirements.
IT Monitoring at Quantum Speed
Quantum computing will not just change processing speeds, it will change how IT environments are monitored, managed, and maintained.
On the positive side, quantum systems may all but eliminate certain categories of IT outages and glitches, such as those caused by some types of configuration changes. However, they will also introduce new challenges. For example:
- How will existing monitoring tools scale to manage a hybrid classical-quantum infrastructure?
- Will agencies need completely new protocols for visibility into quantum systems?
- How will incident response processes need to adapt to quantum-era risks?
How can agencies scale the tools they use to monitor, manage, and maintain today’s systems to a quantum-based infrastructure? And is it possible to do without losing some level of visibility?
The answer in 2025 appears to be a hybrid approach. Agencies are beginning to integrate quantum simulation environments into existing IT monitoring platforms, including solutions like SolarWinds Observability Self-Hosted and SolarWinds® Security Event Manager, so they can test performance, capacity, and incident workflows before deploying actual quantum hardware.
Steps Agencies Can Take Now
While large-scale quantum computing may still be several years away, the “store now, decrypt later” threat means agencies cannot afford to wait on preparation. Here are some immediate steps worth considering:
- Inventory encryption usage across systems and data.
- Plan the migration to NIST’s post-quantum cryptography standards.
- Evaluate infrastructure needs for power, cooling, and networking.
- Engage in cross-sector collaboration to align on standards and interoperability.
- Integrate quantum-readiness into IT monitoring and incident response playbooks.
Quantum Readiness Is a Team Sport
Establishing the infrastructure, network, and security to support quantum computing at the agency level may seem like a Herculean task. But the payoff is substantial: maintaining the United States’ technological leadership, safeguarding sensitive national security data, and ensuring mission continuity in a post-quantum world.
It will take more than just R&D investment to get there. It will take planning, partnerships, and practice across government, academia, industry, and allied nations. Agencies that start now will be ready to lead when quantum computing moves from the lab into everyday operations.
This blog was first published on August 22, 2022