NEXCOM Launches PQC-Ready Edge Server to Address Quantum Computing Security Risks

Quantum computers will break today's encryption. The transition starts now.
NEXCOM releases edge server designed to handle post-quantum cryptography without sacrificing network performance.

As quantum computing edges closer to breaking the mathematical foundations of modern encryption, a Taipei-based network appliance maker has answered with a purpose-built edge server designed to carry the heavier computational burden of post-quantum cryptography. NEXCOM's FTA 5190, released in May 2026, represents not merely a product launch but a recognition that the transition away from vulnerable encryption standards is already underway — and that the infrastructure supporting it must be ready before the threat fully arrives. The deeper question it poses is one civilization has faced before: how do we rebuild the walls while still living inside them?

  • Quantum computers, advancing faster than most enterprises have prepared for, are on a trajectory to render today's encryption mathematically obsolete — making the shift to post-quantum cryptography an urgent, non-negotiable infrastructure priority.
  • The new encryption algorithms demand dramatically larger keys and far more complex calculations, threatening to throttle the very edge networks that modern enterprises depend on for speed and real-time processing.
  • NEXCOM's FTA 5190 deploys Intel QuickAssist Technology to offload cryptographic work onto dedicated hardware, freeing the main processor to simultaneously handle AI, analytics, and other edge workloads without performance collapse.
  • Benchmark results show the server sustaining 3,500 post-quantum cryptographic connections per second per core and delivering 2.1 times higher throughput in hybrid encryption environments — margins wide enough to make the transition viable rather than painful.
  • The machine is engineered for the messy transitional middle ground, supporting old and new encryption standards simultaneously so organizations can harden their security posture now without waiting for a full infrastructure overhaul.

Quantum computers are coming, and when they arrive at sufficient scale, they will dissolve the mathematical locks protecting nearly everything transmitted across modern networks. NEXCOM, a Taipei-based network appliance company, has responded with the FTA 5190 — an edge server built specifically to carry the computational weight of post-quantum cryptography, the successor to encryption standards that quantum machines will eventually render useless.

The challenge is not simply adopting new algorithms. Post-quantum cryptography demands far larger encryption keys and vastly more complex calculations than current methods, creating a genuine performance crisis for edge servers — the machines that sit between users and central data centers, processing data locally and at speed. For many organizations, upgrading encryption without the right hardware could mean watching their networks slow to a crawl under the burden of stronger security.

The FTA 5190 addresses this directly. Built around Intel's Xeon 6 processor with up to 36 performance cores, 128 gigabytes of DDR5 memory, and a dense array of Ethernet connectivity options, the server is engineered for scale. Its defining feature is Intel QuickAssist Technology, which offloads cryptographic operations to specialized hardware — allowing encryption to run in parallel without consuming the CPU cycles needed for AI, analytics, and other simultaneous edge workloads.

NEXCOM's own testing found the server capable of 3,500 post-quantum cryptographic connections per second on a single core, with 2.1 times higher throughput in hybrid deployments mixing old and new encryption. These are not incremental gains — they are the difference between a manageable transition and an operationally damaging one.

What the FTA 5190 ultimately offers is a bridge through an unavoidable in-between period. Enterprises cannot abandon legacy encryption overnight; the shift will unfold over years, with both old and new standards running simultaneously. NEXCOM, which has built network security and edge AI platforms since 1992, is positioning this server as the infrastructure that makes that coexistence possible — letting organizations begin hardening against quantum threats today, without sacrificing the performance their operations depend on.

Quantum computers are coming, and they will break the encryption that protects nearly everything we send across networks today. This is not a distant threat—it is the reason NEXCOM, a Taipei-based maker of network appliances, just released a new edge server designed specifically to handle the computational weight of post-quantum cryptography, the encryption methods that will replace today's vulnerable standards.

The problem is straightforward but severe. Current encryption relies on mathematical problems that are hard for classical computers to solve. Quantum computers, once they reach sufficient scale, will solve those problems trivially. Organizations know this is coming. The shift to post-quantum cryptography is no longer optional—it is becoming mandatory. But there is a catch: the new encryption algorithms require much larger encryption keys and far more complex calculations than the methods they replace. For companies running distributed networks and edge servers—the computers that sit between users and central data centers, processing data locally—this creates a genuine infrastructure challenge. The computational demands are steep enough that simply upgrading to new encryption could cripple performance, slowing down the very networks that depend on speed.

NEXCOM's answer is the FTA 5190, a compact server built to absorb this computational load without breaking stride. The machine runs on Intel's Xeon 6 processor, which can pack up to 36 performance cores into a single socket. It supports up to 128 gigabytes of DDR5 memory and offers flexible storage options. For connectivity, it includes eight 25-gigabit Ethernet ports, eight 1-gigabit ports, and a slot for additional network modules. These specifications are not arbitrary—they are designed to handle the specific demands of post-quantum encryption at scale.

The real innovation lies in how the FTA 5190 handles the cryptographic work itself. The server uses Intel's QuickAssist Technology, a hardware acceleration feature that offloads encryption operations from the main processor cores. This is crucial. By delegating cryptographic tasks to specialized hardware, the server can process encryption in parallel, maintaining high throughput while keeping the main CPU cores free for other work—artificial intelligence, analytics, and the other computations that modern edge networks need to perform simultaneously.

NEXCOM tested the FTA 5190 against both current encryption standards and post-quantum algorithms. The results show the machine can handle up to 3,500 connections per second using post-quantum cryptography on a single processor core. In hybrid deployments that mix old and new encryption methods, the server achieved 2.1 times higher throughput than baseline configurations. Even with traditional cryptography, the FTA 5190 showed roughly double the performance of comparable systems. These are not marginal improvements—they are the difference between a smooth transition and a painful one.

What NEXCOM is really selling is a bridge. Organizations cannot flip a switch and move all their encryption to post-quantum standards overnight. The transition will take years. During that time, networks will need to support both old and new encryption simultaneously. The FTA 5190 is built to handle that messy, complicated middle ground without forcing companies to choose between security and speed. It lets them adopt quantum-resistant encryption now, while their infrastructure is still running the old standards, without watching their network performance collapse under the weight of the new algorithms.

The broader context matters here. NEXCOM, founded in 1992, operates through a division called Network and Communication Solutions that builds platforms for cybersecurity, SD-WAN, load balancing, and edge artificial intelligence. The company is positioning itself as a vendor that understands the specific challenges of distributed networks and the security problems that come with them. The FTA 5190 is one piece of a larger strategy to help enterprises prepare for a computing landscape where quantum threats are real and post-quantum cryptography is the only rational response.

For organizations running edge networks—and that includes most large enterprises now—the question is no longer whether to prepare for post-quantum cryptography, but how to do it without sacrificing the performance their business depends on. NEXCOM's answer is now available. Whether it becomes the standard solution or simply one option among many will depend on how quickly enterprises move to address the quantum threat, and how much performance degradation they are willing to tolerate in the meantime.

Post-quantum cryptography algorithms rely on larger key sizes and more complex computations, placing increased demands on infrastructure.
— NEXCOM product documentation
The Hearth Conversation Another angle on the story
Inventor

Why does quantum computing specifically threaten encryption? What makes it different from just a faster computer?

Model

Quantum computers exploit quantum properties—superposition and entanglement—to solve certain mathematical problems exponentially faster than classical computers. Current encryption relies on problems that would take a classical computer thousands of years to crack. A quantum computer could crack them in hours. It is not about speed in the traditional sense; it is about a fundamentally different way of computing.

Inventor

So organizations cannot just wait until quantum computers actually exist to worry about this?

Model

No. The threat is called "harvest now, decrypt later." Adversaries are already collecting and storing encrypted data today, betting that they will be able to decrypt it once quantum computers arrive. By then, the data may be worthless—or it may be worth everything. Financial records, health information, state secrets. Organizations need to encrypt sensitive data with quantum-resistant methods now, before it is too late.

Inventor

The FTA 5190 uses hardware acceleration to handle the computational load. Why is that necessary? Why not just use faster processors?

Model

Faster processors help, but post-quantum algorithms are not just computationally heavier—they are structurally different. They require larger keys and more complex operations. You could throw more CPU cores at the problem, but then you have no cores left for the other work the edge server needs to do. Hardware acceleration lets you offload the cryptographic work entirely, keeping the main processor free for everything else.

Inventor

Is this a permanent solution, or is it a bridge to something else?

Model

It is a bridge. No one knows exactly how post-quantum cryptography will evolve over the next decade. The standards are still being finalized. The FTA 5190 is built to handle the transition period—the messy years when networks need to support both old and new encryption at the same time. It buys organizations time to migrate without breaking their infrastructure.

Inventor

Who actually needs this right now? Is this urgent for most companies?

Model

It depends on the sensitivity of the data and the regulatory environment. Financial institutions, healthcare providers, government agencies—anyone handling data that needs to remain confidential for decades—should be moving now. For others, it is becoming urgent as regulations tighten and standards solidify. In two or three years, it will not be optional.

Contact Us FAQ