List of SandboxAQ AQtive Guard Customers
Palo Alto, 94301, CA,
United States
Since 2010, our global team of researchers has been studying SandboxAQ AQtive Guard customers around the world, aggregating massive amounts of data points that form the basis of our forecast assumptions and perhaps the rise and fall of certain vendors and their products on a quarterly basis.
Each quarter our research team identifies companies that have purchased SandboxAQ AQtive Guard for Vulnerability Management from public (Press Releases, Customer References, Testimonials, Case Studies and Success Stories) and proprietary sources, including the customer size, industry, location, implementation status, partner involvement, LOB Key Stakeholders and related IT decision-makers contact details.
Companies using SandboxAQ AQtive Guard for Vulnerability Management include: U.S. Department of Health and Human Services (HHS), a United States based Government organisation with 62000 employees and revenues of $96.00 billion, SoftBank Japan, a Japan based Communications organisation with 18895 employees and revenues of $43.66 billion, United States Department of Defense, a United States based Government organisation with 1000 employees and revenues of $250.0 million and many others.
Contact us if you need a completed and verified list of companies using SandboxAQ AQtive Guard, including the breakdown by industry (21 Verticals), Geography (Region, Country, State, City), Company Size (Revenue, Employees, Asset) and related IT Decision Makers, Key Stakeholders, business and technology executives responsible for the software purchases.
The SandboxAQ AQtive Guard customer wins are being incorporated in our Enterprise Applications Buyer Insight and Technographics Customer Database which has over 100 data fields that detail company usage of software systems and their digital transformation initiatives. Apps Run The World wants to become your No. 1 technographic data source!
Apply Filters For Customers
| Logo | Customer | Industry | Empl. | Revenue | Country | Vendor | Application | Category | When | SI | Insight | Insight Source |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
SoftBank Japan | Communications | 18895 | $43.7B | Japan | SandboxAQ | SandboxAQ AQtive Guard | Vulnerability Management | 2024 | n/a | In 2024, SoftBank Japan deployed SandboxAQ AQtive Guard as part of an IT and security vulnerability management effort. SandboxAQ AQtive Guard, categorized as Vulnerability Management, was operated by SoftBank's Advanced Research Group to discover cryptographic and certificate based vulnerabilities across networks, endpoints, and applications, and the deployment was validated against a monitored local government network. The implementation emphasized cryptographic posture management and Discover style capabilities inferred from the engagement, with configuration oriented toward scanning certificate inventories, assessing cryptographic configuration and algorithm usage, and mapping crypto assets across network and endpoint layers. Functional modules and workflows focused on automated discovery, posture analysis, and certificate validation to evaluate cryptographic hygiene and support assessments of post quantum readiness. Operational coverage was concentrated in Japan and led by the Advanced Research Group, with the engagement scoped as an IT and security vulnerability management initiative that touched security operations, research and network engineering functions. Governance and rollout were structured around validation in a monitored environment, feeding outputs into vulnerability handling and remediation workflows rather than broad production change until findings were assessed. | |
|
|
U.S. Department of Health and Human Services (HHS) | Government | 62000 | $96.0B | United States | SandboxAQ | SandboxAQ AQtive Guard | Vulnerability Management | 2025 | n/a | In 2025, the U.S. Department of Health and Human Services (HHS) engaged SandboxAQ AQtive Guard to conduct a post quantum cryptographic inventory across public health IT systems. ASPR partnered with SandboxAQ to identify vulnerabilities, remediate risks, and advance compliance with federal cybersecurity mandates. The implementation used SandboxAQ AQtive Guard and leveraged cryptographic posture management along with the Discover module to enumerate cryptographic assets, catalogue keys and certificates, and surface quantum vulnerable algorithms. These capabilities were applied as core Vulnerability Management workflows, providing automated detection of weak or exposed cryptographic material, risk classification, and remediation workflow generation. Operational scope concentrated on ASPR managed public health networks in the United States, with remediation prioritization tied to agency compliance requirements. Governance changes included instituting inventory driven remediation prioritization and folding cryptographic posture assessments into existing security and compliance processes. The engagement delivered a documented inventory of cryptographic exposures, prioritized remediation actions, and advanced HHS alignment with federal cybersecurity mandates through focused vulnerability identification and risk remediation using SandboxAQ AQtive Guard. | |
|
|
United States Department of Defense | Government | 1000 | $250M | United States | SandboxAQ | SandboxAQ AQtive Guard | Vulnerability Management | 2025 | n/a | In 2025, the United States Department of Defense engaged SandboxAQ AQtive Guard under a five-year agreement announced December 10, 2025 to accelerate discovery and inventory of cryptographic assets across department systems. The DoD implemented SandboxAQ AQtive Guard in the Vulnerability Management category to support cryptographic posture management and post-quantum migration planning, using the product’s Automated Cryptographic Discovery & Inventory capability as the focal functionality. This engagement is positioned under the DoD Chief Information Officer for enterprise oversight and alignment with federal cybersecurity objectives. The deployment centers on automated discovery and centralized inventory capabilities, with configuration focused on cataloging keys, certificates, algorithm usage and cryptographic parameters. SandboxAQ AQtive Guard is configured to produce an authoritative cryptographic asset registry, classify cryptographic artifacts by algorithm and lifecycle status, and surface inventory data for use in migration planning and remediation prioritization. Workflows emphasize continuous or scheduled discovery, data normalization, and inventories that map cryptographic assets to business and IT owners for follow up. Operational scope covers department systems across the DoD, with technical implementation designed to ingest discovery telemetry and inventory exports into enterprise workflows for cybersecurity operations, IT asset management, compliance, and cryptographic migration planning. Integrations are oriented toward consolidating discovery outputs into existing governance and planning processes, enabling teams responsible for cryptographic hygiene and post-quantum readiness to access a single source of truth. The implementation supports risk and compliance functions by providing artifact-level visibility required for coordinated migration timelines. Governance is retained by the DoD CIO office under the five-year agreement, and operational rollout is framed as an enterprise program to instrument continuous cryptographic discovery and inventory as part of routine security operations. Implementation workstreams include inventory feed governance, role-based access to the cryptographic registry, and process changes to incorporate inventory outputs into remediation and migration planning cycles. The narrative reflects a programmatic adoption of SandboxAQ AQtive Guard in Vulnerability Management to strengthen cryptographic posture management within DoD IT and cybersecurity functions. |
Buyer Intent: Companies Evaluating SandboxAQ AQtive Guard
Discover Software Buyers actively Evaluating Enterprise Applications
| Logo | Company | Industry | Employees | Revenue | Country | Evaluated | ||
|---|---|---|---|---|---|---|---|---|
| No data found | ||||||||