What We Discover

Complete cryptographic visibility - everywhere you need it

Whether scanning your network remotely or diving deep into individual systems, TYCHON finds cryptographic assets that other tools miss.

🌐

Network Infrastructure & Services

Find Crypto on Every Device That Accepts Connections

What We Discover:

  • TLS/SSL certificates on web servers, APIs, and applications
  • SSH host keys and server configurations
  • Routers, switches, and firewall crypto configurations
  • Load balancers and reverse proxies
  • VPN concentrators and remote access gateways
  • Wireless access points and controllers

Business Impact:

"Discovered weak ciphers on a load balancer that was configured 8 years ago and never updated. One device could have compromised our entire compliance posture."

Scan Types: Remote network scanning, local listening ports

📹

IoT & Embedded Devices

Uncover Hidden Crypto in "Set It and Forget It" Systems

What We Discover:

  • IP cameras and video surveillance systems
  • Building automation and HVAC controllers
  • Industrial control systems (ICS/SCADA)
  • Medical devices and patient monitoring equipment
  • Smart building infrastructure
  • Legacy embedded systems

Business Impact:

"Found 80+ IP cameras using SSLv3 that weren't in our asset inventory. They'd been running for years with vendor default certificates."

Scan Types: Remote network scanning

💻

Endpoint Cryptography

See What's Actually Running on Your Workstations and Servers

What We Discover:

  • Crypto libraries loaded in active processes (OpenSSL, BoringSSL, etc.)
  • VPN clients and their quantum readiness status
  • IPSec tunnel configurations and encryption settings
  • Java crypto providers (Bouncy Castle, Conscrypt, etc.)
  • Active network connections and their cipher suites
  • Certificate stores and trusted root authorities

Business Impact:

"Every workstation had 3 different VPN clients installed. Only one was approved and PQC-ready. We had no idea users were bypassing our corporate VPN."

Scan Types: Local mode deep scanning

📁

Data-at-Rest & File Archives

Find Crypto Assets Hiding in Your File Systems

What We Discover:

  • Certificate files (PEM, DER, P12, PKCS12, JKS)
  • Encrypted email archives (.pst, .ost, .pab files)
  • Private keys and keystores
  • SSL/TLS bundles and certificate chains
  • Old vendor certificates in backup directories
  • Accidentally exposed crypto material

Business Impact:

"Found certificates in Outlook archives from a payment processor we stopped using 5 years ago. The certs were expired but the keys were still on our file server - massive compliance risk we didn't know existed."

Scan Types: Local filesystem scanning, file server audits

🔐

Post-Quantum Readiness

Assess Your Exposure to Quantum Computing Threats

What We Discover:

  • Vulnerable RSA and ECC implementations
  • Hybrid PQC support (X25519MLKEM768, etc.)
  • Cipher suite security levels and quantum resistance
  • Migration prioritization based on risk scoring
  • Algorithm deprecation timelines

Business Impact:

"Got a 100-point quantum readiness score for each system. Finally had data to build our PQC migration roadmap instead of guessing where to start."

Scan Types: Both remote and local modes

📊

Historical & Inactive Assets

Track What Changed and What Disappeared

What We Discover:

  • Assets that are no longer active
  • When certificates were last seen
  • Removed or decommissioned systems
  • Certificate lifecycle and rotation history
  • Audit trail with timestamps

Business Impact:

"Could prove to auditors exactly when we removed the vulnerable cipher suites. Historical tracking turned a compliance nightmare into a 10-minute conversation."

Scan Types: Both modes with database tracking

Discovery Coverage by Scan Mode

What We Find Remote Local
TLS/SSL Certificates ✓✓✓ ✓✓✓
SSH Host Keys ✓✓✓ ✓✓
Network Devices ✓✓✓
IoT Equipment ✓✓✓
Crypto Libraries in Memory ✓✓✓
VPN Clients ✓✓✓
IPSec Tunnels ✓✓✓
Certificate Files ✓✓✓
Email Archives (.pst) ✓✓✓
Active Connections ✓✓ ✓✓✓
Quantum Readiness Score ✓✓✓

Use Remote for:

Network-wide visibility

Use Local for:

Endpoint compliance & deep discovery

Use Both for:

Complete organizational coverage

Ready to See What You're Missing?

Discover hidden cryptographic assets before auditors or attackers do.