Crypto-agile. Quantum-safe.

MyPQC Platform unifies discovery, migration, and sovereign post-quantum cryptography into a single control plane, so your organisation is ready for what's next, not blindsided by it.

Platform Architecture

The MyPQC Platform: A Post Quantum Cryptography certified Platform.

Three layers, one platform: ready-to-use applications, cryptographic services you can build on, and a crypto-agility core engine that powers the whole platform. Each layer plugs cleanly into the next — all accessible through a single API layer.

MyPQC Platform architecture: 3rd party enterprise software and Tier-1 system integrators connect through the API Layer into the MyPQC Platform — the MyDigital Platform of ready-to-use applications (Sovereign PQC Digital ID, MCERT Crypto Inventory & Monitoring, Quantum-safe File Storage/Sharing/Signing, Quantum-safe Messaging & Video Calls), Core Cryptographic Services (PQC Certificate Issuance & Management, Digital ID Management, Cryptography Inventory & Monitoring), and the Crypto Agility Core Engine providing Risk, Agility Middleware, PQC Orchestration, and Policy Enforcement.
MyPQC Platform

Three layers. One platform.

The MyPQC Platform mirrors the architecture above: ready-to-use applications on top, sovereign cryptographic services in the middle, and a crypto-agility engine at the foundation. Each layer plugs cleanly into the next.

App Layer · MyDigital Platform (MDP) Ready-to-use enterprise applications — drop-in tools your teams use every day.
APP · 01

MCERT Crypto Inventory

1-Click Deep Scan. Instant Arahan No.9 compliance.

  • Inventory, CBOM, SBOM & risk register
  • Hardware to application-layer discovery
  • Configurable workflow & resources
APP · 02

Self-Sovereign Identity

Own your digital identity. Integrates with existing IAM.

  • Decentralized, user-centric model
  • W3C DID v1.1 with PQC
  • Digital Signature Act compliant
APP · 03

Quantum-safe File Sharing

Share securely. Revoke anytime.

  • Drag-and-drop with PQC encryption
  • Post-delivery revocation
  • Immutable versioning
APP · 04

PQC Document Signing

Sign anything. Verify publicly.

  • Hybrid classical + PQC signing
  • Any file type supported
  • Public verification portal
Cryptographic Services Layer Encryption, hashing, and digital signatures that protect data confidentiality, integrity, and authenticity — unreadable to unauthorised parties, verifiable by intended recipients.
SVC · CA

Enterprise Certificate Authority

Enterprise PKI for enterprise systems, users & devices.

  • No per-certificate cost
  • Automated deployment to domain devices
  • Custom lifecycles & trust policies
SVC · DID

Digital ID Management

Identity registry and verifiable credentials.

  • DID registry & resolution
  • Verifiable Credential lifecycle
  • X.509 linkage for legal compliance
SVC · MON

Inventory & Monitoring

Discovery, risk, compliance — continuously.

  • Continuous cryptographic discovery
  • Real-time risk scoring
  • Arahan No.9 evidence reports
Crypto Agility Core Engine Layer The foundation. One configuration change rolls a new algorithm to every service and application above.
ENGINE

Crypto & Cipher Agility

Change algorithms without code changes.

  • CISO portal · enterprise-wide change
  • Scheduled zero-disruption migration
  • JCE bridge · <5% code change
  • Full backward compatibility
Deployment & Scale

Deploy where you need. Scale when you need.

The platform is designed to fit existing infrastructure — no two organisations share the same setup. Cloud, dedicated, on-premise, or hybrid: as your cryptographic footprint grows, the platform scales with it. New nodes join automatically, data replicates, and nothing goes offline. Modules scale workers independently, so a spike in one area never bottlenecks another. Resource allocation, quotas, and feature access are controlled precisely at the tenant level.

Cloud Multi-Tenant

Shared infrastructure, strict tenant isolation. Fastest time-to-value.

Dedicated Cloud

Single-tenant dedicated infrastructure. For strict regulatory needs.

On-Premise

Your data centre. Air-gapped, classified, sovereign environments.

Hybrid

Mix cloud + on-premise. Scanners local, analytics cloud-based.

Add Nodes

Auto-joins cluster. Data replicates. No restart needed.

Add Processes

Each module scales workers independently.

Per-Tenant Control

Tiers control resources, quotas, features.

Self-Healing

Failed processes restart in milliseconds.

Track Record

20+ years securing Malaysia's most critical infrastructure

We are not new to cryptography. Since 2007, we have been building and operating PKI and cryptographic infrastructure for Malaysia's largest institutions.

20+
Years in cryptographic security
6
Major national-level deployments
5
Countries served
1M+
Transactions secured per session
Period
Engagement
Impact
2007–2022
CENTRAL BANK OF MALAYSIA
1M transactions/2hrs; billions in RENTAS; nCipher, Thales, Utimaco HSM — still in production
2009–2020
Government Public Key Infrastructure (GPKI)
MAMPU GPKI platform; smartcard & USB token; round-robin CA issuance; DTS audit-passed
2013–2020
eCourt PKI
Nationwide lawyer deployment; digitally signed court document submission
2014–2017
Secure PDF / ePIN Mailer — TelkomselSecure PDF / ePIN Mailer — CIMBSecure PDF / ePIN Mailer — Bank Mandiri
Telkomsel Indonesia; CIMB 5 countries; Bank Mandiri — thousands of ePIN daily
2019
JUPEM — Map Protection
~100MB digitised maps; distributed key distribution with HQ fail-over
2020–Now
PQC Focus & Research — NIST
UPM partnership; KAZ-SIGN NIST submission; TLS 1.3 PQC; NACSA Sandbox participant

Antrapolation's work is built from the ground up to align with Malaysia's strictest regulatory requirements and directives.

Arahan No.9
NACSA's Chief Executive Order mandating cryptographic inventory and compliance reporting across all government agencies
MySEAL
Malaysia's digital signature and electronic transaction standards — fully integrated into our signing and identity modules
BNM RMiT
Bank Negara Malaysia Risk Management in Technology — secure financial cryptography and key management built-in
PDPA Ready
Personal Data Protection Act compliance through encrypted identity, zero-knowledge proofs, and audit trails
About Us

Advanced cryptographic security,
built for the region

Antrapolation Technology is a trusted provider of advanced data security solutions, serving clients across the financial, government, and private sectors throughout the region. We operate primarily through strategic partners, allowing us to remain sharply focused on cryptographic technologies — from industry-standard implementations to custom-built, military-grade security systems.

Our Post-Quantum Cryptography (PQC) initiative, developed in collaboration with esteemed local cryptographers, positions us at the forefront of future-proof data protection and robust digital identity authentication, both in Malaysia and internationally.

Government & Defence

Sovereign PQC certificates, classified file sharing, NACSA/MySEAL compliance.

Banking & Finance

BNM RMiT-aligned inventory, zero-downtime migration across banking apps.

Telecommunications

Massive network element audits, policy-driven migration from a central dashboard.

Legal & Professional

Hybrid PQC document signing, public verification, per-client access control.

Healthcare

Patient record confidentiality with long-term cryptographic guarantees.

Critical Infrastructure

Sovereign cryptography for power, water, and transport networks.

Purpose
Empowering a world where digital freedom, privacy, and trust are the default
Vision
To Secure a Sovereign Digital Future
Mission
To build secure interoperable cryptographic and identity infrastructure that enables digital data sovereignty

Start securing your organisation against quantum threats.

The migration to post-quantum cryptography is a present imperative. Reach out and we'll scope a pilot with your team within a week.

Request a Demo → View Platform

Antrapolation Technology Sdn. Bhd.

Incorporated
2012
Address
Suite 3B-16-6, Block 3B, Level 16,
Plaza Sentral, KL Sentral,
Jalan Stesen Sentral 5,
50470 Kuala Lumpur, Malaysia

Request a Demo

Our team will reach out within 24 hours.