U.S. stocks edge higher; solid earnings season continues
On Wednesday, 11 June 2025, Arqit Quantum (NASDAQ:ARQQ) participated in Sidoti’s Small-Cap Virtual Conference, where CFO Tracy Mear outlined the company’s strategic focus on quantum-resistant encryption. While acknowledging current revenue challenges, Mear emphasized the unique positioning of Arqit Quantum’s technology in protecting data against future quantum computing threats. The company is targeting key markets such as defense and telecom through strategic partnerships, despite the lengthy adoption process for new technologies.
Key Takeaways
- Arqit Quantum’s encryption software is designed to protect against quantum computing threats.
- The company is focusing on defense, government, and enterprise markets through partnerships.
- Revenue generation from a delayed EMEA contract has commenced, with more expected.
- Arqit Quantum has a cash reserve of $24 million with a monthly burn rate of $2.4 to $2.5 million.
- Plans for quarterly reporting might start in fiscal year 2026.
Financial Results
- Revenue generation began from a previously delayed EMEA contract.
- Anticipated revenue from a global tier one operator in the second half of the fiscal year.
- The company has $24 million in cash, with a monthly burn rate between $2.4 million and $2.5 million.
- Arqit Quantum remains comfortable with its cash position and has no immediate plans to seek additional capital.
Operational Updates
- Partnerships with TI Sparkle and Intel aim to provide quantum-safe network services.
- The company is working with over 10 major telecom operators, ranging from initial testing to final RFP stages.
- A collaboration with Carisoft on a Department of Defense contract is pending vendor approval.
- Contracts are operational across the US, Canada, Middle East, and UK, targeting telecom networks and defense sectors.
Future Outlook
- Arqit Quantum aims to maximize opportunities within its multi-year contracts.
- The company is targeting new customers among engaged telecom operators.
- There is a focus on realizing defense opportunities in the US and Europe.
- Arqit Quantum is developing a confidential computing strategy with Intel, with plans to announce a monetization strategy soon.
Q&A Highlights
- Revenue ramp-up is expected with the start of EMEA contracts and a global tier one operator.
- The adoption of new technology is slow, but there is increased market inquiry and urgency for quantum-safe solutions.
- Opportunities exist within data centers for confidential computing, addressing internal security needs.
For further details, readers are encouraged to refer to the full transcript provided below.
Full transcript - Sidoti’s Small-Cap Virtual Conference:
Anya Sodstrom, Senior Equity Analyst, Sidoti: Okay. So welcome to the Sidoti virtual micro cap conference. Thank you for joining us today. I’m Anya Sodstrom, senior equity analyst here at Sidoti. And as I mentioned, next up, we have Arcade Quantum.
I have, Tracy Mear, the chief financial strategy officer with me. And this will be conducted as a presentation by Tracy, and that will be followed by q and a. And if you would like to submit question, you can do so in the q and a function at the bottom of your screen. And with that, I’m happy to hand it over to you, Tracy. Welcome.
Tracy Mear, Chief Financial Strategy Officer, Arcade Quantum: Thank you, Anja, and welcome welcome to the ARCHET presentation. On your screen, we have our our traditional safe harbor statement. If you would like to read it at length, you can find it in our 20 f, which is filed with the SEC and was filed in December of twenty twenty four. Stepping back, our our mission is to keep safe the data and communication of governments, enterprises, and individuals. And how do we do that?
We do that utilizing our unique patented encryption software. It prevent it it protects against threats today, but increasingly important against threats that will emerge in the quantum era. When I say quantum era, what I’m talking about is quantum computers. And what are quantum computers? Quantum computers use the principles of quantum mechanics to process information, unlike today’s classical computers.
The unique element of quantum computers is that their computing power’s computing power is exponentially faster than today’s classical computers. As a result of that increased speed and power, quantum computer is gonna be able to address critical issues in drug discovery, material design, financial modeling, and optimizing logistics, amongst other problems that it can help solve. Unfortunately, a byproduct of the strength of quantum computers is that it presents a risk to today’s encryption, which is securing data and communication. When I say encryption, I mean, for instance, RSA, which is the leading encryption in use today, which many people may be familiar with. You know, the quantum computer oh, I’m sorry.
The quantum future is is being celebrated. The UN has designated 2025 as the International Year of Quantum Tech and Science. That’s celebrating the hundred year anniversary of the discovery of quantum mechanics. But it’s also celebrating the benefits that that are believed to be derived from quantum computer as we move forward. Last year, by the way, was the year of AI.
So when will quantum computers arrive? That is a fundamental question, and very intelligent minds can disagree as to the timing. As noted, the CEO of NVIDIA famously came out and said he thought they were twenty years out, and Bill Gates countered with three to five years out. We think it’s more important to look at developments in the marketplace to to benchmark when the arrival of of quantum computing may occur. Just yesterday, IBM announced that, it expects to complete its Starlink quantum computer, which is notable in that it’s a fault tolerant commercial scale quantum computer, and they expect to complete that by 2029.
That follows on a lot of other news marketplace regarding developments in in the quantum space by the likes of Amazon, Google, Microsoft in development of their respective quantum computing chips, but also developments by more upstart quantum computing companies such as Rigetti, D Wave, or IonQ. So taken in totality, if past is prologue, developments in the tech space tend to occur faster than the pundits expect, and we think that will be the case with quantum computers as well. So what is the threat today of a quantum computer that may not arrive for a period of time? And for this schematic, I’ve assumed arrival based upon IBM statements of 2029. So if you have data or communication that is not quantum resistant encrypted today and that data is stolen, that data is at risk of being decrypted upon the arrival of a quantum computer.
And so if that information is stolen or harvested today and it’s not quantum resistant, it can be decrypted tomorrow when that quantum computer arrives. However, if your data today is quantum resistant encrypted, upon the arrival of a quantum computer, you are still safe. So there is an imperative for governments and enterprises to adopt quantum resistant encryption today to protect against exposure of any information that has a shelf life in the future when a quantum computer arrives. This imperative is recognized by the US government. Going back several years, National Security Memorandum 10 noted the imperative of agencies to migrate to quantum safe cryptography.
The NSA is also on board with the need to to enhance today’s encryption solutions. Before departing the, the White House, the Biden administration issued an executive order, again, stressing the need to upgrade encryption. Even on the June 6, the Trump administration, while abrogating much of the Biden presidential executive order, still reinforced the need for an upgrade in quantum resistant encryption. Actually, the Biden order was beneficial to to ARC it in that it did not hold government agencies to using post quantum algorithms. It basically stated that agencies need to use certified quantum resistant cryptography solutions, and we certainly fall under that.
So encryption today uses what’s called public key cryptography. It’s a technology that that’s forty plus years old. At the heart of public key cryptography is mathematics. Factorization of large prime numbers are used to secure a channel between endpoints. And I always point to the little padlock on the bottom of the page.
So when you go shopping on Amazon and you see in your browser the little padlock, that represents to you that it’s a secure connection between you and Amazon or you and your bank. Unfortunately, that connection is predicated on mathematics. A quantum computer is essentially a doomsday math machine. A quantum computer can reverse engineer the factorization that’s at the heart of today’s public key cryptography. Some people are proposing solutions that enhance the mathematics associated with public key cryptography.
The limitations there are, as I stated, a quantum computer is a doomsday math machine. You might make the math a little harder for it, but inevitably, it’s going to break it. But also, enhancing the mathematics of public key cryptography has two derivative problems. One, is that it creates latency in communication, which network operators don’t like. And number two, it adds computational burden to endpoints because the map is heavy, and so it requires more processing power.
So quantum safe encryption, specifically symmetric key agreement cryptography. It’s the type of encryption that is used today by leading governments, military organizations, and corporations. It’s what’s called a zero trust architecture, and the essence of it utilizes identical long random numbers. And those long random numbers, identical at endpoints, allow two endpoints to create a secure link. There is nothing for a quantum computer to reverse engineer since it’s not based on mathematics.
Essentially, a quantum computer would need to use brute force guessing of all the possible combinations of the 256 bit number to be able to derive the long random number used within an algorithm to create that secure channel. Even a quantum computer will exhaust itself essentially trying to reverse engineer or guess, I should say, that 256 bit number. But the limitation on symmetric key cryptography has been the distribution of those identical long random numbers to endpoints. Effectively, what they do today is a courier with a thumb drive, to be simplistic, flies to New York, injects a long a bucket of long random numbers into a server, then flies to that entity’s London location, injects the same bucket of long random numbers into that server, and then those two servers in New York and London can create a secure channel because only they know those identical long random numbers. So very secure, but not a scalable business model.
What ARKit has done is we have solved the limitations of the distribution with our unique architecture, and it’s a heavily patented architecture. So in essence, and I’m not going to give an exhaustive tutorial on the tech because frankly, it’s well beyond my intellectual capacity. I would have to defer to my PhD colleagues. But essentially, an endpoint that wants to utilize Arquid’s symmetric key agreement cryptography, it is provisioned initially with what’s called a bootstrap key. Then, when two endpoints want to create a secure channel, Each endpoint takes its authentication information, goes out to Arkett’s Symmetric Key Agreement platform, which is cloud based, and then that authentication information is ratcheted, which means essentially transformed.
And then the transformed authentication information is returned to each endpoint. And then a process occurs between those two endpoints, and it’s essentially a process of discovery between the two endpoints for them to determine that the ratcheted, transformed information that they received is identical. They never tell each other what the ratcheted or transformed information is, but a series of questioning goes on between each endpoint until they understand that they have identical transformed information, at which point in time they can then use that information to create a secure channel between each entity. The key takeaway points here are, one, there’s no mathematics involved in any of this, so there’s nothing for a quantum computer to reverse engineer. Two, there’s no distribution of keys in this process.
So a malactor cannot interdict at any link in the chain and get a key, which they can then use to break the quantum safe connection. Because there is no distribution of keys, it’s really a process of discovery between endpoints to understand that they have identical information, and then they use that information to create that secure connection. ARCA hits the sweet spot for encryption. In the top right, I talked about public key cryptography, map based, can be broken, and and will be broken with, with your rivalry quantum computer. I also mentioned in the top left PQAs, which is nothing more than public key cryptography with more onerous mathematics.
Again, it math can be reverse engineered, plus it’s computationally heavy, plus it creates latency. Then there is another potential solution called quantum key distribution, which is a very secure solution, but it’s a solution that is limited by geography. Quantum key distribution starts to break down beyond, let’s for the sake of argument, say, 300 or 400 kilometers. So it’s a good solution for point to point, let’s say, between New York and Jersey City in New Jersey, but it’s not a good solution for New York to London. So ARKit, being symmetric key cryptography, which cannot be reverse engineered, plus it’s globally distributable, allowing endpoints anywhere in the world to create quantum safe channels between those endpoints, it really hits that sweet spot.
Use cases. Essentially, our solution can be used in any situation where data needs to be secured, whether in process or that data needs to be secured in transit or that data needs to be secured at rest. There are subsets under each of those use cases, and we are addressing many of those within the limitations of you know, within our financial limitations, personnel limitations, as we are still a young, small company. Market focus, again, there are countless market opportunities, but we have narrowed our focus to defense and government and also enterprise, specifically and most importantly, telecom network operators, critical infrastructure, and financial institutions. We are at different stages of of penetration of all of those markets, but, ultimately, those are our key focus at this stage of the game.
We started our journey as a company thinking we would sell directly to governments and enterprises, but but quickly realized that that was going to be a challenge for us given our scale, given the length of sales cycles, etcetera. So we pivoted to going to market with and through leading tech and network companies. We simplified it believing that it’s easier for end users to consume our product through product and applications that they’re already consuming. So that that was the strategy we pivoted to, almost a couple years ago now, and now we have are are taking that approach with leading partners such as those you see on the page in addition to others that we really have, you know, not an inability to, to announce at this stage. To give you an example that kind of brings together what we do and where we are, we announced a a contract with a global tier one telecom operator to provide the quantum safe element to a network as a service.
What does that all mean? It was a collaboration that brought together the fiber network of TI SPARQL, which is a global network operator. They wanted to be able to offer to their customers a quantum safe connection. And so partnering with us and Intel, Intel provides the the, server architecture utilizing its NetSec accelerator card. And on that accelerator card is Arket’s Symmetric Key Agreement cryptography.
And so essentially, it allows, again, Sparkle’s customers to sign up for a quantum safe fiber connection. All you have to do is read any news articles these days about the concern about undersea fiber connections, whether they’re being broken, but from our perspective, importantly, being tapped. And so a quantum safe connection, combats the tapping of fiber networks. So this kind of shows our partnership with leading IT and tech and network operators, bringing together all those elements in a solution that can be sold to end customers. But it also shows the business model.
This is, for us, a business to business to business business model. We essentially a vendor purchases a license from us for our software to be used by a defined number of endpoints and and essentially a defined number of encrypted connections, they, in turn, sell a turnkey solution to their end customers As take up from their end customers increase, the need to increase the vendor’s license with ARKit goes up as well. So as demand grows for the vendor’s solution, so grows the need to increase our cost our our contract, our license with the vendor. So, really, it’s a we are we are locked at the hip, our incentives are aligned, and we will grow as they grow. I did mention that one of the areas that that we are focused on is data and process.
This is a a security issue that is gonna be underappreciated by all but those individuals who are deeply embedded in in the tech world. The issue is if you have data flows within different environments, cloud environment, within a data center, those data flows can be exposed to the data center operator or to the cloud provider. So what organizations, be it government or enterprise, want to do is secure those data flows so they’re not exposed to the infrastructure operator, be it a data center or cloud. ARKit and Intel collaborated to create the symmetrically encrypted confidential computing solution. What that does is it allows governments and enterprises to secure their data flows within these environments.
Also, you can couple that with ARKit’s ability to secure data flows between environments, between a data center and a cloud or between clouds. This is a significant area of security focus, and it also one that represents a significant market opportunity. We are collaborating with Intel on how to on how best to monetize this opportunity, and it’s something that we hope to have more information about, within the calendar year. So I did note that that we are young from a revenue perspective, but we are starting to see we are starting to see some broadening of growth, both geographically and within the targeted vertical markets. We now have contracts in place and operational in The United States, Canada, Middle East, and The UK.
We also are seeing, contract success across telecom networks, IT services, US defense, European defense, and and government. So we focused our our vertical market opportunities, and we’re starting to realize on the ones that we have prioritized. So we are very pleased, to see that progress. What should you expect for 2025? I think the the key thing is we have announced, you know, several multiyear contracts.
The key is to maximize those opportunities, we need to align our resources and the resources of the vendor through whom we have gone to market to implement and deploy those solutions to drive uptake for that solution with the vendors and customers. Because as we as as uptake is increases with that vendor’s solution, so does the need to increase the license with ARKit. So we’re very focused on maximizing the opportunity within those announced contracts. But also, we need to take the lessons learned from those contracts, meaning from the initial engagement with that vendor through to the contract signing and then implementation of the solution in the marketplace, we need to take those best practices and apply those to the subsequent opportunities we have, in our pipeline. That way, we can speed successive opportunities to to market.
The other thing you can see us focused on is new logos. That’s critical to to to driving revenue for us. We we have indicated we’re engaged with with 10 plus major telecom operators, and and we will use the blueprint from that tier one telecom contract to to drive the journey for each of those 10 operators. All of the 10 are global brand name operators, and we are in various states of engagement with those operators. With some, it’s the initial test and integration activity, which is the beginning of a journey between ARKit and that prospective customer.
We have others that are post initial test and integration activity and we’re in a request for indicative terms state, so further down the journey. And lastly, we even have opportunities where we’re you know, significant opportunities where we’re in final round request for proposal. So while it is 10 engagements, they are in various stage of development from early to very late stage prior to contract. So it’s a pipeline that is increasing and we’re very excited about. The other thing we would expect to see is US and European defense opportunities come to fruition.
We had previously announced a DoD, our DoD contract on a program, a funded program of record. That contract was through, our distribution partner, Carisoft. It is with a a major, IT vendor. We we have PR for that in process. PR has been agreed between ourselves and Carousoft.
We are awaiting consent from this from this major IT vendor to release that PR. As you can imagine, with a major IT vendor, you know, our contract is probably not the biggest thing on their plate, and being a big organization will take some time for that PR to to move through their process. But, we remain hopeful that, that that would get out in short order. We we also, have eight systems integrators who are engaged with and or are bidding our solution into contract opportunities. So that’s that’s very exciting for us.
And these systems integrators range from highly specialized to global scale system integrators, and all serving the defense and national security market. So we’re very excited about the progress that we’re making there. Also, a key market focus for us is, as I noted earlier, one of them is financial institutions. And we were looking to convert our contract in that marketplace. We do have one activity going, in partnership with a telecom operator for an identified financial institution, trialing a solution that the financial institution, is interested in.
So that’s that’s an opportunity or area where we hope to see, some conversion and, and also be able to, to provide the investor community with more information as it comes to fruition. And finally, as I mentioned, we want to put in place a data in process, meaning confidential compute strategy, with our partner Intel and and monetize that. And so the hope is to be able to announce a go to market for that solution so that the path to monetization is is clear to the investor community. So with that, I will pause as this is an overview, and then I will take a look at what questions there may be.
Anya Sodstrom, Senior Equity Analyst, Sidoti: There are several questions, but we’re kind of out of time. And I just wanted to sort of briefly touch on on your when do you see sort of revenue start ramping for you? And can you also touch on what your balance sheet and cash burn and maybe Sure.
Tracy Mear, Chief Financial Strategy Officer, Arcade Quantum: Yeah, quickly. The in terms of revenue, as we noted, the the was, you know, exceedingly light on revenue. Let’s let’s let’s be frank. But part of the problem was the the multiyear contract in EMEA, which we had previously announced, that got delayed due to issues on the part of the end customer, but that’s commenced revenue generation right before the end of the half. Therefore, you will see know, revenue from that contract in the half.
You also, should expect to see revenue in the half from from our, global tier one operator. So that that those will be the beginning of the ramp. And, you know, given the pipeline that that I see, you know, we we hopefully will continue to see a steady build of of contracts upon contracts. So that’s that’s how the ARR model works. So if we can upsize existing contracts and bring in new logos, we should continue to see that build.
Quickly to your question, we we did tell we did say to the market we had approximately 24,000,000 of cash at the end of the end of the first half. Our burn is 22.4 to 2,500,000.0 per month. Suffice it to say, we are comfortable with our cash position. Obviously, we’re further into the half of the year, but I will reiterate, we remain comfortable with our cash position and are not currently looking for capital. Let me touch really quickly.
There are a couple of questions here. Someone did ask, would we be reporting on a quarterly basis? We do intend to do that at a point in the future. I think it probably it will not be this fiscal year, but I think it may be something that you see going into fiscal year twenty six. I did mention one of the questions was signpost for the next year or two.
I gave some indication of that. So when I asked about the DOD situation, I gave a little bit of color there. I talked, I touched briefly on the pay as we grow model. Primary bottlenecks, broader adoption of this. You know, that’s a great question.
I mean, you have to remember that any time you’re asking someone to adopt new technology, it’s not a decision that’s taken lightly. And if you apply that to your personal life, you know, if a fiber company comes in and says, hey, let’s replace your cable broadband, it seems like an easy decision. But then when you get down to considering it, there are many elements that need to be factored in. And so it is a longer decision process than, frankly, we appreciated when we started this journey. But we are starting to see increased inquiry, number one, and number two, a little bit of a sense of urgency on the part of some of our target markets to to have a plan and be implementing a plan to be quantum safe.
So we’re excited about the momentum that we see there. Obviously, we’d like it to be faster, and we certainly wish there was a hard stop date like Y2K to drive people to adoption. But, you know, we are seeing we are seeing increased need and awareness, so we’re we’re positive on that. Let me just quickly look. You touched on the cash burn.
Someone mentioned, you know, need for data center. You know, do we see data centers? What is the need and opportunity there? I mean, there’s two needs. One, there’s a need for the data center operator itself, and that definitely is an opportunity for us.
Obviously, though, we can’t shoot at all opportunities given our scale and our financial wherewithal. There’s also, as we’ve talked about, the need within the data center, and that’s what that’s what the confidential compute solution addresses, is protecting end users’ data flows within a data center. So it’s two tiered, and they’re both opportunities. Unfortunately, we can’t focus on all of them. So I think I just did some speed dating through a bunch of those questions that were posted by attendees.
Anya Sodstrom, Senior Equity Analyst, Sidoti: Yeah. And and that was good. We we covered those as well. And and to the extent you have more questions, I’m sure, the management team will make themselves available for you. If you want to schedule a one on one, I have a follow-up with with Tracy.
You can reach out to us at Sidoti or or or the company directly. And, I want to, hand it over to you, Tracy, for some closing remarks before we close it down.
Tracy Mear, Chief Financial Strategy Officer, Arcade Quantum: And I I just wanna say I I really appreciate all those who attended. We think that ARKit obviously has a very unique solution. And, you know, we have conviction that the need for our solution, you know, is increasing. All you have to do is stay abreast of the news. And, you know, as I like to say, you know, we’re we think we’re standing on the right street corner, and we can see the parade coming down the street.
So we’re we’re pretty pleased. But be patient with us. We’ll we’ll continue to to strive to drive revenue and increase shareholder value. So and we are available for follow-up conversations as we want to try and be as transparent and open with the market as we can be.
Anya Sodstrom, Senior Equity Analyst, Sidoti: Okay. Great. Thank you. Thank you, everyone, who participated. Have a good rest of your day.
Tracy Mear, Chief Financial Strategy Officer, Arcade Quantum: Thank you.
This article was generated with the support of AI and reviewed by an editor. For more information see our T&C.