| Original | Translation |
|---|---|
| Arqit Quantum Inc. (ARQQ) Q4 2025 Earnings Call December 9, 2025 11:00 AM EST Company Participants Andrew Leaver - CEO & Director Nicholas Pointon - Chief Financial Officer Conference Call Participants Scott Buck - H.C. Wainwright & Co, LLC, Research Division Troy Jensen - Cantor Fitzgerald & Co., Research Division Presentation Operator On today's call, we will be referencing to the press release issued this morning that details the company's full fiscal year 2025 results, which can be downloaded from the company's website at arqitgroup.com. [Operator Instructions]. Finally, a recording of the call will be available on the Investors section of the company's website later today. | Arqit Quantum Inc. (ARQQ) 2025 νκ³μ°λ 4λΆκΈ° μ€μ λ°ν 컨νΌλ°μ€ μ½ 2025λ 12μ 9μΌ μ€μ 11μ (λ―Έκ΅ λλΆ νμ€μ) νμ¬ μ°Έμμ Andrew Leaver - μ΅κ³ κ²½μμ(CEO) κ²Έ μ΄μ¬ Nicholas Pointon - μ΅κ³ μ¬λ¬΄μ± μμ(CFO) 컨νΌλ°μ€ μ½ μ°Έμ μ λ리μ€νΈ Scott Buck - H.C. Wainwright & Co, LLC, 리μμΉ λΆλ¬Έ Troy Jensen - Cantor Fitzgerald & Co., 리μμΉ λΆλ¬Έ λ°ν μ΄μμ μ€λ 컨νΌλ°μ€ μ½μμλ μ€λ μμΉ¨ λ°νλ 보λμλ£λ₯Ό μ°Έμ‘°ν μμ μ΄λ©°, μ΄ μλ£λ νμ¬μ 2025 νκ³μ°λ μ 체 μ€μ μ μμΈν λ€λ£¨κ³ μμ΅λλ€. ν΄λΉ μλ£λ νμ¬ μΉμ¬μ΄νΈ arqitgroup.comμμ λ€μ΄λ‘λνμ€ μ μμ΅λλ€. [μ΄μμ μλ΄μ¬ν]. λ§μ§λ§μΌλ‘, μ€λ 컨νΌλ°μ€ μ½ λ Ήμ·¨λ‘μ μ€λ λ¦κ² νμ¬ μΉμ¬μ΄νΈμ ν¬μμ μΉμ μμ νμΈνμ€ μ μμ΅λλ€. |
| Please note that this webcast includes forward-looking statements. Statements about the company's beliefs and expectations concerning words such as may, will, could, believe, expect, anticipate and similar expressions are forward-looking statements and are based on assumptions and beliefs as of today. The company encourages you to review the safe harbor statements, risk factors and other disclaimers contained in today's press release as well as the company's filings with the Securities and Exchange Commission, which identify specific risk factors that may cause actual results or events to differ materially from those described in our forward-looking statements. | λ³Έ μΉμΊμ€νΈμλ λ―ΈλμμΈ‘μ§μ μ΄ ν¬ν¨λμ΄ μμμ μ μνμκΈ° λ°λλλ€. '~ν μ μλ€(may)', '~ν κ²μ΄λ€(will)', '~ν μ μμ κ²μ΄λ€(could)', 'λ―Ώλλ€(believe)', 'μμνλ€(expect)', 'κΈ°λνλ€(anticipate)' λ° μ΄μ μ μ¬ν ννμ ν¬ν¨νλ νμ¬μ μ λ κ³Ό κΈ°λμ κ΄ν μ§μ μ λ―ΈλμμΈ‘μ§μ μ΄λ©°, μ€λ νμ¬μ κ°μ κ³Ό λ―Ώμμ κΈ°λ°ν κ²μ λλ€. νμ¬λ μ¬λ¬λΆκ»μ μ€λ λ°νλ 보λμλ£μ ν¬ν¨λ μμ ν μ‘°ν(safe harbor statements), μνμμΈ λ° κΈ°ν λ©΄μ± μ‘°νκ³Ό λλΆμ΄ μ¦κΆκ±°λμμν(SEC)μ μ μΆλ νμ¬μ μ κ³ μλ₯λ₯Ό κ²ν νμ€ κ²μ κΆμ₯ν©λλ€. μ΄λ€ μλ£λ μ€μ κ²°κ³Όλ μ¬κ±΄μ΄ λΉμ¬μ λ―ΈλμμΈ‘μ§μ μ κΈ°μ λ λ΄μ©κ³Ό μ€μ§μ μΌλ‘ λ€λ₯Ό μ μλ ꡬ체μ μΈ μνμμΈλ€μ λͺ μνκ³ μμ΅λλ€. |
| The company does not undertake to publicly update or revise any forward-looking statements after this webcast. And now I'd like to turn the call over to Andy Leaver, the company's Chief Executive Officer. Andy? Andrew Leaver CEO & Director Thank you, and thank you for joining our fiscal year 2025 earnings call. From my vantage point, fiscal 2025 was a year of building momentum. The issue which Arqit's products and services address, specifically the current weaknesses in encryption and the future threat posed by quantum computers moved up the risk register of enterprises and governments around the world. | νμ¬λ λ³Έ μΉμΊμ€νΈ μ΄ν λ―ΈλμμΈ‘μ§μ μ 곡κ°μ μΌλ‘ μ
λ°μ΄νΈνκ±°λ μμ ν μ무λ₯Ό μ§μ§ μμ΅λλ€. μ΄μ νμ¬μ μ΅κ³ κ²½μμμ΄μ Andy Leaverμκ² λ°μΈκΆμ λκΈ°κ² μ΅λλ€. Andy? Andrew Leaver CEO κ²Έ μ΄μ¬ κ°μ¬ν©λλ€. 2025 νκ³μ°λ μ€μ λ°ν 컨νΌλ°μ€ μ½μ μ°Έμ¬ν΄ μ£Όμ μ κ°μ¬ν©λλ€. μ κ΄μ μμ λ³Ό λ, 2025 νκ³μ°λλ λͺ¨λ©ν μ ꡬμΆν ν ν΄μμ΅λλ€. Arqitμ μ νκ³Ό μλΉμ€κ° ν΄κ²°νκ³ μ νλ λ¬Έμ , νΉν νμ¬ μνΈνμ μ·¨μ½μ κ³Ό μμ μ»΄ν¨ν°κ° μ κΈ°νλ λ―Έλμ μνμ΄ μ μΈκ³ κΈ°μ κ³Ό μ λΆμ 리μ€ν¬ κ΄λ¦¬ μ°μ μμμμ μμλ‘ μ¬λΌκ°μ΅λλ€. |
| It was a year of building momentum for the company as well, momentum in prospective customer engagements across our key markets, momentum in revenue and momentum in contracted backlog coming into fiscal year 2026. Fiscal year 2025 was also a year of broadening our product and service footprint. Our acquisition of Ampliphaeβ's Encryption Intelligence product and risk advisory services broadens our engagement with current and prospective customers to address the migration journey to a post-quantum cryptographic posture from beginning to end. | μ΄λ νμ¬μκ²λ λͺ¨λ©ν μ ꡬμΆν ν ν΄μμ΅λλ€. μ£Όμ μμ₯ μ λ°μ κ±ΈμΉ μ μ¬ κ³ κ° μ°Έμ¬μ λͺ¨λ©ν , λ§€μΆμ λͺ¨λ©ν , κ·Έλ¦¬κ³ 2026 νκ³μ°λλ‘ μ§μ νλ κ³μ½ μκ³ μ λͺ¨λ©ν μ΄ μμμ΅λλ€. 2025 νκ³μ°λλ λν λΉμ¬μ μ ν λ° μλΉμ€ μμμ νλν ν΄μ΄κΈ°λ νμ΅λλ€. Ampliphaeμ μνΈν μΈν 리μ μ€ μ νκ³Ό 리μ€ν¬ μλ¬Έ μλΉμ€ μΈμλ κΈ°μ‘΄ λ° μ μ¬ κ³ κ°κ³Όμ κ΄κ³λ₯Ό νλνμ¬ ν¬μ€νΈ μμ μνΈν 체κ³λ‘μ λ§μ΄κ·Έλ μ΄μ μ¬μ μ μ²μλΆν° λκΉμ§ μ§μν μ μκ² ν΄μ€λλ€. |
| Innovative collaborations with Intel and Sparkle broaden our product solution sets to include confidential computing, which is an exciting emerging market opportunity and quantum secure communications across the optical transport layer. Finally, the year was marked by further building upon past successes, specifically replicating past successes in the telecom network sector and defense sectors with additional contract wins. The need for enhanced cryptography is ever increasing, particularly with each new announcement of advances in quantum computing capability. Organizations are increasingly aware of the need to address the issue. | μΈν λ° μ€νν΄κ³Όμ νμ μ μΈ νλ ₯μ ν΅ν΄ λΉμ¬μ μ ν μ루μ ν¬νΈν΄λ¦¬μ€κ° νλλμ΄, ν₯λ―Έλ‘μ΄ μ ν₯ μμ₯ κΈ°νμΈ κΈ°λ° μ»΄ν¨ν (confidential computing)κ³Ό κ΄μ μ‘ κ³μΈ΅ μ λ°μ κ±ΈμΉ μμ 보μ ν΅μ μ ν¬ν¨νκ² λμμ΅λλ€. λ§μ§λ§μΌλ‘, μ¬ν΄λ κ³Όκ±°μ μ±κ³΅μ λμ± λ°μ μν¨ ν ν΄μμΌλ©°, νΉν ν΅μ λ€νΈμν¬ λΆλ¬Έκ³Ό λ°©μ μ°μ λΆλ¬Έμμ κ±°λ κ³Όκ±°μ μ±κ³΅μ μΆκ° κ³μ½ μμ£Όλ₯Ό ν΅ν΄ μ¬ννμ΅λλ€. κ°νλ μνΈν κΈ°μ μ λν νμμ±μ μ§μμ μΌλ‘ μ¦κ°νκ³ μμΌλ©°, νΉν μμ μ»΄ν¨ν μλμ λ°μ μ΄ λ°νλ λλ§λ€ λμ± κ·Έλ¬ν©λλ€. μ‘°μ§λ€μ μ΄ λ¬Έμ λ₯Ό ν΄κ²°ν΄μΌ ν νμμ±μ μ μ λ μΈμνκ³ μμ΅λλ€. |
| We have seen a change in the market from awareness of the issue to action to address. The level of action is uneven across and within market segments. However, it is no longer a question of if organizations need to upgrade their cryptographic posture, but when they will upgrade their posture. Arqit recently was invited to present to a leading U.S. securities industry regulatory organization about the rise of quantum computing and the threat it poses to cybersecurity for the financial industry. One of the most interesting questions posed was, what can we, as a regulatory body, do to support and encourage a transition to post-quantum security? | μ°λ¦¬λ μμ₯μ΄ μ΄μμ λν μΈμ λ¨κ³μμ μ΄λ₯Ό ν΄κ²°νκΈ° μν νλ λ¨κ³λ‘ λ³ννλ κ²μ λͺ©κ²©νμ΅λλ€. νλμ μμ€μ μμ₯ μΈκ·Έλ¨ΌνΈ κ° κ·Έλ¦¬κ³ μΈκ·Έλ¨ΌνΈ λ΄μμ κ³ λ₯΄μ§ μμ΅λλ€. κ·Έλ¬λ μ΄μ λ μ‘°μ§λ€μ΄ μνΈν 보μ νμΈλ₯Ό μ κ·Έλ μ΄λν΄μΌ νλμ§μ μ¬λΆκ° μλλΌ, μΈμ μ κ·Έλ μ΄λν κ²μΈμ§μ λ¬Έμ μ λλ€. Arqitμ μ΅κ·Ό λ―Έκ΅μ μ£Όμ μ¦κΆμ κ³ κ·μ κΈ°κ΄μΌλ‘λΆν° κΈμ΅μ κ³ μ¬μ΄λ²λ³΄μμ λν μμμ»΄ν¨ν μ λΆμκ³Ό κ·Έκ²μ΄ μΌκΈ°νλ μνμ λν΄ λ°νν΄ λ¬λΌλ μ΄μ²μ λ°μμ΅λλ€. κ°μ₯ ν₯λ―Έλ‘μ λ μ§λ¬Έ μ€ νλλ "κ·μ κΈ°κ΄μΌλ‘μ μ°λ¦¬κ° ν¬μ€νΈ μμ 보μμΌλ‘μ μ νμ μ§μνκ³ μ₯λ €νκΈ° μν΄ λ¬΄μμ ν μ μλκ°?"μμ΅λλ€. |
| From Arqit's perspective, the invitation to present and the question asked demonstrated the increased urgency, which is being felt across key market sectors to move to a post-quantum encryption posture. Many government, security agencies and regulatory bodies across the globe are mandating or encouraging the migration to post-quantum cryptography. Some are even imposing deadlines. Top-down pressure plus increased awareness of the issue at the CTO or CISO level within organizations is driving increased action to address the issue. As a result of this market trend, Arqit's marketing programs and announced successes, we have seen increased activity with prospective customers. | Arqitμ κ΄μ μμ λ³Ό λ, λ°ν μ΄μ²κ³Ό μ§λ¬Έλ€μ μ£Όμ μμ₯ λΆλ¬Έ μ λ°μμ μμ μ΄ν μνΈν(post-quantum encryption) 체κ³λ‘μ μ νμ λν κΈ΄λ°κ°μ΄ λμμ§κ³ μμμ 보μ¬μ£Όμμ΅λλ€. μ μΈκ³μ λ§μ μ λΆ, 보μ κΈ°κ΄ λ° κ·μ λΉκ΅λ€μ΄ μμ μ΄ν μνΈν(post-quantum cryptography)λ‘μ μ νμ μ무ννκ±°λ κΆμ₯νκ³ μμ΅λλ€. μΌλΆλ μ¬μ§μ΄ λ§κ° κΈ°νμ λΆκ³Όνκ³ μμ΅λλ€. νν₯μ(top-down) μλ ₯κ³Ό μ‘°μ§ λ΄ CTO λλ CISO μμ€μμμ μ΄ λ¬Έμ μ λν μΈμ μ¦κ°κ° μ΄ λ¬Έμ λ₯Ό ν΄κ²°νκΈ° μν μ‘°μΉ νλλ₯Ό μ΄λκ³ μμ΅λλ€. μ΄λ¬ν μμ₯ μΆμΈ, Arqitμ λ§μΌν νλ‘κ·Έλ¨ λ° λ°νλ μ±κ³Όλ€μ κ²°κ³Όλ‘, μ°λ¦¬λ μ μ¬ κ³ κ°λ€κ³Όμ νλμ΄ μ¦κ°νλ κ²μ λͺ©κ²©νμ΅λλ€. |
| The first step with prospective customers is a demonstration and test engagement. In the first 2 months of this fiscal year, we have already signed 12 demonstration and test engagements. The pace of engagements is running well ahead of fiscal 2025. We believe this is the best barometer of building market migration towards a post-quantum cybersecurity preparedness, and it signals increasing awareness of Arqit's symmetric key agreement encryption platform as a compelling solution. We have a proven solution to address the weaknesses of today's encryption and the threat posed by quantum computers. | μ μ¬ κ³ κ°κ³Όμ 첫 λ²μ§Έ λ¨κ³λ μμ° λ° ν μ€νΈ κ³μ½μ λλ€. λ³Έ νκ³μ°λ 첫 2κ°μ λμ μ΄λ―Έ 12건μ μμ° λ° ν μ€νΈ κ³μ½μ 체결νμ΅λλ€. κ³μ½ 체결 μλλ 2025 νκ³μ°λλ₯Ό ν¬κ² μμκ³ μμ΅λλ€. μ ν¬λ μ΄κ²μ΄ ν¬μ€νΈ μμ μ¬μ΄λ² 보μ λλΉλ₯Ό ν₯ν μμ₯ μ΄λμ κ°λ νλ μ΅κ³ μ μ§νλΌκ³ λ―ΏμΌλ©°, μ΄λ Arqitμ λμΉν€ ν©μ μνΈν νλ«νΌμ΄ μ€λλ ₯ μλ μ루μ μΌλ‘μ μΈμ§λκ° λμμ§κ³ μμμ λνλ λλ€. μ ν¬λ μ€λλ μνΈνμ μ·¨μ½μ κ³Ό μμ μ»΄ν¨ν°κ° μ κΈ°νλ μνμ ν΄κ²°ν μ μλ κ²μ¦λ μ루μ μ 보μ νκ³ μμ΅λλ€. |
| However, we recognize that as an organization that once they migrate to a post-quantum encryption posture, needs to understand its current cryptographic landscape, its risk exposure before it can take steps to upgrade its encryption architecture. We lacked an important capability, namely risk advisory tool to help organizations take the first important step to understand its risk. In May, we acquired Ampliphaeβ's product portfolio IP and innovations team, specializing in encryption risk advisory and AI analytics. | κ·Έλ¬λ μ°λ¦¬λ μ‘°μ§μ΄ μμλ΄μ± μνΈν 체κ³λ‘ μ ννκΈ° μν΄μλ λ¨Όμ νμ¬μ μνΈν νκ²½κ³Ό μν λ ΈμΆλλ₯Ό νμ ν νμμΌ μνΈν μν€ν μ²λ₯Ό μ κ·Έλ μ΄λνλ μ‘°μΉλ₯Ό μ·¨ν μ μλ€λ μ μ μΈμνκ³ μμ΅λλ€. μ°λ¦¬λ μ‘°μ§λ€μ΄ μνμ μ΄ν΄νλ μ€μν 첫 λ¨κ³λ₯Ό λ°μ μ μλλ‘ λλ μ€μν μλ, μ¦ μν μλ¬Έ λκ΅¬κ° λΆμ‘±νμ΅λλ€. 5μμ μ°λ¦¬λ μνΈν μν μλ¬Έ λ° AI λΆμ μ λ¬Έ κΈ°μ μΈ Ampliphaeμ μ ν ν¬νΈν΄λ¦¬μ€ IPμ νμ νμ μΈμνμ΅λλ€. |
| Ampliphaeβ's Encryption Intelligence risk analysis tools, which we acquired, give organizations complete visibility into all encryption technologies in use across the network, automatically identifying weak points and vulnerabilities, including those susceptible quantum attacks. The encryption intelligence risk analysis tools offer CISOs and CTOs an on-ramp for their post-quantum migration. They cannot address issues which they cannot see. Encryption intelligence shines a light on the problem. While a revenue opportunity in and of itself, encryption intelligence is also a sales lead generator for our symmetric key encryption solutions. | Ampliphaeμ μνΈν μΈν 리μ μ€ μν λΆμ λꡬλ λΉμ¬κ° μΈμν κ²μΌλ‘, μ‘°μ§μκ² λ€νΈμν¬ μ λ°μμ μ¬μ©λλ λͺ¨λ μνΈν κΈ°μ μ λν μμ ν κ°μμ±μ μ 곡νλ©°, μμ 곡격μ μ·¨μ½ν λΆλΆμ ν¬ν¨ν μ½μ κ³Ό μ·¨μ½μ μ μλμΌλ‘ μλ³ν©λλ€. μνΈν μΈν 리μ μ€ μν λΆμ λꡬλ CISOμ CTOμκ² ν¬μ€νΈ μμ λ§μ΄κ·Έλ μ΄μ μ μν μ§μ λ‘λ₯Ό μ 곡ν©λλ€. κ·Έλ€μ λ³Ό μ μλ λ¬Έμ λ ν΄κ²°ν μ μμ΅λλ€. μνΈν μΈν 리μ μ€λ μ΄λ¬ν λ¬Έμ μ λΉμ λΉμΆ₯λλ€. κ·Έ μμ²΄λ‘ μμ΅ κΈ°νμΈ λμμ, μνΈν μΈν 리μ μ€λ λΉμ¬μ λμΉν€ μνΈν μ루μ μ λν μμ 리λ μμ± λꡬμ΄κΈ°λ ν©λλ€. |
| Our encryption Intelligence product, combined with Arqit's Quantum Encryption Technology delivers a comprehensive proposition to identify and mitigate cyber risk exposure from both current and future quantum threats. Arqit can help organizations detect, protect and comply. What I mean by that is, firstly, we can help organizations detect their cryptographic risk exposure through the use of encryption intelligence. Secondly, we can help organizations enhance and protect their networks and IT infrastructure through use of our quantum-safe symmetric key agreement encryption solutions. | μ ν¬μ μνΈν μΈν 리μ μ€(Encryption Intelligence) μ νμ Arqitμ μμ μνΈν κΈ°μ (Quantum Encryption Technology)κ³Ό κ²°ν©λμ΄, νμ¬μ λ―Έλμ μμ μνμΌλ‘λΆν° λ°μνλ μ¬μ΄λ² 리μ€ν¬ λ ΈμΆμ μλ³νκ³ μννλ ν¬κ΄μ μΈ μ루μ μ μ 곡ν©λλ€. Arqitμ μ‘°μ§λ€μ΄ νμ§(detect), 보νΈ(protect), κ·Έλ¦¬κ³ κ·μ μ€μ(comply)λ₯Ό ν μ μλλ‘ μ§μν©λλ€. ꡬ체μ μΌλ‘ λ§μλ리면, 첫째, μ ν¬λ μνΈν μΈν 리μ μ€λ₯Ό νμ©νμ¬ μ‘°μ§λ€μ΄ μνΈν 리μ€ν¬ λ ΈμΆμ νμ§ν μ μλλ‘ μ§μν©λλ€. λμ§Έ, μ ν¬λ μμ μμ λμΉν€ ν©μ μνΈν μ루μ (quantum-safe symmetric key agreement encryption solutions)μ μ¬μ©νμ¬ μ‘°μ§λ€μ΄ λ€νΈμν¬μ IT μΈνλΌλ₯Ό κ°ννκ³ λ³΄νΈν μ μλλ‘ μ§μν©λλ€. |
| And thirdly, organizations can migrate to a post-quantum encryption posture that is compliant with cybersecurity guidance from leading governmental agencies and trade groups as our encryption intelligence tools map against leading security agency recommendations and our encryption solutions meet all such recommendations, including the National Security Agency's commercial solutions for classified symmetric key management requirements. While a concise marketing phrase detect, protect and comply captures the essence of what we do and the value proposition which we offer customers. | μ μ§Έ, μ‘°μ§λ€μ λΉμ¬μ μνΈν μΈν 리μ μ€ λκ΅¬κ° μ£Όμ 보μ κΈ°κ΄μ κΆκ³ μ¬νκ³Ό λ§€νλκ³ , λΉμ¬μ μνΈν μ루μ μ΄ λ―Έκ΅ κ΅κ°μ보κ΅(NSA)μ κΈ°λ° λμΉν€ κ΄λ¦¬ μꡬμ¬νμ μν μμ© μ루μ μ ν¬ν¨ν λͺ¨λ κΆκ³ μ¬νμ μΆ©μ‘±ν¨μ λ°λΌ, μ£Όμ μ λΆ κΈ°κ΄ λ° μ κ³ λ¨μ²΄μ μ¬μ΄λ²λ³΄μ μ§μΉ¨μ μ€μνλ μμλ΄μ± μνΈν 체κ³λ‘ μ νν μ μμ΅λλ€. 'νμ§, 보νΈ, μ€μ'λΌλ κ°κ²°ν λ§μΌν λ¬Έκ΅¬κ° λΉμ¬κ° νλ μΌκ³Ό κ³ κ°μκ² μ 곡νλ κ°μΉ μ μμ ν΅μ¬μ λ΄κ³ μμ΅λλ€. |
| Adding encryption intelligence to our portfolio is an important broadening of our offering to assist clients in their end-to-end migrations. Another important point to add broadening of our product portfolio was the announcement of our collaboration with Intel to bring symmetric key cryptography into the trusted domain created by Intel's TDX Enclave. What that means to the less technically inclined is workloads can move between on-premise and cloud environments, which is secure and confidential. Hence, it is called confidential computing. The security of workloads in process and transit is a vital importance to CTOs and CISOs. | μ°λ¦¬ ν¬νΈν΄λ¦¬μ€μ μνΈν μΈν 리μ μ€λ₯Ό μΆκ°ν κ²μ κ³ κ°μ μλν¬μλ λ§μ΄κ·Έλ μ΄μ μ μ§μνκΈ° μν μ ν μ 곡 λ²μμ μ€μν νλμ λλ€. μ ν ν¬νΈν΄λ¦¬μ€ νλμ κ΄λ ¨νμ¬ λ λ€λ₯Έ μ€μν μ¬νμ Intelμ TDX Enclaveκ° μμ±ν μ λ’° λλ©μΈμ λμΉν€ μνΈνλ₯Ό λμ νκΈ° μν Intelκ³Όμ νλ ₯ λ°νμμ΅λλ€. κΈ°μ μ μΌλ‘ λ μ΅μνμ λΆλ€μ μν΄ μ€λͺ λ리μλ©΄, μ΄λ μν¬λ‘λκ° μ¨νλ λ―Έμ€μ ν΄λΌμ°λ νκ²½ κ°μ μμ νκ³ κΈ°λ°μ΄ 보μ₯λλ λ°©μμΌλ‘ μ΄λν μ μλ€λ μλ―Έμ λλ€. λ°λΌμ μ΄λ₯Ό κΈ°λ° μ»΄ν¨ν (confidential computing)μ΄λΌκ³ λΆλ¦ λλ€. μ²λ¦¬ μ€μ΄κ±°λ μ μ‘ μ€μΈ μν¬λ‘λμ 보μμ CTOμ CISOμκ² λ§€μ° μ€μν μ¬μμ λλ€. |
| Confidential computing is increasingly important as it is an element of the rise in market focus on trust and data sovereignty. Trust and sovereignty are the words we hear regularly in our engagements with existing and prospective customers. Data sovereignty is the concept that data is subject to the loss of the country or region where it was generated. It's an issue, which is complicated by the continued movement of data and workloads to the cloud, which are often transnational. This is a particularly important issue in the European Union. Recent materials announced by Deutsche Telekom, British Telecom and Orange focus on their sovereign cloud or network architecture initiatives. | κΈ°λ° μ»΄ν¨ν (Confidential Computing)μ μ λ’°μ λ°μ΄ν° μ£ΌκΆμ λν μμ₯μ κ΄μ¬μ΄ λμμ§λ©΄μ κ·Έ μ€μμ±μ΄ μ μ 컀μ§κ³ μμ΅λλ€. μ λ’°μ μ£ΌκΆμ κΈ°μ‘΄ κ³ κ° λ° μ μ¬ κ³ κ°κ³Όμ λ―Έν μμ μ κΈ°μ μΌλ‘ λ£κ² λλ ν€μλμ λλ€. λ°μ΄ν° μ£ΌκΆμ λ°μ΄ν°κ° μμ±λ κ΅κ°λ μ§μμ λ²λ₯ μ μ©μ λ°λλ€λ κ°λ μ λλ€. μ΄λ μ’ μ’ κ΅κ²½μ λλλλ ν΄λΌμ°λλ‘ λ°μ΄ν°μ μν¬λ‘λκ° μ§μμ μΌλ‘ μ΄λνλ©΄μ λμ± λ³΅μ‘ν΄μ§λ μ΄μμ λλ€. μ΄λ νΉν μ λ½μ°ν©μμ μ€μν λ¬Έμ μ λλ€. μ΅κ·Ό λμ΄μΉν λ μ½€(Deutsche Telekom), λΈλ¦¬ν°μν λ μ½€(British Telecom), μ€λ μ§(Orange)κ° λ°νν μλ£λ€μ μ΄λ€μ μ£ΌκΆ ν΄λΌμ°λ(Sovereign Cloud) λλ λ€νΈμν¬ μν€ν μ² μ΄λμ ν°λΈμ μ΄μ μ λ§μΆκ³ μμ΅λλ€. |
| Arqit's collaborative solution with Intel and its Intel TDX has significant applicability to the trust and sovereignty issues confronted by organizations seeking to comply with data sovereignty laws. We expect to have additional announcements about offerings and go-to-market strategies targeted to the confidential computing and data sovereignty market in this fiscal year. Arqit believes this market represents a meaningful opportunity for the company, and we have a strong partner in Intel with whom to attack it. | Arqitμ Intel λ° Intel TDXμμ νλ ₯ μ루μ μ λ°μ΄ν° μ£ΌκΆλ² μ€μλ₯Ό μΆκ΅¬νλ μ‘°μ§λ€μ΄ μ§λ©΄ν μ λ’°μ±κ³Ό μ£ΌκΆ λ¬Έμ μ μλΉν μ μ© κ°λ₯μ±μ κ°μ§κ³ μμ΅λλ€. λΉμ¬λ κΈλ λ νκ³μ°λ μ€ κΈ°λ° μ»΄ν¨ν λ° λ°μ΄ν° μ£ΌκΆ μμ₯μ 겨λ₯ν μ ν λ° μμ₯ μ§μΆ μ λ΅μ λν μΆκ° λ°νκ° μμ κ²μΌλ‘ μμν©λλ€. Arqitλ μ΄ μμ₯μ΄ νμ¬μ μλ―Έ μλ κΈ°νλ₯Ό λνλΈλ€κ³ λ―Ώκ³ μμΌλ©°, μ΄λ₯Ό 곡λ΅νκΈ° μν κ°λ ₯ν ννΈλλ‘ Intelμ 보μ νκ³ μμ΅λλ€. |
| While we have broadened our product offering with encryption intelligence and our activities with Intel, we remain focused on building on our recent successes, specifically in the telecom and government and defense markets. In the telecom market, we signed a 3-year contract with Sparkle, a Tier 1 network operator, enabling to offer a Quantum Secure Network as a Service. Building upon our relationship, we just recently announced in partnership with Sparkle that it has demonstrated embedding Arqit's encryption technology directly into the optical transport layer, validating that sensitive data could be secured at the physical network layer without compromising performance. | μνΈν μΈν 리μ μ€λ‘ μ ν ν¬νΈν΄λ¦¬μ€λ₯Ό νλνκ³ μΈν κ³Όμ νλ ₯ νλμ μ§ννκ³ μμ§λ§, μ°λ¦¬λ μ΅κ·Όμ μ±κ³΅, νΉν ν΅μ κ³Ό μ λΆ λ° κ΅λ°© μμ₯μμμ μ±κ³Όλ₯Ό κΈ°λ°μΌλ‘ ꡬμΆνλ λ° μ§μ€νκ³ μμ΅λλ€. ν΅μ μμ₯μμλ Tier 1 λ€νΈμν¬ μ¬μ μμΈ Sparkleκ³Ό 3λ κ³μ½μ 체결νμ¬ Quantum Secure Network as a Serviceλ₯Ό μ 곡ν μ μκ² λμμ΅λλ€. μ΄λ¬ν κ΄κ³λ₯Ό λ°μ μμΌ, μ΅κ·Ό Sparkleκ³Όμ ννΈλμμ ν΅ν΄ Arqitμ μνΈν κΈ°μ μ κ΄μ μ‘ κ³μΈ΅μ μ§μ λ΄μ₯νλ κ²μ μμ°νμΌλ©°, μ΄λ₯Ό ν΅ν΄ μ±λ₯ μ ν μμ΄ λ¬Όλ¦¬μ λ€νΈμν¬ κ³μΈ΅μμ λ―Όκ°ν λ°μ΄ν°λ₯Ό 보νΈν μ μμμ κ²μ¦νλ€κ³ λ°ννμ΅λλ€. |
| This demonstration opens the door for additional Quantum Secure product offerings for network end users. In addition to activities with Sparkle, Arqit signed additional license agreements on contracts with RSG Telecom and its affiliate Fabric Networks. Our engagement with prospective large telecom network operators is strong. We expect to replicate our success with Sparkle, RSG and Fabric with other network operators as we have the blueprint, which should shorten implementation times for prospective customers. Likewise, in defense, whether militaries or defense contractors, we have built upon our recent success. | μ΄λ² μμ°μ λ€νΈμν¬ μ΅μ’ μ¬μ©μλ€μ μν μΆκ°μ μΈ Quantum Secure μ ν μ 곡μ λ¬Έμ μ΄μμ΅λλ€. Sparkleκ³Όμ νλ μΈμλ, Arqitμ RSG Telecom λ° κ·Έ κ³μ΄μ¬μΈ Fabric Networksμ μΆκ° λΌμ΄μ μ€ κ³μ½μ 체결νμ΅λλ€. λν ν΅μ λ€νΈμν¬ μ¬μ μλ€κ³Όμ νλ ₯μ κ²¬κ³ νκ² μ§νλκ³ μμ΅λλ€. μ°λ¦¬λ μ²μ¬μ§μ 보μ νκ³ μμ΄ μ μ¬ κ³ κ°λ€μ κ΅¬μΆ κΈ°κ°μ λ¨μΆν μ μμΌλ―λ‘, Sparkle, RSG, Fabricκ³Όμ μ±κ³΅μ λ€λ₯Έ λ€νΈμν¬ μ¬μ μλ€κ³Όλ μ¬νν μ μμ κ²μΌλ‘ κΈ°λν©λλ€. λ§μ°¬κ°μ§λ‘ κ΅λ°© λΆμΌμμλ, κ΅°λλ λ°©μ°μ 체λ , μ°λ¦¬λ μ΅κ·Όμ μ±κ³΅μ κΈ°λ°μΌλ‘ μ¬μ μ νμ₯ν΄ λκ°κ³ μμ΅λλ€. |
| Our previously announced initial Department of War contract in partnership with a large IT vendor has been a validated event. Since the announcement, we've signed several additional defense-related contracts, including one for integration into unmanned battlefield assets. There is significant opportunity in the defense market. We have undertaken multiple demonstration and test engagements usually as part of a solution set with partners with U.S. and foreign military organizations and defense contractors. While sales cycles in defense can be slower than other markets, we believe that this market will represent a large percentage of our revenue over time. | μ ν¬κ° μ΄μ μ λ°νν λν IT λ²€λμμ ννΈλμμ ν΅ν μ΅μ΄ κ΅λ°©λΆ κ³μ½μ κ²μ¦λ μ±κ³Όμμ΅λλ€. ν΄λΉ λ°ν μ΄ν, μ ν¬λ λ¬΄μΈ μ μ₯ μμ°μ ν΅ν©νλ κ³μ½μ ν¬ν¨νμ¬ μ¬λ¬ 건μ κ΅λ°© κ΄λ ¨ μΆκ° κ³μ½μ 체결νμ΅λλ€. κ΅λ°© μμ₯μλ μλΉν κΈ°νκ° μμ΅λλ€. μ ν¬λ λ―Έκ΅ λ° ν΄μΈ κ΅°μ¬ μ‘°μ§, κ΅λ°© κ³μ½μ 체λ€κ³Ό ν¨κ» ννΈλμ¬λ€μ μ루μ μΈνΈμ μΌλΆλ‘μ λ€μμ μ€μ¦ λ° ν μ€νΈ νλ‘μ νΈλ₯Ό μνν΄ μμ΅λλ€. κ΅λ°© λΆμΌμ μμ μ¬μ΄ν΄μ΄ λ€λ₯Έ μμ₯λ³΄λ€ λ릴 μ μμ§λ§, μ ν¬λ μ΄ μμ₯μ΄ μκ°μ΄ μ§λ¨μ λ°λΌ μ ν¬ λ§€μΆμ μλΉ λΆλΆμ μ°¨μ§ν κ²μΌλ‘ λ―Ώκ³ μμ΅λλ€. |
| In that regard, we've increased and realigned our U.S. operations and personnel to drive our efforts to capture more of this market, whether U.S. military, national security or government. So circling back to my introduction, we are experiencing the market momentum to take action to address the weaknesses in today's encryption and the threat of quantum computers. Prospective customer engagements are accelerating. We broadened our product offering to provide a comprehensive solution to detect, protect and comply. We also broadened our product offering to be a first mover in quantum secure confidential computing and data sovereignty. | μ΄λ¬ν κ΄μ μμ, μ°λ¦¬λ λ―Έκ΅°, κ΅κ°μ보 λλ μ λΆ λΆλ¬Έ λ± μ΄ μμ₯μ λ λ§μ΄ ν보νκΈ° μν λ Έλ ₯μ μΆμ§νκ³ μ λ―Έκ΅ λ΄ μ΄μ λ° μΈλ ₯μ μ¦μνκ³ μ¬νΈμ±νμ΅λλ€. μ μλ λ°μΈμΌλ‘ λμκ°μ, μ°λ¦¬λ νμ¬μ μνΈν κΈ°μ μ μ·¨μ½μ κ³Ό μμ μ»΄ν¨ν°μ μνμ λμνκΈ° μν μ‘°μΉλ₯Ό μ·¨ν μ μλ μμ₯ λͺ¨λ©ν μ κ²½ννκ³ μμ΅λλ€. μ μ¬ κ³ κ°κ³Όμ μ μ΄μ΄ κ°μνλκ³ μμ΅λλ€. μ°λ¦¬λ νμ§, λ³΄νΈ λ° κ·μ μ€μλ₯Ό μν ν¬κ΄μ μΈ μ루μ μ μ 곡νκΈ° μν΄ μ ν λΌμΈμ μ νλνμ΅λλ€. λν μμ 보μ κΈ°λ° μ»΄ν¨ν κ³Ό λ°μ΄ν° μ£ΌκΆ λΆμΌμμ μ λ κΈ°μ μ΄ λκΈ° μν΄ μ ν μ 곡 λ²μλ₯Ό λνμ΅λλ€. |
| And finally, deepen our success in key network operator and defense markets. Our efforts are beginning to come through in our results, which Nick will talk about in a moment. I will say we believe that fiscal 2025 represents a trough year from a revenue perspective. The company grew revenue materially in the second half of the year as compared to the first half. We ended the fiscal year with executed contracts that represent $1.2 million in revenue that could be recognized in fiscal year 2026. We expect to build upon that foundation through 2026. As momentum in the marketplace for Quantum-safe solutions grow, so is our conviction. Organizations are starting the migration journey. | λ§μ§λ§μΌλ‘, μ£Όμ λ€νΈμν¬ μ¬μ μ λ° λ°©μ° μμ₯μμμ μ±κ³΅μ μ¬νμν€λ κ²μ λλ€. μ°λ¦¬μ λ Έλ ₯μ΄ μ€μ μΌλ‘ λνλκΈ° μμνμΌλ©°, μ΄μ λν΄μλ Nickμ΄ κ³§ λ§μλ릴 κ²μ λλ€. μ λ 2025 νκ³μ°λκ° λ§€μΆ κ΄μ μμ μ μ μ ν΄κ° λ κ²μΌλ‘ λ―Ώμ΅λλ€. νμ¬λ μλ°κΈ° λλΉ νλ°κΈ°μ λ§€μΆμ΄ ν¬κ² μ±μ₯νμ΅λλ€. μ°λ¦¬λ 2026 νκ³μ°λμ μΈμλ μ μλ 120λ§ λ¬λ¬μ λ§€μΆμ λνλ΄λ 체결λ κ³μ½μΌλ‘ νκ³μ°λλ₯Ό λ§κ°νμ΅λλ€. μ°λ¦¬λ 2026λ λ΄λ΄ μ΄λ¬ν κΈ°λ°μ λμ± νλν κ²μΌλ‘ μμν©λλ€. μμ μμ μ루μ μ λν μμ₯μ λͺ¨λ©ν μ΄ μ»€μ§λ©΄μ μ°λ¦¬μ νμ λ 컀μ§κ³ μμ΅λλ€. μ‘°μ§λ€μ΄ μ ν μ¬μ μ μμνκ³ μμ΅λλ€. |
| We can assist in the assessment of risk exposure, and we offer a provably secure symmetric key encryption solution. We like our position in the marketplace to capture the demand we are building. We are excited about our prospects for 2026. Thank you. And with that, I will turn it over to our CFO, Nick Pointon. Nicholas Pointon Chief Financial Officer Thank you, Andy. For the fiscal year 2025, Arqit generated $530,000 in revenue as compared to $293,000 in revenue for fiscal year 2024. The variance between periods resulted primarily from the commencement in March of our previously announced multiyear contract with a customer in the Middle East. | μ ν¬λ μν λ
ΈμΆ νκ°λ₯Ό μ§μν μ μμΌλ©°, μ
μ¦ κ°λ₯ν 보μμ±μ κ°μΆ λμΉν€ μνΈν μ루μ
μ μ 곡ν©λλ€. μ ν¬κ° ꡬμΆνκ³ μλ μμλ₯Ό ν¬μ°©νκΈ° μν μμ₯μμμ μ
μ§κ° λ§μμ λλλ€. 2026λ
μ λ§μ λν΄ κΈ°λνκ³ μμ΅λλ€. κ°μ¬ν©λλ€. μ΄μ CFOμΈ Nick Pointonμκ² λ§μ΄ν¬λ₯Ό λκΈ°κ² μ΅λλ€. Nicholas Pointon μ΅κ³ μ¬λ¬΄μ± μμ κ°μ¬ν©λλ€, Andy. 2025 νκ³μ°λμ Arqitμ 53λ§ λ¬λ¬μ λ§€μΆμ κΈ°λ‘νμΌλ©°, μ΄λ 2024 νκ³μ°λ λ§€μΆ 29λ§ 3μ² λ¬λ¬μ λΉκ΅λ©λλ€. κΈ°κ° κ° μ°¨μ΄λ μ£Όλ‘ 3μμ μμλ μ€λ μ§μ κ³ κ°κ³Όμ μ΄μ λ°νλ λ€λ κ³μ½ κ°μμ κΈ°μΈν©λλ€. |
| In 2025, we generated revenue from 7 licenses for our SKA-Platform and NetworkSecure solutions and professional services. This compares to 13 licenses for fiscal year 2024. While our revenue for the fiscal year is modest, our full year result does not -- does represent a material improvement from the prior year and a material sequential improvement from the first half of fiscal year 2025 to the end of the period. Recall, our first half of 2025 revenue was $67,000, while the second half of the year saw a revenue accelerate to $463,000. | 2025λ μλ SKA-Platformκ³Ό NetworkSecure μ루μ λ° μ λ¬Έ μλΉμ€μ λν΄ 7건μ λΌμ΄μ μ€μμ λ§€μΆμ μ°½μΆνμ΅λλ€. μ΄λ 2024 νκ³μ°λμ 13건μ λΌμ΄μ μ€μ λΉκ΅λ©λλ€. νκ³μ°λ λ§€μΆμ΄ μνμ κ·Έμ³€μ§λ§, μ°κ° μ€μ μ μ λ λλΉ μλ―Έ μλ κ°μ μ λνλμΌλ©°, 2025 νκ³μ°λ μλ°κΈ°μμ κΈ°λ§κΉμ§ μμ°¨μ μΌλ‘λ μλΉν κ°μ μ 보μμ΅λλ€. μκΈ°νμλ©΄, 2025λ μλ°κΈ° λ§€μΆμ 67,000λ¬λ¬μλ λ°λ©΄, νλ°κΈ°μλ λ§€μΆμ΄ 463,000λ¬λ¬λ‘ κ°μνλμμ΅λλ€. |
| The acceleration in second half revenue benefited from, amongst other factors, commencement of revenue generation from our multiyear contract in the Middle East, which, as previously reported, had been delayed. It also reflects commencement of our multiyear contract with Sparkle. In keeping with Andy's theme of momentum, we previously reported that we ended fiscal year 2025 with $1.2 million of contractual revenue, which may be recognized in fiscal year 2026. While we are still speaking in modest nominal dollar terms, the trajectory of our prospective customer discussions, licensing activity and now revenue is all moving in a positive direction. | νλ°κΈ° λ§€μΆ κ°μνλ μ¬λ¬ μμΈλ€λ‘λΆν° ννμ λ°μλλ°, κ·Έ μ€μλ μ΄μ μ λ³΄κ³ λ λ°μ κ°μ΄ μ§μ°λμλ μ€λ μ§μ λ€λ κ³μ½μ λ§€μΆ λ°μ κ°μκ° ν¬ν¨λ©λλ€. λν Sparkleκ³Όμ λ€λ κ³μ½ κ°μλ λ°μλμ΄ μμ΅λλ€. Andyκ° μΈκΈν λͺ¨λ©ν μ΄λΌλ μ£Όμ μ μΌκ΄λκ², μ ν¬λ μ΄μ μ 2025 νκ³μ°λλ₯Ό 120λ§ λ¬λ¬μ κ³μ½ λ§€μΆλ‘ λ§κ°νλ€κ³ λ³΄κ³ ν λ° μμΌλ©°, μ΄λ 2026 νκ³μ°λμ μΈμλ μ μμ΅λλ€. λͺ λͺ© λ¬λ¬ κΈ°μ€μΌλ‘λ μ¬μ ν μκ·λͺ¨ μμ€μμ μ΄μΌκΈ°νκ³ μμ§λ§, μ μ¬ κ³ κ° λ Όμ, λΌμ΄μ μ± νλ, κ·Έλ¦¬κ³ μ΄μ λ λ§€μΆμ κΆ€μ μ΄ λͺ¨λ κΈμ μ μΈ λ°©ν₯μΌλ‘ μμ§μ΄κ³ μμ΅λλ€. |
| Revenue from the Arqit SKA-Platform as a Service and Arqit NetworkSecure products totaled $476,000. Professional services and maintenance revenue in support of contract activity was $54,000 for the period. For fiscal year 2024, Arqit SKA-Platform as a Service and Arqit NetworkSecure contracts revenue totaled $191,000 and professional services and maintenance in support of contract activity was $102,000. Our administrative expenses equate to operating costs for those more familiar with U.S. GAAP. Administrative expenses for fiscal year 2025 were $34.7 million versus $25.4 million for fiscal year 2024. | Arqit SKA-Platform as a Service λ° Arqit NetworkSecure μ νμ λ§€μΆμ μ΄ 476,000λ¬λ¬λ₯Ό κΈ°λ‘νμ΅λλ€. κ³μ½ νλμ μ§μνλ μ λ¬Έ μλΉμ€ λ° μ μ§λ³΄μ λ§€μΆμ ν΄λΉ κΈ°κ° λμ 54,000λ¬λ¬μμ΅λλ€. 2024 νκ³μ°λμ κ²½μ°, Arqit SKA-Platform as a Service λ° Arqit NetworkSecure κ³μ½ λ§€μΆμ μ΄ 191,000λ¬λ¬μμΌλ©°, κ³μ½ νλμ μ§μνλ μ λ¬Έ μλΉμ€ λ° μ μ§λ³΄μ λ§€μΆμ 102,000λ¬λ¬μμ΅λλ€. λΉμ¬μ κ΄λ¦¬λΉμ©μ λ―Έκ΅ νκ³κΈ°μ€(U.S. GAAP)μ μ΅μνμ λΆλ€κ»λ μμ λΉμ©μ ν΄λΉν©λλ€. 2025 νκ³μ°λ κ΄λ¦¬λΉμ©μ 3,470λ§ λ¬λ¬λ‘ 2024 νκ³μ°λμ 2,540λ§ λ¬λ¬ λλΉ μ¦κ°νμ΅λλ€. |
| The variance between periods was primarily due to a reduction in foreign exchange gain resulting from strengthening of the British pound against the U.S. dollar. Employee and property costs saw material reductions year-over-year. Arqit's headcount as of 30th September 2025 was 91 employees as compared to 82 as of 30 September 2024. Administrative expense for the period includes a $5.6 million noncash credit associated with share-based compensation versus a restated $0.6 million noncash charge for fiscal year 2024. Operating loss for the period was $38.5 million versus a loss of $26.9 million for fiscal year 2024. | κΈ°κ° κ° μ°¨μ΄λ μ£Όλ‘ μκ΅ νμ΄λνμ λ―Έκ΅ λ¬λ¬ λλΉ κ°μΈλ‘ μΈν μΈνμ°¨μ΅ κ°μμ κΈ°μΈνμ΅λλ€. μΈκ±΄λΉμ μμ° κ΄λ ¨ λΉμ©μ μ λ λλΉ μλΉν κ°μλ₯Ό 보μμ΅λλ€. 2025λ 9μ 30μΌ κΈ°μ€ Arqitμ μ§μ μλ 91λͺ μΌλ‘, 2024λ 9μ 30μΌ κΈ°μ€ 82λͺ κ³Ό λΉκ΅λ©λλ€. ν΄λΉ κΈ°κ°μ κ΄λ¦¬λΉμ©μλ μ£ΌμκΈ°μ€λ³΄μκ³Ό κ΄λ ¨λ 560λ§ λ¬λ¬μ λΉνκΈ λλ³μ΄ ν¬ν¨λμ΄ μμΌλ©°, μ΄λ 2024 νκ³μ°λμ μ¬μμ±λ 60λ§ λ¬λ¬ λΉνκΈ μ°¨λ³κ³Ό λλΉλ©λλ€. ν΄λΉ κΈ°κ°μ μμ μμ€μ 3,850λ§ λ¬λ¬λ‘, 2024 νκ³μ°λμ 2,690λ§ λ¬λ¬ μμ€κ³Ό λΉκ΅λ©λλ€. |
| The variance in operating loss between periods is primarily an increase in administrative expenses and recognition of an exceptional item for the outstanding class action lawsuit in the period. We previously announced that an agreement in principle has been reached regarding a settlement of the lawsuit. For the fiscal year, loss before tax from continuing operations was $36.5 million. For fiscal year 2024, loss before tax from continuing operations was $37.4 million. The variance between periods is primarily due to an improvement in currency translation differences. As of 30th September 2025, the company had cash and cash equivalents of $36.9 million. | κΈ°κ° κ° μμ μμ€μ μ°¨μ΄λ μ£Όλ‘ κ΄λ¦¬λΉμ©μ μ¦κ°μ ν΄λΉ κΈ°κ° μ€ μ§ν μ€μΈ μ§λ¨μμ‘μ λν νΉλ³νλͺ© μΈμμ κΈ°μΈν©λλ€. λΉμ¬λ μ΄μ μ ν΄λΉ μμ‘μ ν©μμ κ΄λ ¨νμ¬ μμΉμ ν©μμ λλ¬νμμ 곡μν λ° μμ΅λλ€. νκ³μ°λ κΈ°μ€μΌλ‘ κ³μμμ λΆλ¬Έμ μΈμ μμ€μ 3,650λ§ λ¬λ¬λ₯Ό κΈ°λ‘νμ΅λλ€. 2024 νκ³μ°λμ κ³μμμ λΆλ¬Έ μΈμ μμ€μ 3,740λ§ λ¬λ¬μμ΅λλ€. κΈ°κ° κ° μ°¨μ΄λ μ£Όλ‘ νμ°μ°¨μ΄μ κ°μ μ κΈ°μΈν©λλ€. 2025λ 9μ 30μΌ κΈ°μ€, λΉμ¬μ νκΈ λ° νκΈμ±μμ°μ 3,690λ§ λ¬λ¬μ λλ€. |
| With that, I turn the call back to Andy. Andrew Leaver CEO & Director Thank you, Nick. A final thought. Nick perhaps said it best when he noted that the trajectory of key measures, prospective customer engagement, signed contracts, revenue, backlog are all moving in a positive direction. From my perspective, that is a function of the market beginning to take serious action towards migrating to a post-quantum encryption posture. It is also a function of recognition that Arqit symmetric key agreement encryption platform offers a proven solution today. We're very excited about the market for our products in fiscal 2026. The hard work of the entire Arqit team is beginning to bear fruit. | μ΄μ Andyμκ² λ€μ λ§μ΄ν¬λ₯Ό λκΈ°κ² μ΅λλ€. Andrew Leaver CEO & Director κ°μ¬ν©λλ€, Nick. λ§μ§λ§μΌλ‘ ν λ§μ λλ¦¬κ² μ΅λλ€. Nickμ΄ μ£Όμ μ§νλ€μ κΆ€μ , μ¦ μ μ¬ κ³ κ° μ°Έμ¬λ, κ³μ½ 체결, λ§€μΆ, λ°±λ‘κ·Έκ° λͺ¨λ κΈμ μ μΈ λ°©ν₯μΌλ‘ μμ§μ΄κ³ μλ€κ³ μΈκΈν κ²μ΄ κ°μ₯ μ μ ν ννμ΄μλ€κ³ μκ°ν©λλ€. μ κ΄μ μμ μ΄λ μμ₯μ΄ ν¬μ€νΈ μμ μνΈν 체κ³λ‘μ μ νμ μν΄ λ³Έκ²©μ μΈ μ‘°μΉλ₯Ό μ·¨νκΈ° μμνλ€λ κ²μ μλ―Έν©λλ€. λν Arqitμ λμΉν€ ν©μ μνΈν νλ«νΌμ΄ νμ¬ κ²μ¦λ μ루μ μ μ 곡νλ€λ μΈμμ΄ νμ°λκ³ μλ€λ μ¦κ±°μ΄κΈ°λ ν©λλ€. 2026 νκ³μ°λ μ ν μμ₯μ λν΄ λ§€μ° κΈ°λκ° ν½λλ€. Arqit ν μ 체μ λ Έλ ₯μ΄ κ²°μ€μ λ§ΊκΈ° μμνκ³ μμ΅λλ€. |
| We expect to build upon the momentum that we experienced in 2025. Thank you again. I'll hand the call back over to the operator for Q&A. | 2025λ μ κ²½νν λͺ¨λ©ν μ λ°νμΌλ‘ λμ± λ°μ ν΄ λκ° κ²μΌλ‘ κΈ°λν©λλ€. λ€μ νλ² κ°μ¬λ립λλ€. μ΄μ μ§μμλ΅μ μν΄ κ΅νμμκ² λ€μ λ§μ΄ν¬λ₯Ό λκΈ°κ² μ΅λλ€. |
# Arqit Quantum Inc. (ARQQ) Q4 2025 μ€μ μμ½
β’ **λ§€μΆ μ±μ₯ λ° λ°±λ‘κ·Έ**: FY2025 λ§€μΆμ $530Kλ‘ μ λ
λλΉ 81% μ¦κ°νμΌλ μ¬μ ν μκ·λͺ¨ μμ€. νλ°κΈ° λ§€μΆ($463K)μ΄ μλ°κΈ°($67K) λλΉ κΈμ¦νλ©° κ°μ μΆμΈ. FY2026μ μΈμ κ°λ₯ν κ³μ½ λ°±λ‘κ·Έλ $1.2Mλ‘ μ λ
λλΉ κΈμ μ λͺ¨λ©ν
ν보.
β’ **μμ
μμ€ νλ**: FY2025 μμ
μμ€μ $38.5Mλ‘ μ λ
($26.9M) λλΉ μ
ν. μ£Όμ μμΈμ κ΄λ¦¬λΉμ© μ¦κ°($34.7M vs $25.4M), νμ΄λν κ°μΈμ λ°λ₯Έ μΈνμμ€, μ§λ¨μμ‘ κ΄λ ¨ λΉμ© μΈμ. νκΈλ³΄μ μ‘μ $36.9Mλ‘ λ¨κΈ° μ λμ±μ μνΈνλ μ§μμ μΈ νκΈμκ° μ°λ €.
β’ **μμ₯ λͺ¨λ©ν
κ°μ‘°**: κ²½μμ§μ μμμ»΄ν¨ν
μνμ λν μμ₯ μΈμ μ¦κ°μ κ·μ μλ ₯μΌλ‘ κ³ κ° μ°Έμ¬κ° κ°μνλκ³ μλ€κ³ κ°μ‘°. FY2026 첫 2κ°μκ° 12건μ μμ°κ³μ½ μ²΄κ²°λ‘ μ λ
λλΉ νλ μ¦κ°. ν΅μ (Sparkle, RSG) λ° κ΅λ°© λΆλ¬Έμμ κ³μ½ νλ.
β’ **μ ν ν¬νΈν΄λ¦¬μ€ νμ₯**: Ampliphae μΈμλ‘ μνΈν 리μ€ν¬ λΆμ λꡬ ν보, Intelκ³Ό νλ ₯ν΄
| Original | Translation |
|---|---|
| Operator: [Operator Instructions]. Our first call from today will come from the line of Scott Buck of H.C. Wainwright & Company. | **Operator:** [μ΄μμ μλ΄]. μ€λ 첫 λ²μ§Έ μ§λ¬Έμ H.C. Wainwright & Companyμ Scott Buck μ λ리μ€νΈλ‘λΆν° λ°κ² μ΅λλ€. |
| Scott Buck: H.C. Wainwright & Co, LLC, Research Division Andy, I'm curious, is there -- or was there a particular catalyst that's helping drive the higher level of demonstrations and activity here in the last couple of months, either something external or maybe some change in the selling process? | **Scott Buck:** H.C. Wainwright & Co, LLC, 리μμΉ λΆλ¬Έμ μ§λ¬Έμ λλ€. Andy, κΆκΈν κ² μλλ°μ, μ΅κ·Ό λͺ κ°μκ° μμ°κ³Ό νλμ΄ λ νλ°ν΄μ§ λ° νΉλ³ν μ΄λ§€μ κ° μμλμ? μΈλΆμ μΈ μμΈμ΄λ , μλλ©΄ μμ νλ‘μΈμ€μ λ³νκ° μμλ 건μ§μ? |
| CEO & Director: Scott, good question. Thank you. So I kind of look -- when I kind of laid out where we're seeing business, I would say kind of thematically, what you're seeing is the news flow on quantum and the advances in quantum this year, this calendar year 2025 have been huge. And I think when you see some of the larger players like -- sorry, like IBM and Google, when they talk about their hybrid computers and achieving quantum supremacy and then you also see some of the smaller pure players, which we see a lot, by the way, I think their advances have gotten people to say, hey, we can see now that quantum is moving very quick, and we're still actually in the year of quantum. So that's the first thing that they're seeing. I would say thematically, I think also then what we're also seeing is you'll see specifically within the telecom sector is a larger awareness because of -- I talked about in my notes earlier that in some cases, governments, in other cases, regulatory bodies saying to people, this needs to be on your risk register, and this is something you need to look at. And I think that's driving a lot of organizations starting with telco to say, "Hey, we need to have a position on this, and we need to understand the potential impact and how we can mitigate against that impact. " So on one side, it's hugely exciting about quantum arriving in the way that it is because it's a force for good. We all know the benefits of quantum. But in a bad actor's hands, now people are starting to be aware of what the consequences of that are. I would just leave you with one other thing as well. I think it's very well publicized now the threat of what's being called harvest now decrypt later, which is people having their information packed and stolen today to be decrypted later when quantum computing becomes available in a more meaningful way. If that information has a shelf life or has any sort of validity going into the future, then it puts that organization at risk. And I think people are saying, "hey, we need to guard against that now rather than wait for more and more evidence in terms of the availability of quantum computers. " Hopefully, that helps, Scott. | **CEO & Director:** μ’μ μ§λ¬Έ κ°μ¬ν©λλ€, Scott. μ κ° μ¬μ νν©μ μ€λͺ λ릴 λ λ§μλλ¦° λ΄μ©μ 보면, μ£Όμ λ³λ‘ 보μλ©΄ μ¬ν΄ 2025λ μμμ»΄ν¨ν κ΄λ ¨ λ΄μ€μ λ°μ μ΄ μμ²λ¬μ΅λλ€. IBMμ΄λ κ΅¬κΈ κ°μ λν μ 체λ€μ΄ νμ΄λΈλ¦¬λ μ»΄ν¨ν°μ μμ μ°μ(quantum supremacy) λ¬μ±μ λν΄ μ΄μΌκΈ°νλ κ²μ 보μλ©΄, κ·Έλ¦¬κ³ μ ν¬κ° μμ£Ό μ νλ μκ·λͺ¨ μμ μμμ»΄ν¨ν μ 체λ€μ λ°μ μμ 보μλ©΄, μ΄λ° μ§μ λ€μ΄ μ¬λλ€λ‘ νμ¬κΈ 'μμμ»΄ν¨ν μ΄ μ λ§ λΉ λ₯΄κ² λ°μ νκ³ μκ³ , μ°λ¦¬λ μ¬μ ν μμμ ν΄λ₯Ό μ΄κ³ μꡬλ'λΌκ³ μΈμνκ² λ§λ€μλ€κ³ μκ°ν©λλ€. μ΄κ²μ΄ μμ₯μμ λ³΄κ³ μλ 첫 λ²μ§Έ νμμ λλ€. μ£Όμ μ μΌλ‘ 보면, νΉν ν΅μ λΆλ¬Έμμ λμ λλ μ μ μΈμμ΄ ν¬κ² λμμ§κ³ μλ€λ κ²λλ€. μ κ° μμ λ§μλλ Έλ―μ΄, μ΄λ€ κ²½μ°μλ μ λΆκ°, λ μ΄λ€ κ²½μ°μλ κ·μ κΈ°κ΄μ΄ κΈ°μ λ€μκ² "μ΄κ²μ 리μ€ν¬ κ΄λ¦¬ λμ₯μ μ¬λ €μΌ νκ³ , λ°λμ κ²ν ν΄μΌ ν μ¬μ"μ΄λΌκ³ λͺ νν νκ³ μμ΅λλ€. μ΄λ° μμ§μμ΄ ν΅μ μ¬λ₯Ό μμμΌλ‘ λ§μ μ‘°μ§λ€μ΄ "μ°λ¦¬λ μ΄μ λν μ μ₯μ μ 립ν΄μΌ νκ³ , μ μ¬μ μν₯κ³Ό κ·Έ μν₯μ μνν λ°©λ²μ μ΄ν΄ν΄μΌ νλ€"κ³ λ§νκ² λ§λλ λλ ₯μ΄ λκ³ μμ΅λλ€. ννΈμΌλ‘λ μμ κΈ°μ μ΄ μ΄λ° μμΌλ‘ λλνκ³ μλ€λ κ² μμ²΄κ° μμ²λκ² ν₯λ―Έμ§μ§ν©λλ€. μμλ μ ν νμ΄λκΉμ. μμ κΈ°μ μ μ΄μ μ μ°λ¦¬ λͺ¨λ μ μκ³ μμ΅λλ€. νμ§λ§ μ μμ μΈ νμμμ μμ λ€μ΄κ°λ©΄, μ΄μ μ¬λλ€μ΄ κ·Έ κ²°κ³Όκ° λ¬΄μμΈμ§ μΈμνκΈ° μμνκ³ μμ΅λλ€. ν κ°μ§λ§ λ λ§μλλ¦¬κ² μ΅λλ€. μ§κΈ 'μν ν λμ€μ 볡νΈν(harvest now decrypt later)'λΌκ³ λΆλ¦¬λ μνμ΄ λ§€μ° μ μλ €μ Έ μλλ°μ, μ΄λ μ€λ μ 보λ₯Ό νμ·¨ν΄μ 보κ΄ν΄ λμλ€κ° λμ€μ μμ μ»΄ν¨ν μ΄ λ μλ―Έ μλ λ°©μμΌλ‘ νμ© κ°λ₯ν΄μ§λ©΄ κ·Έλ 볡νΈννλ κ²μ λ§ν©λλ€. λ§μ½ κ·Έ μ λ³΄κ° μ ν¨ κΈ°κ°μ΄ μκ±°λ λ―Έλμλ μ΄λ€ μμΌλ‘λ μ ν¨μ±μ κ°μ§λ€λ©΄, κ·Έ μ‘°μ§μ μνμ μ²νκ² λ©λλ€. κ·Έλμ μ¬λλ€μ΄ "μμ μ»΄ν¨ν°μ κ°μ©μ±μ λν λ λ§μ μ¦κ±°λ₯Ό κΈ°λ€λ¦¬κΈ°λ³΄λ€λ μ§κΈ λΉμ₯ μ΄μ λλΉν΄μΌ νλ€"κ³ λ§νκ³ μλ€κ³ μκ°ν©λλ€. λμμ΄ λμ ¨κΈ°λ₯Ό λ°λλλ€, μ€μ½§. |
| Scott Buck: H.C. Wainwright & Co, LLC, Research Division No, that's very helpful. It sounds like the market is coming to you guys rather than you having to change any of your kind of internal selling procedures to grab more attention, which is great. I also want to ask about Encryption Intelligence. What does the sales cycle look like there versus the legacy product? I would imagine it's significantly shorter and maybe a driver of revenue here in the near term. | **Scott Buck:** μλμ, λ§€μ° λμμ΄ λμμ΅λλ€. μμ₯μ΄ κ·μ¬ μͺ½μΌλ‘ μ€κ³ μλ κ² κ°λ€μ. λ λ§μ κ΄μ¬μ λκΈ° μν΄ λ΄λΆ μμ μ μ°¨λ₯Ό λ³κ²½ν νμκ° μλ€λ μ μ΄ μ’μ΅λλ€. Encryption Intelligenceμ λν΄μλ μ¬μ€λ³΄κ³ μΆμ΅λλ€. λ κ±°μ μ νκ³Ό λΉκ΅νμ λ μμ μ¬μ΄ν΄μ΄ μ΄λ»κ² λλμ? ν¨μ¬ μ§§μ κ²μΌλ‘ μμλκ³ , λ¨κΈ°μ μΌλ‘ λ§€μΆμ 견μΈνλ μμΈμ΄ λ μ μμ κ² κ°μλ°μ. |
| CEO & Director: Yes. We're really pleased with the acquisition we made of Encryption Intelligence. For us, this is something that ability to, one, in a sales cycle, show an organization their cryptographic landscape and show where they have potential weaknesses and potential problems in their network, but also identify that against existing regulatory body guidance. But right behind that is we obviously want organizations to use this as an ongoing tool as well to keep themselves safe against any new attacks. So we're seeing starting particularly with telco operators then leaning into this and saying, "hey, this is something that we'd like to use on an ongoing basis. " So we're in discussion now with a number of telco operators, not just to do an initial check on their network, but also then on an ongoing basis for them to use the tool. I like the fact now that we can be very specific about what the threat is and be very deterministic about what we can do to help them mitigate against that potential attack and vulnerability. I think this year, as I said, being the Euro Quantum, we just have a lot more inbound on that side as opposed to before where we were talking about in the market. The market feels like it's a lot more educated now is coming to us. | **CEO & Director:** λ€, μ ν¬λ Encryption Intelligence μΈμμ λν΄ λ§€μ° λ§μ‘±νκ³ μμ΅λλ€. μ΄λ² μΈμλ₯Ό ν΅ν΄ μ»κ² λ μλμ ν¬κ² λ κ°μ§μ λλ€. 첫째, μμ κ³Όμ μμ κ³ κ° μ‘°μ§μκ² κ·Έλ€μ μνΈν νκ²½μ 보μ¬μ£Όκ³ , λ€νΈμν¬ λ΄ μ μ¬μ μ·¨μ½μ κ³Ό λ¬Έμ μ μ νμ ν μ μκ² ν΄μ€λλ€. λμμ μ΄λ₯Ό κΈ°μ‘΄ κ·μ κΈ°κ΄μ κ°μ΄λλΌμΈκ³Ό λμ‘°ν΄μ 보μ¬μ€ μ μμ£ . νμ§λ§ κ·Έ λ€μ λ¨κ³κ° λ μ€μν©λλ€. μ ν¬λ κ³ κ°λ€μ΄ μ΄ μ루μ μ μ§μμ μΈ λκ΅¬λ‘ νμ©νμ¬ μλ‘μ΄ κ³΅κ²©μΌλ‘λΆν° μμ νκ² λ³΄νΈλ°κΈ°λ₯Ό μν©λλ€. μ€μ λ‘ ν΅μ μ¬μ μλ€μ μ€μ¬μΌλ‘ μ΄λ° μμ§μμ΄ μμλκ³ μμ΅λλ€. κ·Έλ€μ "μ΄κ±΄ μ°λ¦¬κ° μ§μμ μΌλ‘ μ¬μ©νκ³ μΆμ μ루μ μ΄λ€"λΌκ³ λ§νκ³ μμ΅λλ€. νμ¬ μ¬λ¬ ν΅μ μ¬μ μλ€κ³Ό λ Όμλ₯Ό μ§ννκ³ μλλ°, λ¨μν λ€νΈμν¬ μ΄κΈ° μ κ²λ§μ΄ μλλΌ μ§μμ μΌλ‘ μ΄ ν΄μ νμ©νλ λ°©μμ λν΄μλ νμνκ³ μμ΅λλ€. μ΄μ μνμ΄ λ¬΄μμΈμ§ λ§€μ° κ΅¬μ²΄μ μΌλ‘ νμ ν μ μκ³ , μ μ¬μ μΈ κ³΅κ²©κ³Ό μ·¨μ½μ μ μννκΈ° μν΄ μ΄λ€ λμμ λ릴 μ μλμ§ λͺ ννκ² μ μν μ μλ€λ μ μ΄ λ§μμ λλλ€. μ¬ν΄λ λ§μλλ¦° κ²μ²λΌ μ λ‘ νν (EuroQCI) νλ‘μ νΈκ° μμ΄μ, μμ μ²λΌ μ ν¬κ° μμ₯μ λκ°μ μ΄μΌκΈ°νλ κ²κ³Όλ λ¬λ¦¬ ν¨μ¬ λ λ§μ μΈλ°μ΄λ λ¬Έμκ° λ€μ΄μ€κ³ μμ΅λλ€. μμ₯μ΄ μ΄μ ν¨μ¬ λ λ§μ΄ μ΄ν΄νκ³ μκ³ , κ³ κ°λ€μ΄ λ¨Όμ μ ν¬λ₯Ό μ°Ύμμ€κ³ μμ΅λλ€. |
| Scott Buck: H.C. Wainwright & Co, LLC, Research Division Yes. No, that makes sense. I'm curious, Andy, are there additional kind of bolt-on or tuck-in opportunities similar to that asset purchase you made back in May that might make sense to, I don't know, either bring in some additional revenue or expand the potential customer footprint? | **Scott Buck:** λ€, λ§μ΅λλ€. μ€λ, μ§λ 5μμ μ§ννλ μμ° λ§€μ κ³Ό μ μ¬ν μΆκ°μ μΈ μκ·λͺ¨ μΈμ κΈ°νλ€μ΄ μμκΉμ? μΆκ° λ§€μΆμ ν보νκ±°λ μ μ¬ κ³ κ° κΈ°λ°μ νλν μ μλ κΈ°ν λ§μ λλ€. |
| CEO & Director: Yes. That's a really good question. And I talked about what we're seeing, particularly with data sovereignty and confidential compute. And I think those 2 areas are really coming to the fore now, particularly as you think about a lot of organizations are now thinking about in that kind of detect, protect comply, where is my data going? How do I need to think about complying against local regulation and then how do I protect it. So anyone that sits on the periphery of really detect, protect comply around data sovereignty and confidential compute would be great tuck-ins for us. I think anything around particular tech components of that would be interesting. And we've looked at a few different areas already in terms of people that are delivering components of it, but are obviously missing the deep intellectual property that we have around the quantum-safe part of it as well. So absolutely, we'll be looking in the market. | **CEO & Director:** λ€, μ λ§ μ’μ μ§λ¬Έμ
λλ€. μ κ° λ§μλλ Έλ λ°μ΄ν° μ£ΌκΆ(data sovereignty)κ³Ό κΈ°λ° μ»΄ν¨ν
(confidential compute) κ΄λ ¨ν΄μ μ ν¬κ° λ³΄κ³ μλ κ²λ€μ΄ μλλ°μ. μ΄ λ μμμ΄ μ§κΈ μ λ§ λΆκ°λκ³ μμ΅λλ€. νΉν λ§μ μ‘°μ§λ€μ΄ νμ§, 보νΈ, μ€μ μΈ‘λ©΄μμ 'λ΄ λ°μ΄ν°κ° μ΄λλ‘ κ°λκ°? νμ§ κ·μ λ₯Ό μ€μνκΈ° μν΄ μ΄λ»κ² λμν΄μΌ νλκ°? κ·Έλ¦¬κ³ μ΄λ»κ² 보νΈν κ²μΈκ°'λ₯Ό κ³ λ―Όνκ³ μμ΅λλ€. λ°λΌμ λ°μ΄ν° μ£ΌκΆκ³Ό κΈ°λ° μ»΄ν¨ν μ μ€μ¬μΌλ‘ ν νμ§, 보νΈ, μ€μ μμ μ£Όλ³μ μλ κΈ°μ λ€μ΄λΌλ©΄ μ ν¬μκ² νλ₯ν μΈμ λμ(tuck-in)μ΄ λ κ²μ λλ€. νΉν κ·Έ λΆμΌμ νΉμ κΈ°μ μμλ€μ κ°μ§ κΈ°μ μ΄λΌλ©΄ λ§€μ° ν₯λ―Έλ‘μΈ κ² κ°μ΅λλ€. κ·Έλ¦¬κ³ μ ν¬λ μ΄λ―Έ λͺ κ°μ§ λ€λ₯Έ μμλ€μ μ΄ν΄λ΄€μ΅λλ€. μΌλΆ κ΅¬μ± μμλ€μ μ 곡νλ μ 체λ€μ΄ μμ§λ§, λͺ λ°±ν μμ μμ (quantum-safe) λΆλΆκ³Ό κ΄λ ¨ν΄μ μ ν¬κ° 보μ ν κΉμ΄ μλ μ§μ μ¬μ°κΆμ κ°μ§κ³ μμ§ μμ΅λλ€. λ°λΌμ λΉμ°ν μμ₯μμ κΈ°νλ₯Ό λͺ¨μν κ²μ λλ€. |
| Scott Buck: H.C. Wainwright & Co, LLC, Research Division Great. And then if I can squeeze one more in, and this is probably for Nick. Curious, should we anticipate any change in OpEx for fiscal '26? Or can you support the anticipated growth in the business with this kind of current level of OpEx spend? | **Scott Buck:** μ’μ΅λλ€. κ·Έλ¦¬κ³ νλλ§ λ μ¬μ€λ³΄κ² μ΅λλ€. μ΄κ±΄ μλ§ Nickμκ² λ리λ μ§λ¬ΈμΌ κ² κ°μλ°μ. 2026 νκ³μ°λμ μ΄μλΉ(OpEx)μ λ³νκ° μμ κ²μΌλ‘ μμν΄μΌ ν κΉμ? μλλ©΄ νμ¬ μμ€μ μ΄μλΉ μ§μΆλ‘ μμλλ μ¬μ μ±μ₯μ λ·λ°μΉ¨ν μ μμκΉμ? |
| Chief Financial Officer: Yes. So we are -- our plan is very much to maintain the cost control that we benefited from in FY '24 and to keep at the -- sorry, '25 and to keep the same level in FY '26, so $2.5 million per month is our sort of target maximum cash spend per month that we anticipate ahead, and we believe we can deliver the year ahead within those constraints. | **Chief Financial Officer:** λ€, μ ν¬ κ³νμ FY '24μμ λλ Έλ λΉμ© ν΅μ λ₯Ό κ³μ μ μ§νλ κ²μ λλ€. μ£μ‘ν©λλ€, FY '25μμ λλ Έλ λΉμ© ν΅μ λ₯Ό FY '26μλ λμΌν μμ€μΌλ‘ μ μ§νλ κ²μ λλ€. λ°λΌμ μ 250λ§ λ¬λ¬κ° μ ν¬κ° μμνλ λͺ©ν μ΅λ νκΈ μ§μΆ μμ€μ λλ€. μ ν¬λ μ΄λ¬ν μ μ½ μ‘°κ±΄ λ΄μμ ν₯ν 1λ μ μΆ©λΆν λ¬μ±ν μ μλ€κ³ λ―Ώμ΅λλ€. |
| Operator: Our next question will be coming from the line of Troy Jensen of Cantor Fitzgerald. | **Operator:** λ€μ μ§λ¬Έμ Cantor Fitzgeraldμ Troy JensenμΌλ‘λΆν° λ°κ² μ΅λλ€. |
| Troy Jensen: Cantor Fitzgerald & Co., Research Division Congrats on all the great progress here. Maybe, Andy, for you to start with, can we just touch on competition? It seems like 6, 12 months ago, there was really nobody -- the traditional security vendors talking about post-quantum security and now I hear them upgrading their algorithms and whatnot. So curious, is that just mainly software-based competition? Or I just curious if you could touch on the competitive dynamics. | **Troy Jensen:** λͺ¨λ νλ₯ν μ±κ³Όλ₯Ό μΆνλ립λλ€. Andy, λ¨Όμ κ²½μ νκ²½μ λν΄ μ¬μ€λ³΄κ³ μΆμ΅λλ€. 6κ°μ, 12κ°μ μ λ§ ν΄λ κΈ°μ‘΄ 보μ μ μ²΄λ€ μ€μμ μμ λ΄μ± 보μ(post-quantum security)μ λν΄ μ΄μΌκΈ°νλ κ³³μ΄ κ±°μ μμλ κ² κ°μλ°, μ΄μ λ μκ³ λ¦¬μ¦μ μ κ·Έλ μ΄λνκ³ μλ€λ μμμ λ£κ³ μμ΅λλ€. μ΄κ²μ΄ μ£Όλ‘ μννΈμ¨μ΄ κΈ°λ° κ²½μμΈμ§ κΆκΈν©λλ€. μ λ°μ μΈ κ²½μ ꡬλμ λν΄ λ§μν΄ μ£Όμ€ μ μμκΉμ? |
| CEO & Director: Yes, sure. I mean, I think to -- in line with what we're seeing in interest and activity within the market, of course, there's going to be people that are going to look at this as something that they want to lean into as well. So we absolutely see a few different competing ideas in terms of how people view this and how they want to deliver it. Just to kind of shine the spotlight back on us for a second, we've been at this for over 5 years. We've got 25 patents. We spent a lot of money deeply thinking about this problem and believe that we've got something very unique. And just to kind of quote a phrase, the gold standard was always symmetric key agreements, which have been used for a long, long time by governments, military, federal defense, et cetera, because that's what they trust. And having a pure software solution that allows you to model that without hardware, without having to think about distributing keys and also the fact that it's not mathematical, anything that mathematical, obviously, a quantum computer eats up very, very easily. we believe that we've got something that's very light, very flexible, goes all the way to the edge of a network and extends itself into those kind of data sovereignty and also trusted domain conversations that we've been having. So hey, I'm sure there are people that will come along with slightly different views. We just want to make sure that we make it as frictionless and easy as possible in what we're doing, and that's what we just keep building on. | **CEO & Director:** λ€, λ¬Όλ‘ μ
λλ€. μμ₯ λ΄μμ μ°λ¦¬κ° λ³΄κ³ μλ κ΄μ¬κ³Ό νλ μμ€μ κ³ λ €νλ©΄, λΉμ°ν μ΄ λΆμΌμ λ°μ΄λ€κ³ μΆμ΄νλ κΈ°μ
λ€μ΄ μμ κ²μ
λλ€. κ·Έλμ μ¬λλ€μ΄ μ΄κ²μ μ΄λ»κ² λ³΄κ³ μ΄λ»κ² μ 곡νκ³ μ νλμ§μ λν΄ λͺ κ°μ§ λ€λ₯Έ κ²½μ μμ΄λμ΄λ€μ΄ μλ κ²μ νμ€ν λ³΄κ³ μμ΅λλ€. μ μ μ°λ¦¬μκ² μ΄μ μ λ§μΆ°λ³΄μλ©΄, μ°λ¦¬λ μ΄ λΆμΌμμ 5λ μ΄μ μΌν΄μμ΅λλ€. 25κ°μ νΉνλ₯Ό 보μ νκ³ μκ³ μ. μ΄ λ¬Έμ λ₯Ό κΉμ΄ μ°κ΅¬νλ λ° μλΉν μκΈμ ν¬μνμΌλ©°, μ°λ¦¬κ° λ§€μ° λ νΉν κ²μ κ°μ§κ³ μλ€κ³ νμ ν©λλ€. ν κ°μ§ ννμ μΈμ©νμλ©΄, 골λ μ€ν λ€λ(gold standard)λ νμ λμΉν€ ν©μ(symmetric key agreements) λ°©μμ΄μμ΅λλ€. μ΄λ μ λΆ, κ΅°, μ°λ°© λ°©μ λΆλ¬Έ λ±μμ μ€λ«λμ μ¬μ©ν΄μ¨ λ°©μμΈλ°, κ·Έλ€μ΄ μ λ’°νλ λ°©μμ΄κΈ° λλ¬Έμ λλ€. νλμ¨μ΄ μμ΄, ν€ λ°°ν¬λ₯Ό κ³ λ―Όν νμ μμ΄ λͺ¨λΈλ§ν μ μλ μμ μννΈμ¨μ΄ μ루μ μ 보μ νκ³ μλ€λ μ , κ·Έλ¦¬κ³ μνμ λ°©μμ΄ μλλΌλ μ μ΄ μ€μν©λλ€. μνμ μΈ κ²λ€μ μμ μ»΄ν¨ν°κ° λ§€μ° μ½κ² ν΄λ ν΄λ²λ¦¬μ£ . μ°λ¦¬λ λ§€μ° κ°λ³κ³ μ μ°νλ©°, λ€νΈμν¬ μ£μ§κΉμ§ νμ₯λκ³ μ°λ¦¬κ° λ Όμν΄μ¨ λ°μ΄ν° μ£ΌκΆκ³Ό μ λ’° λλ©μΈ μμμΌλ‘κΉμ§ νμ₯λλ μ루μ μ 보μ νκ³ μλ€κ³ νμ ν©λλ€. λ¬Όλ‘ μ‘°κΈ λ€λ₯Έ 견ν΄λ₯Ό κ°μ§ μ¬λλ€μ΄ λνλ μ μκ² μ£ . μ°λ¦¬λ λ¨μ§ μ°λ¦¬κ° νκ³ μλ μΌμ μ΅λν λ§μ°° μμ΄ μ½κ² λ§λ€κ³ μ νλ©°, κ·Έκ²μ΄ λ°λ‘ μ°λ¦¬κ° κ³μ ꡬμΆν΄λκ°κ³ μλ κ²μ λλ€. |
| Troy Jensen: Cantor Fitzgerald & Co., Research Division Perfect. Great answer. And then, Andy, also for you, just if you look at the success lately, it seems like it's been telco and government. I'm curious, can you just talk about the corporate side? It seems like this is something financial organizations and a variety of different kind of corporate American companies should be looking at. | **Troy Jensen:** μλ²½ν©λλ€. μ’μ λ΅λ³μ΄μμ΅λλ€. κ·Έλ¦¬κ³ Andy, μΆκ°λ‘ μ§λ¬Έ λλ¦¬κ² μ΅λλ€. μ΅κ·Ό μ±κ³΅ μ¬λ‘λ€μ 보면 ν΅μ μ¬μ μ λΆ λΆλ¬Έμ μ§μ€λμ΄ μλ κ² κ°μ΅λλ€. κΈ°μ λΆλ¬Έμ λν΄ λ§μν΄ μ£Όμ€ μ μμκΉμ? κΈμ΅ κΈ°κ΄λ€κ³Ό λ€μν λ―Έκ΅ κΈ°μ λ€λ μ΄ μ루μ μ κ²ν ν΄μΌ ν κ² κ°μλ° λ§μ λλ€. |
| CEO & Director: Yes. That's a really good question, Troy. And we -- so I kind of feel like it's building a bit like the OSI stack if people know what that is kind of from the physical level upwards, as I talked about optical transport layers and things like that. The very basics are, "hey, let's protect the actual fundamentals of how things are connected together. " And I feel like now we're getting into the kind of more operational layers. I feel like anybody that is regulated, is critical infrastructure, is heavy in intellectual property, people that are starting to talk to us. And I mentioned that we've done a briefing to a regulatory body in my prepared remarks. And you can see that now they're building their guidance saying, hey, this is obviously a threat to regulated financial industries. They're ones we're talking to at the moment. So we're seeing the people that are actually operating some of the infrastructure are thinking about how to protect that and also to protect against bad actors. And then anybody that's doing anything that's rich in IP that they've got long development cycles. So you could think about farmers, life sciences, chemicals companies, they're the people that want to protect their IP as well. Because obviously, if there's a harvest now decrypt later, that's got a long shelf life because they're years into development of that. So those are the industries we're seeing coming along next and starting to have conversations with them. The secure compute really leans into financial services as well, obviously being a regulated industry. So we see those kind of going hand in glove really. Hopefully, that makes sense. | **CEO & Director:** λ€, μ λ§ μ’μ μ§λ¬Έμ
λλ€. μ κ° λ³΄κΈ°μλ OSI μ€νμ ꡬμΆνλ κ²κ³Ό λΉμ·νκ² μ§νλκ³ μμ΅λλ€. 물리 κ³μΈ΅λΆν° μμν΄μ μλ‘ μ¬λΌκ°λ λ°©μμ΄μ£ . μ κ° κ΄μ μ‘ κ³μΈ΅ κ°μ κ²λ€μ λν΄ λ§μλλ Έλ―μ΄, κ°μ₯ κΈ°λ³Έμ μΈ κ²μ "μ€μ λ‘ μ΄λ»κ² μ°κ²°λμ΄ μλμ§ κ·Έ κΈ°λ³Έμ 보νΈνμ"λ κ²μ
λλ€. κ·Έλ¦¬κ³ μ§κΈμ μ’ λ μ΄μ κ³μΈ΅μΌλ‘ λ€μ΄κ°κ³ μλ€κ³ λλλλ€. κ·μ λ₯Ό λ°λ κΈ°μ λ€, μ€μ μΈνλΌ κΈ°μ λ€, μ§μ μ¬μ°κΆμ΄ μ€μν κΈ°μ λ€μ΄ μ ν¬μ λνλ₯Ό μμνκ³ μμ΅λλ€. μ κ° μ€λΉλ λ°μΈμμ κ·μ κΈ°κ΄μ λΈλ¦¬νμ μ§ννλ€κ³ λ§μλλ Έλλ°μ. μ΄μ κ·Έλ€μ΄ κ°μ΄λμ€λ₯Ό λ§λ€λ©΄μ "μ΄κ²μ λͺ λ°±ν κ·μ λμ κΈμ΅ μ°μ μ λν μνμ΄λ€"λΌκ³ λ§νλ κ²μ λ³Ό μ μμ΅λλ€. νμ¬ λνλ₯Ό λλκ³ μλ κ³ κ°λ€μ λλ€. μ€μ λ‘ μΌλΆ μΈνλΌλ₯Ό μ΄μνλ κΈ°μ λ€μ΄ μ΄λ₯Ό μ΄λ»κ² 보νΈν μ§, κ·Έλ¦¬κ³ μ μμ νμμλ€λ‘λΆν° μ΄λ»κ² λ°©μ΄ν μ§ κ³ λ―Όνκ³ μμ΅λλ€. κ·Έλ¦¬κ³ μ§μ μ¬μ°κΆ(IP)μ΄ νλΆνκ³ κ°λ° μ£ΌκΈ°κ° κΈ΄ μ¬μ μ νλ κΈ°μ λ€λ μμ΅λλ€. μλ₯Ό λ€μ΄ μ μ½, μλͺ κ³Όν, νν κΈ°μ λ€μ μκ°ν΄λ³Ό μ μλλ°, μ΄λ€μ μμ¬μ IPλ₯Ό 보νΈνκ³ μ ν©λλ€. μλνλ©΄ 'μ§κΈ μμ§ν΄μ λμ€μ ν΄λ νλ(harvest now decrypt later)' 곡격μ κ²½μ°, κ°λ°μ μλ μ΄ κ±Έλ¦¬κΈ° λλ¬Έμ μ₯κΈ°μ μΈ μνμ΄ λκ±°λ μ. μ΄λ° μ°μ κ΅°λ€μ΄ λ€μ νκ²μ΄κ³ , νμ¬ μ΄λ€κ³Ό λνλ₯Ό μμνκ³ μμ΅λλ€. 보μ μ»΄ν¨ν (secure compute)μ κ²½μ° κΈμ΅ μλΉμ€ μ κ³μλ νΉν μ ν©ν©λλ€. κ·μ μ°μ μ΄λΌλ μ μ΄ λͺ ννλκΉμ. μ΄ λ κ°μ§κ° μ€μ λ‘ ν¨κ» μμ§μ΄λ κ²μΌλ‘ λ³΄κ³ μμ΅λλ€. μ΄ν΄κ° λμ ¨κΈ°λ₯Ό λ°λλλ€. |
| Operator: Thank you. And there are no more questions in the queue. I would like to turn the call back over to Andy for closing remarks. Please go ahead. | **Operator:** κ°μ¬ν©λλ€. λ μ΄μ μ§λ¬Έμ΄ μμΌμλ€μ. λ§λ¬΄λ¦¬ λ§μμ μν΄ Andyμκ² λ€μ λ§μ΄ν¬λ₯Ό λκΈ°κ² μ΅λλ€. λ§μν΄ μ£ΌμΈμ. |
| CEO & Director: Thank you. And again, everybody, thank you for joining us today. We look forward to speaking with you again following the close of our 2026 first half results. We really appreciate your interest in the company. Thank you again for your attendance. | **CEO & Director:** κ°μ¬ν©λλ€. λ€μ νλ² λ§μλ리μ§λ§, μ€λ μ°Έμν΄ μ£Όμ λͺ¨λ λΆλ€κ» κ°μ¬λ립λλ€. 2026λ μλ°κΈ° μ€μ λ°ν μ΄ν λ€μ μ¬λ¬λΆκ³Ό λ§μ λλ μ μκΈ°λ₯Ό κΈ°λνκ² μ΅λλ€. μ ν¬ νμ¬μ κ΄μ¬ κ°μ Έμ£Όμ μ μ§μ¬μΌλ‘ κ°μ¬λ립λλ€. μ°Έμν΄ μ£Όμ μ λ€μ νλ² κ°μ¬ν©λλ€. |
| Operator: Thank you, ladies and gentlemen. This concludes today's conference. Thank you for your participation. You may now disconnect. Speakers, please stand by for your debrief. | **Operator:** κ°μ¬ν©λλ€, μ¬λ¬λΆ. μ€λ 컨νΌλ°μ€λ₯Ό λ§μΉκ² μ΅λλ€. μ°Έμ¬ν΄ μ£Όμ μ κ°μ¬ν©λλ€. μ΄μ μ°κ²°μ μ’ λ£νμ λ λ©λλ€. λ°νμλΆλ€μ λλΈλ¦¬νμ μν΄ λκΈ°ν΄ μ£ΌμκΈ° λ°λλλ€. |
# Arqit Quantum μ€μ λ°ν μ£Όμ μμ½
β’ **μμ₯ μμ κΈμ¦**: 2025λ
λ€μ΄ IBM, Google λ±μ μμμ»΄ν¨ν
λ°μ κ³Ό "harvest now, decrypt later" μνμ λν μΈμ νλλ‘ μ ν μμ° λ° μμ
νλμ΄ ν¬κ² μ¦κ°. νΉν ν΅μ μ
κ³μμ κ·μ κΈ°κ΄μ 리μ€ν¬ κ΄λ¦¬ μκ΅¬λ‘ μΈν μμ μ¦κ°κ° λλλ¬μ§
β’ **Encryption Intelligence μ ν μ±κ³Ό**: 5μ μΈμν Encryption Intelligenceκ° λ¨κΈ° λ§€μΆ λλ ₯μΌλ‘ λΆμ. ν΅μ μ¬λ€μ΄ λ€νΈμν¬ μ·¨μ½μ μ§λ¨λΏ μλλΌ μ§μμ λͺ¨λν°λ§ λκ΅¬λ‘ νμ©νλ €λ μμ νμΈ. μμ
μ¬μ΄ν΄μ΄ κΈ°μ‘΄ μ ν λλΉ μ§§μ λΉ λ₯Έ λ§€μΆ κΈ°μ¬ μμ
β’ **λΉμ© ν΅μ μ μ§**: FY26μλ μ 250λ§ λ¬λ¬ μμ€μ μ΄μλΉ μ§μΆ μ μ§ κ³ν. νμ¬ λΉμ© κ΅¬μ‘°λ‘ μμ μ±μ₯ μ§μ κ°λ₯νλ€λ κ²½μμ§μ μμ κ° νλͺ
β’ **κ²½μ μ°μ κ°μ‘°**: 5λ
μ΄μμ κ°λ° κΈ°κ°κ³Ό 25κ° νΉν 보μ . νλμ¨μ΄ μμ΄ λμΉν€ λ°©μμ μννΈμ¨μ΄λ‘ ꡬνν μ°¨λ³νλ κΈ°μ λ ₯ κ°μ‘°. μ΅κ·Ό κ²½μμ¬λ€μ μμ₯ μ§μ
μλ κΈ°μ μ μ°μ μ μ§ κ°λ₯ νλ¨
β’ **μμ₯ νλ μ λ΅**: ν΅μ Β·μ λΆ λΆλ¬Έ μ±κ³΅ ν κΈμ΅, μ μ½,