Cloud computing, as a major technological trend, reflects essential key technologies and serves as a driving force behind digitalization. At the same time, the desire for digital sovereignty is growing. This means having complete control over your data and regulated access models for third-party providers. This can be achieved by creating customized, private cloud computing configurations - a time-consuming and technically complex task.
For the sustainable success of cloud solutions, two aspects are particularly relevant: trust and acceptance. However, the standard offerings in this sector do not adequately meet these requirements, especially concerning IT environments for classified data.
We support the Public Sector in planning, building and operating IT Infrastructures for Classified Data
In collaboration with our partners infodas, Kernkonzept and Utimaco, we have launched the "National Secure Cloud" (NSC) program. This groundbreaking project aims to ensure the requirements of digital sovereignty concerning data and key ownership up to the classification level of SECRET. The program is tailored for authorities and organizations within the public and military sectors that handle sensitive or classified information in their daily operations. With the NSC, we enable our clients to operate a private cloud autonomously, on site and with full control over every aspect of the technical implementation in line with digital sovereignty.
By using open source software, developing certified and established IT security products and incorporating innovative technologies, we provide a flexible and scalable approach to resource utilisation in the spirit of a 'true' cloud - also available as a highly mobile solution.
The NSC primarily ensures the exchange of sensitive information at national classification levels up to GERMAN VS-VERTRAULICH / NATO CONFIDENTIAL and GERMAN SECRET / NATO SECRET as well as NATO/MISSION SECRET.
The design and integration of secure cloud solutions, such as the NSC, into an existing VS-IT network, including their secure operation (SecOps), are central to our work. This includes the creation and continuous updating of VSA-compliant security concepts. Based on usage scenarios, threat and risk analyses and the existing VS-IT infrastructure, we first carry out a comprehensive security assessment. Any residual risks are minimized through additional organizational and technical measures, such as the deployment of certified IT security products. Following this, we develop a VSA-compliant solution concept.
We provide support for the setup and complete, sovereign operation of secure cloud solutions on premises, including assistance with troubleshooting and adjustments (DevOps).
We enable clients to utilize management systems for orchestrating secure cloud solutions, such as the agile setup of a security domain for rapid availability and project support.
We establish and operate a development environment for the design of secure cloud solutions.
Please fill in the form and we will get in touch with you as soon as possible.