Sovereign cloud for internal and external security

Use the potential of cloud solutions: Whether VS-Cloud for safeguarding internal and external security, securing evidence or as the basis for state-of-the-art use cases in the field of artificial intelligence for emergency services.

Contact us

Security in the digital age: Sovereign cloud solutions for the police, armed forces, intelligence services and their digitalization partners from industry

In the area of security and defence, the digital transformation offers many opportunities for optimizing work processes and improving effectiveness, for example in securing digital evidence. However, digitalization also increases the challenges: the threat situation in cyberspace is constantly growing. Protecting critical infrastructure, sensitive data and maintaining the ability to act are therefore a priority – for national and international security players alike.

A solution outside your own data center that meets the high need for protection must be digitally sovereign on a technological, economic and legal level in order to become less dependent on geopolitical developments. With our sovereign STACKIT Public Cloud and the STACKIT Distributed Cloud for the CORE, FOG and EDGE areas, compliance with these three key factors is guaranteed. The fulfillment of specific requirements, for example in the area of security, also enables the use of modern, sovereign platforms by authorities and companies in the area of internal and external security.


Advantages of the STACKIT sovereign cloud for the security and defense sector

Create the basis for extensive digitalization with our cloud. Benefit fully from our unique combination of location and provider features and true digital sovereignty:

stabil Icon

Complete sovereignty

  • Comprehensive control: Maintain complete autonomy over data, cloud infrastructure and operations.
  • Independence: Work independently of external units.

Business continuity in air-gapped environments

  • Isolated network (air-gapped): Operate your cloud infrastructure in physically isolated networks.
  • Uninterrupted operation: Ensure operational continuity regardless of external connectivity.
schloss icon

Security and Compliance

  • Regulatory compliance: Meet stringent security and compliance requirements in regulated sectors with confidential data
  • Confidentiality requirements can be mapped (up to SECRET/NATO SECRET).

Applications for internal and external security

A finger points to a cloud with a lock

Sovereign cloud in practice

In addition to providing a highly secure public cloud infrastructure, we offer solutions that can be operated as private cloud environments. They all enable efficiency gains and increase the quality of work through modern technologies.

Data analysis with AI and business intelligence

Analyzing large amounts of data from various sources (e.g. social media, darknet analyses) is time-consuming and requires considerable resources. By using cloud-based big data platforms with integrated analysis tools and machine learning algorithms, patterns and trends can be identified and threats detected at an early stage. With our Data & AI Platform and the BI platform Strategy, we offer two reliable and powerful technologies.

Secure communication

Secure communication and the exchange of information between different operational teams are at risk due to a lack of encryption and access controls. Implementing a secure communication platform in the cloud with end-to-end encryption and role-based access control secures sensitive communication and protects confidentiality and integrity. With Wire, STACKIT provides a communication platform approved up to VS NFD that already combines quantum-safe encryption with universal connectivity and open formats.

Digital preservation of evidence

Securing digital evidence from conventional and cybercrime is complex and requires specialized expertise. A technological solution for forensic analyses, for example, with automated capture processes and integrated tools for preserving evidence must be operated on a secure infrastructure. With STACKIT Distributed Cloud, we offer the option of a dedicated, individualized private cloud environment. This creates a secure framework for the use of state-of-the-art technology for critical workloads.

Situation picture

The planning and execution of missions, operations and accesses requires a comprehensive understanding of the current situation. The challenge is to ensure a timely and complete picture of the situation that enables informed decision-making. To meet this challenge, our cloud platform is used to aggregate, analyse and visualize the data. It uses real-time data streams, artificial intelligence to extract insights and customizable dashboards to improve the user’s situational awareness.


With STACKIT, you can rely on a
secure cloud partner:

C5-Testat weiß C5-Testat weiß
TÜV-27001 TÜV-27001
TÜV Süd ISO 50001 TÜV Süd ISO 50001
DE-CIX-farbig DE-CIX-farbig

To the certificates


Would you like to drive forward the digitalization of your institution and learn more about STACKIT?

“The sovereign VS Cloud is more than just a technological solution. It is a strategic building block for strengthening internal and external security and a guarantee for maintaining our free and democratic basic order and securing peace and prosperity. My team is at your disposal to support you in implementing your individual cloud strategy.”

Christian Fischbach
Head of Go 2 Market Schwarz Digits Defense  

Get in contact