Sealed & Sovereign Confidential Computing
The founder of Digital Trust Innovations is the inventor of the world's first cloud infrastructure which administrators are technically unable to take note of the processed data. The hardness of this solution goes so far that for the first time penetration tests can be passed from the inside.
With its know-how, Digital Trust Innovations supports the architects of computing infrastructure with business models in which the security and sovereignty of data processing are important.
Together with his co-founders, Hubert Jäger built Uniscon GmbH, which today is one of the technology leaders in the field of cloud security with more than 50 employees. It is growing rapidly and won the Deloitte Fast 50 Award twice. TÜV SÜD joined Uniscon in 2017 and took over the high-tech start-up completely in 2020.
Still enthusiastic about entrepreneurial spirit, Digital Trust Innovations supports start-ups and young companies - regardless of the topic of IT security - in many questions of corporate development
Support of
Cloud & Security Projects
The further digitization advances, the more important IT security and data protection become.
Digital Trust Innovations assists in projects in the areas of machine learning and artificial intelligence, which through a high degree of IT security and sealed data processing gain the freedom that is necessary to successfully differentiate themselves in the market.
The CEO of Digital Trust Innovations GmbH edited together with Dr. Ralf O.G. Rieken a book, which provides the answers to the question “How much security is really needed?”, wich is asked by security officers and researchers alike. The legal framework is examined, the trust dilemma of cloud computing worked out and the options for cloud security that are fundamentally available are described and quantitatively analyzed by modeling the attacker's probability of success. It is shown how the necessary breakthrough in terms of data protection and IT security can be achieved with the concept of tamper-proof, sealed processing.
So far, computing infrastructures have been tamper-proof at best, i.e. the confidentiality and integrity of the data processing are protected as reliably as possible.
Only simple means such as separate backups, concrete bollards and security guards are used to protect against sabotage. However, they cannot provide protection against intelligently prepared acts of sabotage.
Digital Trust Innovations works on sabotage-proof computing networks that are also secure against sabotage if the operating organization or its suppliers are subverted by saboteurs.
We look forward to a professional exchange with you!