Product

Data Sovereignty as a Service

by sovity

Product

Data Sovereignty as a Service

by sovity

Problem statement

The more data is shared the more we lose control

Trust issues

Shared or traded data can be copied or misused, i.e., it deviates from the agreed usage or data are sold to third party etc.


Companies do not share sensitive information without a strong trust in data-receiving business partner. Although being in a trustworthy partnership, data can be misused within the company (e.g., sensitive information is forwarded accidentally, or data is not deleted entirely).
Limited control

Contracts are today’s means to prevent data misuse. But after sharing, hope and pray prevails not to become victim of opportunistic behavior due to the absence of control.


Missing trust can be partially overcome by contracts, but those represent just a legal frame and the partner never knows fully if the contract is followed. For sure, contractual penalties can be defined very strict. However, too strict, or high penalties might prevent the partner to sign the contract.
Low interoperability

A lack of agreed standards and formats for data exchange prevent data sharing in broader scale.


A seamless and scaled collaboration between partners based on data, requires accepted protocols, formats, and interfaces to be able to exchange information. Today’s technologies are defined for individual bilateral cases and do not scale for larger ecosystems. Interoperability on software is a core requirement for future use cases, but also on data level is thus not established yet.
Data barred as company’s asset

Sensitive information remains internally as benefits and the worthiness are unknown and the risk of losing information is too high.


The value of data increases by its usage and by combining them with new information. However, the value is not entirely understood by companies, protecting the information within their data silos. If the benefits of exchanged data are foreseeable, sensitive information would be shared more often.
Trust issues

Shared or traded data can be copied or misused, i.e., it deviates from the agreed usage or data are sold to third party etc. Companies do not share sensitive information without a strong trust in data-receiving business partner. Although being in a trustworthy partnership, data can be misused within the company (e.g., sensitive information is forwarded accidentally, or data is not deleted entirely).

Limited control

Contracts are today’s means to prevent data misuse. But after sharing, hope and pray prevails not to become victim of opportunistic behavior due to the absence of control. Missing trust can be partially overcome by contracts, but those represent just a legal frame and the partner never knows fully if the contract is followed. For sure, contractual penalties can be defined very strict. However, too strict, or high penalties might prevent the partner to sign the contract.

Low interoperability

A lack of agreed standards and formats for data exchange prevent data sharing in broader scale. A seamless and scaled collaboration between partners based on data, requires accepted protocols, formats, and interfaces to be able to exchange information. Today’s technologies are defined for individual bilateral cases and do not scale for larger ecosystems. Interoperability on software is a core requirement for future use cases, but also on data level is thus not established yet.

Data barred as company’s asset

Sensitive information remains internally as benefits and the worthiness are unknown and the risk of losing information is too high. The value of data increases by its usage and by combining them with new information. However, the value is not entirely understood by companies, protecting the information within their data silos. If the benefits of exchanged data are foreseeable, sensitive information would be shared more often.

Solution

Data sovereignty as a service
by sovity based on IDS

Metadata Broker
To search for data sources, participants use the Metadata Broker which acts as a registry. It stores meta information about the data offerings like semantic structure of the data, attached usage policies or the technical endpoint to fetch the data from.

Clearing House
Data transactions can be logged and tracked in the Clearing House if demanded by the data provider, data consumer or applied regulations of the data space owner. This component acts as fundamental role for contracts and financial payments.

App Store
Various data and business apps can be downloaded via the App Store and deployed within the Connector. The certified apps are offered by different certified app developers or service providers. Through integration of billing and settlement functions into the App Store, monetization of algorithms is enabled.

Vocabulary Registry
To standardize data exchange and achieve full interoperability between apps and data spaces, data providers and app developers can upload their semantic ontologies into the Vocabulary Registry.

Identity provider
The Identity Provider manages all identities of Participants and Connectors within a data space to ensure validity and trustworthiness. The DAPS acts as registry and verifies all Connectors, the ParIs registers all participants in a data ecosystem and the Certification Authority issues technical X509 certificates.

Data source
Companies want to share their sensitive data with business partners in a sovereign manner. The sources are connected to the Connectors and remain decentralized within the infrastructure of each company. The integration is open to almost all imaginable source types like databases, IT systems and without dependence on specific protocols. The approach ensures, that data are made available without exposing the endpoints of these sources.

Data source
Companies want to share their sensitive data with business partners in a sovereign manner. The sources are connected to the Connectors and remain decentralized within the infrastructure of each company. The integration is open to almost all imaginable source types like databases, IT systems and without dependence on specific protocols. The approach ensures, that data are made available without exposing the endpoints of these sources.

Usage policies
Usage policies are defined by the data provider and describe when, who, how long, or for what purpose the data consumer is allowed to use the shared information. The Connector enforces the defined usage policies on a technical level, which ensures that the data cannot be misused.

Usage policies
Usage policies are defined by the data provider and describe when, who, how long, or for what purpose the data consumer is allowed to use the shared information. The Connector enforces the defined usage policies on a technical level, which ensures that the data cannot be misused.

Sovereign data exchange
Based in the architecture and certifications of IDS, the data is shared between data providers and consumers via the Connector. The data exchange is realized as peer-to-peer connection, avoiding a central storage of data. Thus, data remain at their original sources until requested – a decentralized network. With the help of encrypted connections and usage policies, which are enforced by the Connectors usage control, data can be shared trustworthy.

Connector
As a single entry point the Connector allows participants to share data with partners. It integrates data source and connects with other Connectors. Within this key component, data sovereignty is integrated by defining and enforcing usage policies for the exchanged information. The connector is an IDSA-certified component and acts as trusted environment for data and apps.

Connector
As a single entry point the Connector allows participants to share data with partners. It integrates data source and connects with other Connectors. Within this key component, data sovereignty is integrated by defining and enforcing usage policies for the exchanged information. The connector is an IDSA-certified component and acts as trusted environment for data and apps.

Find out more on desktop

IDS technology as basis

The decentralized architecture of IDS, mainly developed as open-source software, establishes a self-determined control of data usage, to gain the full value out of data. The technology is built and validated by 130+ companies from various industries jointly with Fraunhofer and is established in multiple data space initiatives positioning IDS a global standard for data sharing. IDS consists of different software components to realize a sovereign, interoperable and secure exchange of data, seen as economic goods. 

What we provide

Automated integration
A Fully managed solution
Full data sovereignty
Easy access with simple usage

Full data sovereignty
Easy access with simple usage
Fully-managed solution
Automated integration

Our Services

The sovity
customer journey

1. Education

sovity ideates and advises how to build and establish sovereign data exchange to achieve new business value, collaboration, or innovation.


We jointly help defining and implementing use cases based on IDS and provide deep technical expertise to build-up knowledge in the technology.
2. Onboarding

We provide a seamless onboarding to the deep-tech IDS technology to participate in data spaces. Therefore, an easy access to the sovity


SaaS solution is delivered by a highly automated integration process with your data sources. Instead of spending weeks in systems integration activities, leverage a standard set of onboarding mechanisms integrated in our SaaS.

Our Core Offering

Fully managed IDS technology as SaaS

3. Participate in sovereign data exchange
Connector as a service
Provide, integrate, and manage access to data spaces leverage the best open-source based Connector via sovity as

Leverage the best open-source based Connector via sovity as SaaS – a fully managed service hosted by sovity. Receive the latest versions which are always updated and interoperable, with no need to care about the technical complexity.
Data space as a service
Manage IDS and Gaia-X shared services to operate data spaces

For full data sovereignty in a data space, a couple of shared services are mandatory (Broker, Identity Provider, Clearing House etc.). sovity provides and operates those open-source components as SaaS for any kind of data space.

Our Services

The sovity
customer journey

1. Education
Advise how to build and establish sovereign data exchanges
2. Onboarding
Seamless connection to data spaces by automated onbaording

Our Core Offering

Fully managed IDS technology as SaaS

3. Usage

Connector as a service
Connector to access data space and share data soverignly

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Data space as a service
IDS and Gaia-X shared services to operate data space

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Our Services

The sovity customer journey

1. Education

sovity ideates and advises how to build and establish sovereign data exchange to achieve new business value, collaboration, or innovation. We jointly help defining and implementing use cases based on IDS and provide deep technical expertise to build-up knowledge in the technology. 

2. Onboarding

We provide a seamless onboarding to the deep-tech IDS technology to participate in data spaces. Therefore, an easy access to the sovity SaaS solution is delivered by a highly automated integration process with your data sources. Instead of spending weeks in systems integration activities, leverage a standard set of onboarding mechanisms integrated in our SaaS.

Our Core Offering

Fully managed IDS technology as SaaS

3. Usage

Connector as a service

Provide, integrate, and manage access to data spaces Leverage the best open-source based connector via sovity as SaaS – a fully managed service hosted by sovity. Receive the latest versions which are always updated and interoperable, with no need to care about the technical complexity. 

Data space as a service

Manage IDS and Gaia-X shared services to operate data spaces for full data sovereignty in a data space, a couple of shared services are mandatory (Broker, Identity Provider, Clearing House etc.). sovity provides and operates those open-source components as SaaS for any kind of data space.

product-interface-0

Our Solution

Easy usage of
complex technology

By our seamless user experience, you are able to register and connect your data easily. Manage the different services from just one portal: configure the connector, manage the data availability and keep always the overview of your connections.

Our Solution

Easy usage of complex technology

By our seamless user experience, you are able to register and connect your data easily. Manage the different services from just one portal: configure the connector, manage the data availability and keep always the overview of your connections.

product-interface-0

sovity SaaS advanced infrastructure

sovity architecture
to improve user experience DSaaS –
a technical view

sovity SaaS advanced infrastructure

sovity architecture
to improve user experience DSaaS –
a technical view

Why use sovity

Using and managing IDS
technology requires deep
expertise and resources and
is not part of a company’s core business.

Deep IDS Know how
Sharing data sovereignly requires deep expertise in IDS or Gaia-X services. sovity has a strong knowledge in those complex technologies and our team members shaped them from day 1 jointly within Fraunhofer, IDSA and with industrial partners.
IT resources
Building up required know-how as well as integrating and managing the technology requires dedicated resources and capacities. By partnering with sovity, you get insights into needed expertise tailored to your demand as service.
Data exchange as commodity
sovity facilitates your business with sovereign data exchange. You can focus on your core value creation on top of this commodity and still being always in full control over your sensitive information.
Holistic data space
Team up with one of the first data space tech providers who facilitate data sovereignty based on all technical IDS components, since sovity manages a data space holistically.

Today’s obstacle

Not every company
can and should
become an expert in
deep-tech software

Fraunhofer spin-off
As a Fraunhofer spin-off, sovity is best equipped to provide Data-Sovereignty-as-a-Service (DSaaS). From a scientific background and a neutral attitude, we represent trustworthiness and will always stay ahead on the best available technology.
Business case
Building up the expertise and managing IDS technology for just one Connector requires a lot of resources. sovity’s DSaaS based on a subscription fee will support your business case in realizing use cases based on data sharing.

Ready to keep sovereignty over your data? 

Get in contact with us!

Ready to keep sovereignty over your data? 

Get in contact with us!

FAQ’s

We are hiring

Our team is growing! Become part of a strong digital startup and shape data ecosystems of the future.