Quantification of digital sovereignty
Why does digital sovereignty need to be quantified and thus made measurable? Digital sovereignty is not an isolated feature of a single software or service product. Rather, it forms the basis for robust IT risk management that encompasses individual IT components as well as their interactions and the processes built upon them. Only measurable factors can be systematically analyzed, specifically improved, and verifiably demonstrated to partners, customers, or supervisory authorities.
Your advantages through quantification
Improve your own resilience
- ✓ Protection against price extortion
- ✓ Protection against business interruption
- ✓ Targeted investment planning
- ✓ Protection against political risks
Prove your own resilience
- ✓ Building trust through proven resilience
- ✓ Competitive advantage
- ✓ Genuine sovereignty instead of sovereignty washing
- ✓ Fulfillment of compliance and governance requirements
The quantification process
Qualitative analysis results through our standardized quantification
Infrastructure analysis and weighting according to relevance for business stability
We collect information about the IT infrastructure based on four sub-areas: data sovereignty, components, competencies, and open source.
The components, i.e., software, hardware, and services, are assigned a weighting score that describes how relevant the component is to business stability.

Evaluation of all components based on predefined criteria and calculation of a score
Our digital sovereignty criteria are systematically applied to the information collected about the infrastructure and rated on a scale of 0 to 5 points.
The values are grouped according to specific aspects, weighted according to relevance, and then added up to a total score that expresses the degree of digital sovereignty of the IT infrastructure.

Precise digital sovereignty score, suggestions for improvement, and continuous monitoring
The score for each component and criterion reveals the areas of highest risk due to digital dependencies. This allows prioritized measures to be proposed.
A reassessment after implementation of the measures reveals how effective they have been in increasing the digital sovereignty of the infrastructure.

Ready to take the first step? Let's work together to make your sovereignty measurable.
Arrange a free initial consultationOur offerings
The scope of quantification depends on the size of the infrastructure to be examined. To distinguish between the different sizes, we count the number of components to be examined. Components include: software used, libraries used for own code, hardware, cloud services (SaaS products or services in public clouds).
Quick overview of risks
- ✓ One-time recording of components
- ✓ Risk assessment for each component
- ✓ Overall assessment of infrastructure
- ✓ Possible alternatives for dependencies found
- ✓ Certificate of Digital Sovereignty
Including 50 Components
Ideal for initial risk assessment and identification of problem areas.
Continuous monitoring
- ✓ Monthly Snapshot (Package S)
- ✓ History of your development
- ✓ Data via web portal and API
- ✓ Consulting quota for design decisions
Including 50 Components
Permanent protection for your company.
Attention to the smallest detail
- ✓ Monthly Snapshot (Package S)
- ✓ In-depth analysis of your infrastructure to check every interconnection between components
- ✓ Detailed report on identified risks and assessment of resolution options
- ✓ tailored to your infrastructure
Perfect for preparing infrastructure changes.
Ready to start? Open questions?
We will clarify all details with you during a free initial consultation.
Contact us →All prices excl. VAT.
Ready to improve your digital sovereignty?
Together with our experts we will find your digital dependencies and solve them together with you.
