Trust level

Glossary Page

The Trust Level of a computer system is determined by assessing the potential risks associated with its intended use. This involves conducting a comprehensive risk analysis that takes into account the probability and potential consequences of a system attack. Based on the results of this analysis, an appropriate level of hardware and software protection mechanisms is established to ensure the system is adequately protected.

https://link.springer.com/referenceworkentry/10.1007/978-1-4419-5906-5_907 external-link

Latest Webinars

Latest Articles

Blog Post Cover

Bundesliga fans on the move: What Motion Data reveals about football culture

The article explores how T‑Systems’ Motion Data leverages anonymized mobile network information to reveal real‑world fan behavior in the 2024/25 Bundesliga season. It highlights how supporters travel to home and away matches, the demographic composition of stadium audiences, and which clubs attract the largest crowds—including surprising cross‑border dynamics. By transforming assumptions into measurable insights, Motion Data enables clubs, cities, and event organizers to improve mobility planning, enhance stadium operations, and design more targeted fan engagement strategies.

Read more

external-link
Author image

Tino Bliesener

Jan 28, 2026

Blog Post Cover

Flex: Electronic Control Unit (ECU)

Flex partnered with T-Systems to migrate ECU data exchange to Catena-X, enabling secure, multiregional, real-time validation across global production sites. Using T-Systems’ Connect & Integrate solution, Flex achieved end-to-end integration, API and Cofinity-X interface testing, and a fully validated production setup. This scalable dataspace foundation now supports future use cases including Product Carbon Footprint, Certificate Management, Battery Pass, and global traceability, while maintaining full data sovereignty.

Read more

external-link
Author image

Andrea Garcia

Jan 16, 2026

Blog Post Cover

Sovereign connectivity: Automating access in dataspaces

Sovereign connectivity in dataspaces requires automating network access to ensure security, compliance, and operational scale. In the Data Intelligence Hub, we replace manual firewall updates with a declarative, Kubernetes-native model using Custom Resource Definitions (CRDs). Customers define their allowed IP ranges through a self-service portal, which generates an IpAccessPolicy object representing the desired state. A controller then reconciles this state with the underlying infrastructure, automatically updating Kubernetes Ingress configurations and preventing drift. This architecture ensures auditability, validates inputs before enforcement, and keeps network access aligned with the principles of data sovereignty across multi-tenant environments.

Read more

external-link
Author image

Mohamed Radwan

Jan 15, 2026