The technology behind identiqa — AI security models trained on European threat data, post-quantum encryption ready for what's coming, sovereign infrastructure operated entirely in Europe.
Defense and investigation aren't the same problem. Aura watches your perimeter in real time. Black Iris reconstructs what already happened. Two purpose-built models — not one model stretched thin.
Detects what hasn't been seen before. In real time.
Aura is the AI brain behind ProtectionGrid. Continuously analyzes events across all six modules — domains, web, apps, email, identity — and correlates signals into a single threat posture. Trained on European attack patterns, optimized for sub-60s response.
Reconstructs what already happened. With evidence.
Black Iris is the AI brain behind identiqa Intelligence. Built for forensic analysis, attribution and threat reconstruction. Where Aura defends in real time, Black Iris explains what happened — for law enforcement, government investigators, and incident response teams.
Most encryption in use today will be broken by quantum computers within this decade. Most security vendors are not prepared. We are.
identiqa was among the first European cybersecurity platforms to implement post-quantum cryptographic algorithms in production. We use NIST-standardized PQC primitives (ML-KEM, ML-DSA) alongside proven classical encryption — a hybrid stack that protects today and tomorrow.
Why it matters: encrypted data captured today by a state-level adversary can be stored and decrypted later, once quantum computers reach scale. This "harvest now, decrypt later" risk is real for any organization with long-lived sensitive data — financial records, medical files, government communications, IP.
Read the deep diveWe don't run on AWS, Azure or GCP. Our network is operated on hardware we own, in data centres we control, under European jurisdiction — without compromising performance.
Faster than every attack.
Every customer connection is routed to the nearest of our edge nodes via BGP anycast. Traffic terminates close to the user — fast for legitimate visitors, hostile for distant attackers. Built on our own backbone, not on third-party CDNs.
No CLOUD Act. No exceptions.
We operate our infrastructure in colocation facilities across Germany, Ireland, Portugal and Cyprus — on hardware we own, with personnel under European employment, governed by European law. Customer data never touches AWS, Azure or GCP. No US jurisdiction, no exceptions.
Most cybersecurity companies depend on the same three or four hyperscalers underneath, regardless of what their marketing says. That's a structural risk that no marketing can fix.
We made the harder choice: own infrastructure, own training data, own engineering team — from BGP routers to AI models. It's slower to build. It's the only way to actually be sovereign.
Each pillar has its own technical deep-dive. Or talk to our team directly — we're happy to walk you through architecture details, threat models, and deployment options.