
Artificial intelligence is often described as a latent threat to corporate data sovereignty. If you don’t want to expose yourself to this threat, you need to develop strategies and tactics for using AI securely and productively. VNC explains the most important parameters of Confidential AI.
Artificial intelligence and confidential computing are in a seemingly irresolvable tension: on the one hand, AI poses a latent threat to confidential computing, but on the other hand, it can help in its implementation. The magic word for resolving this contradiction is blank” rel=”noopener”>confidential AI. It describes a concept for dealing with AI that identifies the major uncertainty factors and makes them manageable. Data and data sovereignty come first. In addition, AI can be used in a targeted and secure manner to optimize collaboration and communication applications. VNC, a leading developer of open source-based enterprise applications, explains the key elements:
- Decentralized LLMs: Large Language Models (LLMs) typically run on the vendors’ proprietary hyperscaler platforms. What happens to the data there is unknown. Therefore, it makes sense to download the LLMs to your own platforms using appropriate toolkits (such as Intel OpenVINO). This way, both the data and the applications remain in your own data center and are protected from unauthorized access.
- Local AI for application optimization: Stripped-down models of these LLMs can be integrated directly into applications in dedicated software stacks. AI functions such as intelligent assistants can be integrated directly and transparently at any time. They are also potentially available to all applications in the same form across modules via modular platforms.
- Train models using local knowledge bases: LLMs are usually trained with large amounts of data. By using LLMs locally, they can also be trained and optimized quickly, specifically and practically, by querying the company’s own database. This also makes them transparent and auditable at any time.
- Acceleration through indexing: In addition, access to the local knowledge base can be accelerated by indexing the databases. Queries are no longer made against the entire database but only against the indexes. This increases speed, availability and accuracy – and therefore productivity.
- Open source: Open source is the natural enemy of proprietary systems. In order to avoid vendor lock-in, not only should chronically non-transparent vendor-specific AI platforms (PaaS) be avoided for confidential computing, but open source should also be the first choice for AI applications at the software level (SaaS).
“Confidential AI gives companies and users back the sovereignty over their own data and applications,”
emphasizes Andrea Wörrlein, Managing Director of VNC in Berlin and Member of the Board of VNC AG in Zug.
“Artificial intelligence can thus be used in a secure, targeted, independent and practical way to increase productivity and job satisfaction.”
Dear reader,
Opinions expressed in the op-ed section are solely those of the individual author and do not represent the official stance of our newspaper. We believe in providing a platform for a wide range of voices and perspectives, even those that may challenge or differ from our own. We remain committed to providing our readers with high-quality, fair, and balanced journalism. Thank you for your continued support.
Comments
2 responses to “The 5 Essential Components of Confidential AI”
-
Confidential AI, eh? Sounds like the perfect blend of “trust us, it’s safe” and “but we can’t tell you how” – just like a good European coffee, strong enough to keep you up at night pondering your data privacy! ☕️😏
-
Oh joy, just what we needed – another buzzword salad about AI that’s supposedly “confidential.” Because nothing screams security like putting your data in a fancy box and hoping for the best! 😂
Last News

PS Party MEPs Call on R. Fico to Cancel Moscow Visit
In an open letter, six Members of the European Parliament (MEPs) from the opposition group Progressive Slovakia (PS) have called on Prime Minister Robert Fico (Smer-SD) to withdraw from attending the celebrations marking the 80th anniversary of the end of World War II in Moscow. They referenced a statement from the E

IRF Roundtable Applauds Congressman Mark Walker’s Appointment as Ambassador-at-Large for International Religious Freedom
The IRF Roundtable, a diverse and non-partisan coalition of advocates committed to defending

Expert Calls for Overhaul of UK Defence Strategy
The United Kingdom’s global defence role must be fundamentally rethought, according to a leading UK-based defence expert.
“The UK no longer possesses the financial resources or the political and diplomatic influence it once wielded,”
said Professor Paul Cornish in response to the country’s recently announced Strategic Defence Review (SDR).
Prof. Cornish is a defence and strategy specialist at

Coupes dans l’aide au développement, droits de douane… les alliés des États-Unis au Moyen-Orient confrontés au “pire scénario”
Title: Aid Cuts and Tariff Threats Leave U.S. Allies in the Middle East Facing a Worst-Case Scenario
As the United States and Europe weigh reductions in foreign aid and increased trade barriers, their all

Trump Confident of Reaching an Agreement with the EU
However, Meloni, who leads the ultraconservative coalition in

Decisions on Monetary Policy
17 April 2025
The European Central Bank (ECB) Governing Council has announced a reduction of 25 basis points across its three key interest rates, aiming to support price stability and economic resilience. This decision follows a comprehensive assessment of inflation trends, underlying price pressures, and the efficiency of mone

Defence Takes Center Stage for EU and MEPs
Members of the European Parliament are set to vote next week on the report for the European Defence Industry Programme (EDIP).
The EDIP aims to strengthen the integration of the European defence industry and serve as a foundational pillar for building a common European defence capability.
With the war in Ukraine still raging and concerns over the future scale of U.S. support for Europe’s securit

France Urges Ukraine Ceasefire to Reflect Reality Following U.S. Talks
Although he did not name the regions explicitly, the areas in question are likely Crimea — which Russia illegally annexed in 2014 — along with Donetsk, Luhansk, Kherson, and Zapori

“EU Integration: A Major Responsibility – Insights from EU Enlargement Commissioner Marta Kos”
EU Enlargement Commissioner Marta Kos addressed reporters from various member agencies of the European Newsroom (ENR) about significant milestones and challenges facing countries seeking to join the European Union, particularly in the context of escalating geopolitical tensions.
The Commissio

Increase in Attacks on Civilians in South Sudan
A new report by the United Nations Mission in South Sudan (UNMISS) reveals a disturbing surge in violence against civilians last year, including a sharp rise in conflict-related sexual violence (CRSV). The findings are based on firsthand accounts from victims and witnesses, as well as insights gathered during field missions and fr
Leave a Reply