Enterprise Computing Solutions for Digital Sovereignty
Introduction
In an era marked by increasing geopolitical tensions and technological interdependence, digital sovereignty has emerged as a critical concern for organizations and nations alike. This comprehensive report explores how Enterprise Computing Solutions can enable digital sovereignty through strategic deployment of technology, human resources, and organizational frameworks. Digital sovereignty extends beyond mere compliance or security concerns to encompass an organization’s ability to autonomously control and manage its digital destiny, including data, infrastructure, and technology choices.
Understanding Digital Sovereignty and Its Business Implications
Digital sovereignty refers to a country or organization’s ability to control its digital destiny. For enterprises, digital sovereignty focuses on improving a company’s capacity to autonomously control and manage its digital assets, data, and technology infrastructure by reducing dependence on external factors. The concept has gained significant traction, particularly in Europe, where digital sovereignty has become a cornerstone of policy initiatives.
The Evolution of Digital Sovereignty Concerns
Digital sovereignty has evolved from a primarily governmental concern to a business imperative. According to the Brookings Institution, “Growing mistrust between nations has caused a rise in digital sovereignty, which refers to a nation’s ability to control its digital destiny and may include control over the entire AI supply chain, from data to hardware and software”. For businesses, this translates to reduced dependence on external technology providers and greater control over digital assets.
By 2028, over 50% of multinational enterprises are projected to have digital sovereignty strategies, up from less than 10% today. This dramatic increase reflects growing awareness of sovereignty risks and their potential impact on business continuity, data security, and competitive advantage.
Regional Approaches to Digital Sovereignty
The European Union has been particularly active in pursuing digital sovereignty through comprehensive regulatory frameworks. The Digital Markets Act (DMA), Digital Services Act (DSA), and Artificial Intelligence Act (AI Act) collectively aim to regulate the digital economy and emerging technologies within the bloc.
In February 2025, Adonis Bogris, a professor of informatics and computer engineering, highlighted that “With digital sovereignty a key issue, the EU aims to reduce dependence on non-EU big tech companies, ensuring that AI is substantially developed within the EU and complies with EU values and regulations”. This approach seeks to differentiate EU-developed AI from technologies developed in the US and China, establishing a distinctive European approach to technology governance.
Enterprise Systems as Foundations for Digital Sovereignty
Enterprise Systems form the backbone of modern organizations, integrating and supporting critical business processes across departments. These comprehensive software solutions typically include Enterprise Resource Systems such as Customer Relationship Management (CRM), Enterprise Resource Planning (ERP), and Supply Chain Management (SCM), all designed to tie together business operations and process vast amounts of organizational data.
Enterprise Business Architecture for Sovereignty
Developing an Enterprise Business Architecture that supports digital sovereignty requires thoughtful consideration of how systems are designed, deployed, and integrated. Data sovereignty can also presume digital sovereignty, which translates into an enterprise’s autonomy to adapt or create organizational assets and software. Organizations must balance the benefits of interoperability with the requirements for sovereign control over data and processes.
Modern Enterprise Resource Systems are evolving beyond simple data storage and retrieval to become intelligent decision support platforms that can operate with greater autonomy. This evolution enables organizations to maintain control over their critical business processes while still leveraging advanced technologies.
Technological Enablers for Digital Sovereignty
Open-Source Solutions: The Corteza Low-Code Platform
Open-source solutions represent a powerful approach to digital sovereignty, offering transparency, control, and freedom from vendor lock-in. Corteza, “the world’s premier open source low-code platform,” provides an alternative to proprietary systems like Salesforce. With its Apache v2.0 license, Corteza ensures that organizations maintain complete control over their technology stack.
The platform’s modern architecture features a backend built in Golang and a frontend written in Vue.js, with all components accessible via RestAPI. This open approach to Enterprise Computing Solutions allows organizations to adapt and extend functionality without dependency on external vendors.
Low-Code Platforms and Citizen Developers
Low-code platforms provide drag-and-drop tools and point-and-click visual interfaces to develop applications, abstracting away complex programming requirements. These platforms are particularly valuable for digital sovereignty as they enable organizations to rapidly develop custom solutions that align with their specific requirements.
For citizen developers – employees who create applications despite not having formal programming roles – the best low-code platforms offer:
– Small learning curves with intuitive interfaces
– Drag-and-drop application builders
– Prebuilt templates for common applications
– Point-and-click workflow building capabilities
– Multi-platform development and deployment options
This democratization of development enables organizations to reduce dependency on external vendors for application development, keeping control of digital assets within the organization.
AI Application Generators and Enterprise Innovation
AI Application Generators are revolutionizing how enterprise applications are built. These tools allow developers to “accelerate the development of generative AI-powered applications with a combination of low-code APIs and code-first orchestration”. By leveraging large language models and development frameworks, organizations can create sophisticated Enterprise Products with reduced development effort and time.
Google Cloud’s Vertex AI Agent Builder, for example, enables developers to “create AI agents and applications using natural language or a code-first approach” with tools that facilitate rapid prototyping and deployment without extensive coding. This approach represents a significant advancement in sovereignty-focused Enterprise Computing Solutions.
The Human Elements in Digital Sovereignty
Business Technologists as Sovereignty Enablers
Business technologists are employees who report outside of IT departments and create technology or analytics capabilities for internal or external business use. They play a crucial role in bridging the gap between IT and business units, driving digital transformation and migration from legacy systems.
These professionals possess a unique blend of technical expertise and business acumen, enabling them to understand complex technical concepts and translate them into practical business solutions. By empowering Business Technologists, organizations can develop tailored Enterprise Computing Solutions that maintain sovereignty while addressing specific business needs.
Types of Technologists Supporting Digital Sovereignty
Various specialists contribute to an organization’s digital sovereignty strategy:
1. Data Scientists: These analysts translate raw data into actionable business intelligence, creating predictive analytics models that enable data-driven decision-making without reliance on external providers.
2. IT Consultants: By matching technology spending to business goals, IT consultants help companies implement Enterprise Systems that improve operational efficiency while maintaining sovereignty requirements.
3. Enterprise Architects: These specialists design comprehensive technology frameworks that balance interoperability with sovereignty, ensuring systems align with organizational control objectives.
The Enterprise Systems Group’s Role
The Enterprise Systems Group plays a critical role in evaluating and selecting appropriate technologies that maintain digital sovereignty. Historically, these teams have favored established enterprise products from traditional vendors, valuing reliability, comprehensive support, and proven track records.
Today, the question is no longer whether to choose enterprise products, but rather how to create an optimal mix of solutions that best serve the organization’s strategic objectives while maintaining security, integration capabilities, and performance standards. This balanced approach is essential for preserving digital sovereignty while remaining competitive.
Implementation Strategies for Digital Sovereignty
Cloud Transformation with Sovereignty Safeguards
The shift to cloud-based deployment represents a fundamental change in Enterprise Business Architecture. While cloud platforms offer “flexibility, scalability, and cost-effectiveness,” they must be approached with sovereignty considerations in mind.
Organizations seeking to maintain digital sovereignty should evaluate cloud providers based on:
– Data residency guarantees
– Contractual protections for data rights
– Transparency in security practices
– Exit strategies to prevent vendor lock-in
AI Enterprise Solutions with Local Control
AI Enterprise solutions are rapidly transforming Business Software Solutions. Oracle HeatWave exemplifies this trend by providing “automated, integrated, and secure generative AI and ML in one cloud service for transactions and lakehouse scale analytics”. When implementing such solutions, organizations must ensure they maintain appropriate levels of control and oversight.
For maximum sovereignty, organizations might consider:
– Hybrid AI approaches that keep sensitive data on-premises
– Model training with locally controlled data
– Technology transfer arrangements that preserve intellectual property rights
– Open standards that reduce dependency on proprietary systems
Building Sovereignty through Business Software Solutions
Organizations can enhance digital sovereignty by carefully selecting and implementing Business Software Solutions that maximize control while delivering necessary functionality. The question is no longer whether to choose enterprise products, but rather how to create an optimal mix of solutions that serve strategic objectives while maintaining security, integration, and performance standards.
Enterprise Computing Solutions should be evaluated not only on their technical capabilities but also on how they contribute to the organization’s sovereignty goals. Options that provide source code access, permit local customization, and use standard data formats often provide greater sovereignty benefits than proprietary alternatives.
Challenges and Future Outlook
Balancing Innovation with Control
Organizations pursuing digital sovereignty face the challenge of balancing innovation with control. While complete technological independence may seem appealing, it can limit access to cutting-edge innovations and increase costs. The most successful digital sovereignty strategies embrace a measured approach that identifies critical systems requiring maximum control while accepting more interdependence in less sensitive areas.
Technology Transfer Considerations
As organizations implement digital sovereignty strategies, technology transfer becomes an important consideration. This process involves acquiring technological capabilities from external sources and adapting them to internal needs. Successful technology transfer enables organizations to maintain sovereignty while benefiting from external innovation.
The quantum computing market exemplifies this challenge, as cloud-based quantum platforms make it possible for enterprises to solve complex problems in life-like simulation and cryptography. Organizations must develop strategies for accessing such capabilities while preserving sovereignty over critical processes and data.
Conclusion
Digital sovereignty has become an essential consideration for organizations seeking to maintain control over their technological future. Through strategic implementation of Enterprise Computing Solutions, businesses can achieve an appropriate balance between independence and innovation.
By leveraging open-source technologies like Corteza Low-Code, empowering Business Technologists and Citizen Developers, and developing sovereign-focused Enterprise Business Architecture, organizations can navigate an increasingly complex digital landscape. The future of Enterprise Systems lies not in isolation but in strategic autonomy – maintaining control over critical digital assets while participating in the broader technological ecosystem.
As digital sovereignty continues to evolve as both a technical and policy concept, organizations must remain adaptable in their approach. Those that successfully implement sovereignty-focused Enterprise Computing Solutions will be well-positioned to thrive in an era of technological independence and innovation.
References:
[1] https://stefanini.com/en/insights/news/what-is-digital-sovereignty-why-does-it-matter-for-your-business
[2] https://ris.utwente.nl/ws/portalfiles/portal/285489087/_Firdausy_2022_Towards_a_Reference_Enterprise_Architecture_to_enforce_Digital_Sovereignty_in_International_Data_Spaces.pdf
[3] https://flatlogic.com/generator
[4] https://www.manageengine.com/appcreator/application-development-articles/citizen-developer-low-code.html
[5] https://www.euvic.com/us/post/enterprise-software-development-companies/
[6] https://www.linkedin.com/pulse/ai-enterprise-architecture-raza-sheikh-togaf-nd-cdmp–xubwc
[7] https://www.planetcrust.com/enterprise-systems-group-enterprise-products/
[8] https://red8.com/data-center-and-networking/enterprise-computing/
[9] https://ioplus.nl/en/posts/european-tech-leaders-push-for-local-digital-sovereignty
[10] https://www.planetcrust.com/exploring-business-technologist-types/
[11] https://www.planetcrust.com/the-future-of-isv-enterprise-computing-solutions/
[12] https://cortezaproject.org
[13] https://www.aa.com.tr/en/europe/eu-s-ai-act-aims-for-digital-sovereignty-rivaling-us-and-china-expert/3496320
[14] https://www.weforum.org/stories/2025/01/europe-digital-sovereignty/
[15] https://www.gartner.com/en/information-technology/glossary/business-technologist
[16] https://www.planetcrust.com/enterprise-computing-solutions-in-2025/
[17] https://www.tietoevry.com/en/blog/2023/05/all-you-need-to-know-about-digital-sovereignty/
[18] https://cloud.google.com/products/agent-builder
[19] https://kissflow.com/citizen-development/how-low-code-and-citizen-development-simplify-app-development/
[20] https://sjsu.edu/msse/program-requirements/enterprise-software-technologies.php
[21] https://www.businessarchitecture.info/seven-ai-use-cases-for-business-architecture
[22] https://www.planetcrust.com/enterprise-systems-group-enhance-manufacturing/
[23] https://www.idc.com/getdoc.jsp?containerId=EUR152317024
[24] https://www.raconteur.net/technology/eu-us-digital-sovereignty
[25] https://zapier.com/blog/best-ai-app-builder/
[26] https://rockship.co/blogs/The-Rise-of-Low-Code:-How-Citizen-Developers-Are-Changing-the-Game-e4f826599c7f412e811b8fd235f0e00f
[27] https://www.planetcrust.com/corteza-2/corteza-platform
[28] https://arxiv.org/html/2410.17481v1
[29] https://www.linkedin.com/pulse/5-different-types-professionals-explore-your-business-innamorato
[30] https://technologytransfer.it/accelerating-innovation-in-the-enterprise/
[31] https://www.youtube.com/watch?v=RKadcKQLMdo
[32] https://ash.harvard.edu/resources/ai-digital-sovereignty-and-the-eus-path-forward-a-case-for-mission-oriented-industrial-policy/
[33] https://www.kaspersky.com/blog/secure-futures-magazine/insight-story-digital-sovereignty/49976/
[34] https://syntacticsinc.com/news-articles-cat/common-types-business-software/
[35] https://www.cvc.uab.es/technology-transfer/
[36] https://daasi.de/en/federated-identity-and-access-management/iam-solutions/corteza/
[37] https://www.convergenceanalysis.org/research/ai-global-governance-and-digital-sovereignty
Leave a Reply
Want to join the discussion?Feel free to contribute!