Infrastructure & Security

Medical-Grade Hosting for Sensitive Data

We operate your infrastructure according to the strictest security standards. Our focus lies on three pillars: Maximum technical security (Cybersecurity), absolute protection against loss (Backups), and full legal certainty (GDPR compliance).

Secure Hosting Server RoomSecure Hosting Server Room
Secure hosting according to your requirements

Data Sovereignty and Standardized Interfaces

For us, data sovereignty means that you retain full control. We rely on open standards instead of black boxes and vendor lock-in. You can switch to another provider at any time.

Security must not hinder innovation. We tailor the level of protection precisely to your project – from flexible research environments to high-security infrastructure that meets medical standards. Thanks to open standards, you remain technically independent and your data is portable at all times.

Our Hosting Services

Comprehensive service packages for your IT.

Legal Certainty & Compliance

We guarantee the legally compliant operation of your applications. Our standard is ISO 27001-certified high-security data centers within Germany and the EU.

We contractually guarantee that your data will not leak and will not be used for third-party AI training.

  • Location Germany, EU or worldwide
  • Worldwide availability on request
  • Full GDPR compliance

Flexible Hosting Options

We advise you on which architecture is best suited for your security needs – whether on our own servers or with major providers such as AWS, Azure, and Google.

But not everything belongs in the cloud: We also install solutions directly on your local servers – secure and offline-capable.

  • Cloud, Hybrid, or On-Premise
  • Management of AWS, Azure & Co.
  • Specialists for offline scenarios & local AI

Security & Backups

We protect your data twice over: Against external attacks through system hardening and against data loss through redundant backups.

  • Patch Management
  • 24/7 Monitoring
  • Daily Backups & Disaster Recovery

Support & Training

We do not leave you on your own. We resolve technical issues deep within the system and simultaneously train your staff in using the application.

  • Engineers instead of Call Centers
  • Deep-Level Troubleshooting
  • User Training & Assistance
Our Technology Philosophy

We consistently rely on Open Source. This means for you: No license fees for third-party providers, security through transparency, and absolute independence.

Open Source

We use globally recognized standards and open interfaces. Maximum transparency creates maximum security.

No Vendor Lock-in

You remain independent. Your data and applications are portable at any time – to us, to you, or to the cloud.

Cost Efficiency

Save yourself expensive license fees for proprietary third-party software. You pay only for services and support, not for usage rights.

Enterprise Support

We offer professional service and further development for your open-source solutions. Secure and reliable.

Your Path to the Secure Cloud

Three steps to modern infrastructure—without operational disruption.

01

Audit & Concept

We analyze your existing workloads and security requirements. You receive a transparent architectural concept and a detailed migration plan.

02

Seamless Migration

We build the new environment in parallel. Your data is synchronized while your old system continues to run. No "hard cut," no risk.

03

Go-Live & Operations

After successful tests, we switch over. From now on, our 24/7 monitoring and automated backups are active. Your IT is secure.

Frequently Asked Questions

Our standard is hosting in Germany. We use high-security data centers certified according to ISO 27001. Access controls, emergency power supply, and fire protection meet the highest industry standards. There is no data transfer to insecure third countries.
However, upon request, we also implement worldwide locations or host your application on local servers (on-premise) directly at your site.

We plan migrations so that they remain virtually invisible to your ongoing operations. We build the new infrastructure in parallel and synchronize the data in the background. The actual switchover takes place seamlessly or during a planned maintenance window, so your team can simply continue working the next morning.

We rely on a "3-2-1 strategy". We create daily (hourly on request) backups that are encrypted. Crucial is the geo-redundancy: Backup copies are stored at a physically separate second location to remain operational even in the event of a disaster.

Yes. Many of our clients prefer local data storage ("On-Premise"). We configure your servers on-site, harden the operating system (Linux), and handle ongoing maintenance, updates, and monitoring securely via remote access (VPN).

Only authorized administrators of Dornheim Medical Images GmbH have access to your data within the scope of maintenance. We conclude a Data Processing Agreement (DPA) with you in accordance with GDPR. We contractually guarantee that we will never pass on your data to third parties or use it for training our own AI models, unless explicitly agreed otherwise.

We do not believe in artificial barriers ("vendor lock-in"). Should you wish to leave us, we will support you in the clean migration of your data to the new service provider.

This is part of our Managed Service. We monitor security advisories for all components (operating system, databases, web servers) and proactively install security patches, often even before vulnerabilities become widely known. You don't have to worry about the technology.
Was your question not listed?

Every IT landscape is different. Let us clarify how we can meet your specific requirements.

Ask our technical experts

Are your data and applications secure and portable?

Don't risk data leaks, vendor lock-ins or outages. Let us harden your infrastructure, make it flexible and provide professional support.

Discuss Infrastructure

+49 391 505457-0