CrowdStrike & Schwarz Digits to Offer Sovereign AI-Native Security on STACKIT Cloud

CrowdStrike Partners with Schwarz Digits for Sovereign AI-Native Security Platform in Europe

INFORMATIONAL
March 5, 2026
3m read
Cloud SecurityPolicy and ComplianceOther

Related Entities

Organizations

Products & Tech

STACKIT

Other

Schwarz DigitsSchwarz GroupLidlKaufland

Full Report

Executive Summary

On March 5, 2026, cybersecurity leader CrowdStrike and Schwarz Digits, the IT and digital arm of the Schwarz Group (parent company of Lidl and Kaufland), announced a strategic partnership. This collaboration will bring CrowdStrike's AI-native Falcon platform to STACKIT, the sovereign cloud infrastructure developed and operated by Schwarz Digits. The joint offering is designed to meet the increasing demand from European organizations, particularly in the public sector and regulated industries, for powerful cybersecurity solutions that comply with strict data sovereignty regulations like GDPR and ensure sensitive data remains within Europe.

Regulatory Details

The partnership directly addresses the growing market for sovereign cloud solutions in Europe. Driven by regulations such as the General Data Protection Regulation (GDPR) and initiatives like GAIA-X, many European organizations are mandated to ensure their data is stored and processed within the European Union's legal and geographical boundaries, protected from access by foreign governments. By hosting the Falcon platform within STACKIT's German-based data centers, the offering provides customers with a security solution that is inherently compliant with these data residency and sovereignty requirements. This allows organizations to leverage CrowdStrike's advanced threat detection capabilities without compromising their data governance and compliance posture.

Affected Organizations

This offering is primarily targeted at:

  • European public sector and government agencies.
  • Organizations in highly regulated industries such as finance, healthcare, and energy.
  • Any existing or potential customers of CrowdStrike or STACKIT in Europe with stringent data sovereignty needs.
  • The Schwarz Group's own massive retail operations, including Lidl and Kaufland, which will leverage the platform to secure their own digital transformation.

Compliance Requirements

For organizations adopting this solution, the key compliance benefit is the assurance of data sovereignty. The platform ensures that all security telemetry, analysis, and incident data collected by the CrowdStrike Falcon platform remains within STACKIT's EU-based cloud. This helps customers meet their obligations under GDPR and other national data protection laws. It simplifies compliance audits and provides legal certainty that data is not subject to foreign legal frameworks that may conflict with EU privacy standards.

Impact Assessment

This partnership has several significant market impacts:

  • For Customers: It provides a much-needed solution for organizations that want best-of-breed cybersecurity (like CrowdStrike's EDR and threat intelligence) but are constrained by data sovereignty rules. It removes a major barrier to adoption for public sector and critical infrastructure entities.
  • For CrowdStrike: It expands the company's addressable market in Europe and gives it a strong competitive advantage in the sovereign cloud space.
  • For Schwarz Digits: It enhances the value proposition of the STACKIT cloud by integrating a leading security platform, making it a more attractive choice for security-conscious customers.
  • For the Market: It signals a broader trend of major US technology providers adapting their offerings to meet regional data sovereignty demands, potentially leading to similar partnerships from other vendors.

Compliance Guidance

European organizations evaluating their cloud and security strategy should consider the following:

  1. Assess Data Sovereignty Needs: Determine which datasets within your organization are subject to strict data residency requirements.
  2. Evaluate Sovereign Offerings: When selecting cloud and SaaS providers, explicitly ask about their sovereign cloud options and where data is stored and processed.
  3. Vendor Due Diligence: For a solution like this, verify the contractual and technical safeguards that ensure data remains within the specified jurisdiction.
  4. Integrate with Overall Strategy: A sovereign security platform should be part of a holistic security strategy that also includes strong identity management, network security, and user training, all tailored to the relevant regulatory landscape.

Timeline of Events

1
March 5, 2026
This article was published

MITRE ATT&CK Mitigations

Utilizing a sovereign cloud is a form of logical and legal segmentation, isolating data within a specific jurisdiction.

Mapped D3FEND Techniques:

Sovereign clouds provide assurance over the physical and logical location of data, which is a control that complements encryption.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The partnership between CrowdStrike and Schwarz Digits to create a sovereign security platform is a strategic implementation of isolation at a macro level. For European organizations, this provides a form of jurisdictional isolation, ensuring that their sensitive security telemetry and data are processed and stored exclusively within the EU, on the STACKIT cloud. This directly addresses data sovereignty requirements under GDPR. By adopting this solution, companies are effectively isolating their security data from non-EU legal frameworks and potential foreign government access. This is a critical control for public sector, CNI, and other regulated entities that cannot have their data leave the EU. It's a proactive measure to harden their compliance posture and reduce legal and regulatory risk associated with cross-border data flows.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

sovereign clouddata residencypartnershipEuropeGDPRAI

📢 Share This Article

Help others stay informed about cybersecurity threats