Cybersecurity

Built for the trust gap between organisations

Firewalls, IAM, and SIEM protect what is inside the perimeter. Nothing protects trust at the boundary where organisations, AI agents, and IoT devices interact. As 45 billion+ non-human identities operate across organisational boundaries, verifiable cross-boundary trust infrastructure is no longer optional -- it is the missing layer in every security stack.

Discuss cross-boundary trust infrastructure

IT security stacks are built for perimeters, not boundaries. The EU AI Act, Cyber Resilience Act, and NIS2 supply chain requirements all converge on a single gap: trust between organisations. When AI agents negotiate across domains, when connected products carry security attestations through supply chains, and when CISOs must verify 160,000+ supplier relationships -- the answer is not another perimeter tool. It is verifiable trust infrastructure at every organisational boundary, proven today across 800,000+ verified messages per month in Swiss critical infrastructure.

Regulatory drivers

EU AI Act

When AI agents act across organisational boundaries, no existing regulatory framework verifies their identity or maintains accountability. High-risk AI rules effective August 2026 require provenance and traceability that current security stacks cannot provide at the inter-organisational layer.

45 billion+ non-human identities by end of 2025

Cyber Resilience Act

All products with digital elements must carry verifiable security attestation throughout their lifecycle. Supply chain integrity across organisational boundaries requires cryptographic proof that current IT security infrastructure does not provide.

Reporting obligations from September 2026

NIS2 Supply Chain Security

Article 21(2)(d) mandates supply chain security measures for direct suppliers. CISOs must verify trust across their entire supplier ecosystem -- not just within their own perimeter.

160,000+ entities must verify supply chain trust

Solution overview

Verifiable trust infrastructure for cybersecurity means every interaction crossing an organisational boundary -- messages, API calls, agent negotiations, device attestations -- carries cryptographic proof of origin, integrity, and authorisation. This is not another perimeter security product. It is the cross-boundary trust layer that sits between organisations, making inter-organisational trust verifiable by design. Communication is one use case. The primary capability is trust at every boundary where organisations meet.

See how it works →

OSSTMM measures operational security quantitatively as security controls, visibility, trust, and exposures. But all other testing frameworks stop at the organizational perimeter. Cross-boundary trust between organizations is a gap that no penetration test can measure. Trust itself is something no other framework can measure. However, DKMS makes that trust verifiable and testable for the first time security teams can actually validate trust between organizations.

Pete Herzog Pete Herzog Founder, ISECOM | Creator of OSSTMM

Post-Quantum Ready by Design

Quantum computing does not need to arrive to pose a threat. Data harvested today under encrypted channels will be decryptable once quantum capability matures. KERI -- the cryptographic foundation of Vereign's trust infrastructure -- is architecturally ready for the post-quantum transition, not because it already uses post-quantum algorithms, but because its design makes the transition seamless.

Harvest Now, Decrypt Later

Adversaries are harvesting encrypted data today for future quantum decryption. NSA, CISA, and NIST jointly warn that high-retention data -- healthcare records, financial transactions, legal documents -- faces exposure windows measured in decades. The threat is not future. The data collection is happening now.

NIST Standards Finalised

FIPS 203, 204, and 205 were finalised in August 2024, establishing ML-KEM, ML-DSA, and SLH-DSA as post-quantum cryptographic standards. The migration window is now open. Organisations that wait for quantum computers to arrive will be years behind those that prepare their cryptographic infrastructure today.

KERI Crypto-Agility

KERI's pre-rotation mechanism and algorithm independence mean keys can be rotated to post-quantum algorithms without breaking the trust chain. Unlike PKI/CA-based systems locked to specific cryptographic assumptions, KERI enables incremental migration -- each organisation upgrades at its own pace without infrastructure overhaul.

Proven at scale

Healthcare IS critical infrastructure. The same architecture that secures 800,000+ verified messages across 850+ gateways serving 30,000+ institutions applies to every sector where organisations must communicate with verified trust. The gateway mesh, the decentralised key management, and the compliance attestation layer are sector-agnostic -- the trust properties are identical whether verifying healthcare records or cross-boundary security attestations.

HIN — Health Info Net

800,000+

verified messages per month

850+

gateways across Swiss healthcare

30,000+

GP offices and healthcare institutions

See the full HIN case study

This is production-grade infrastructure operating at national scale in Swiss critical infrastructure. The architectural properties that CISOs require -- no single point of failure, no central trust authority, cryptographic verification at every boundary -- are proven, not theoretical.

Reference architecture

Security Operations Enterprise A SOC / SIEM MSSP MDR / XDR Cloud Provider IAM / CSPM Crypto-Agility Verified Trust Infrastructure Gateway Mesh 850+ gateways Verify Provenance Compliance Cross-boundary verification Agent identity attestation Supply chain trust 800,000+ verified messages / month DKMS / Decentralised Key Management Trust Boundaries Enterprise B SOC / SIEM Regulatory Body NIS2 / CRA Supply Chain Partner SBoM / Attestation Vereign AG -- Cybersecurity Trust Infrastructure Reference Architecture

Click to expand diagram

Security Operations Enterprise A SOC / SIEM MSSP MDR / XDR Cloud Provider IAM / CSPM Crypto-Agility Verified Trust Infrastructure Gateway Mesh 850+ gateways Verify Provenance Compliance Cross-boundary verification Agent identity attestation Supply chain trust 800,000+ verified messages / month DKMS / Decentralised Key Management Trust Boundaries Enterprise B SOC / SIEM Regulatory Body NIS2 / CRA Supply Chain Partner SBoM / Attestation Vereign AG -- Cybersecurity Trust Infrastructure Reference Architecture

How to engage

Work with Vereign directly

For organisations that want to scope and deploy trust infrastructure with Vereign's engineering and advisory team. Ideal for first movers and organisations with in-house technical capacity.

Explore services →

Work through a partner

For organisations that prefer to work with a consultancy already trained on Vereign's trust infrastructure. Partners provide sector expertise alongside deployment capability.

See the partner programme →

Close the cross-boundary trust gap in your security stack

Whether you are a CISO evaluating trust infrastructure or a security consultancy building a new practice area, we can scope how cross-boundary trust infrastructure integrates with your existing stack.

Swiss Data Protection GDPR Compliant Open Source AGPLv3+ Swiss Hosting