EQS-News
Cloud security for SMEs: q.beyond obtains C5 attestation in accordance with BSI criteria
- q.beyond AG achieves C5 attestation from BSI for cloud.
- Ensures secure, sovereign cloud services for SMEs in Germany.
- Focus on IT sovereignty, cybersecurity, and AI solutions.
|
EQS-News: q.beyond AG / Key word(s): Miscellaneous Cloud security for SMEs: q.beyond obtains C5 attestation in accordance with BSI criteria |
- Verification covers security, data protection, availability, and compliance
- Companies receive secure and sovereign cloud services from Germany
- C5 creates transparency for selecting secure cloud providers
Cologne, 6 November 2025 – q.beyond AG has obtained C5:2020 attestation from the German Federal Office for Information Security (BSI). This provides medium-sized companies with confirmation that q.beyond’s cloud services meet the BSI’s strict standards in terms of security, data protection, availability, and compliance.
The IT service provider offers sovereign and secure IT services to its customers, including services offered on the basis of its private cloud from its own high-security data centres in Germany.
Basis for IT sovereignty
“q.beyond is the right address for medium-size companies that would like to determine their IT services themselves and stay independent of the large providers”, explains Nora Wolters, CFO of q.beyond AG. “Above all, the C5 attestation issued by the BSI confirms that q.beyond’s cloud services are operated exclusively in Germany. And that is a fundamental building block which our customers need as they head for IT sovereignty.”
From cloud to cybersecurity through to AI: To enable companies to flexibly structure their IT landscapes with a view to their own IT sovereignty, q.beyond has in recent times significantly expanded and further developed numerous IT services. In the summer of this year, for example, the IT service provider opened a second Cyber Defence Center (CDC). As Security Operations Centers (SOC), both sites pool q.beyond’s security activities and form a core component of a self-determined IT security strategy for q.beyond’s security customers.

