Our federated architecture ensures all data remain decentralised in its own isolated Bunker and never has to be moved, shared or centralised.
A federated architecture is a database approach that enables data sources to remain decentralised across multiple locations but allows them to be connected and analysed as though combined. The alternative is a centralised database that requires all data to be pooled in a single repository, which creates significant privacy and security risks for the data owner. By removing the need to share data, our technology overcomes the most common trust, privacy and security barriers to unlock a new wave of collaboration.
To ensure there is no impact on the original data, a ‘mirror’ of the data is created and uploaded into a Bunker. This version of the data goes through a normalisation and mapping process that renders it pseudonymous. Following upload, the data never leaves the Bunker.
A Bunker is an isolated instance on either AWS, Google Cloud Platform or Azure containing a single dataset. Each Bunker is created independently when a new dataset is added to the Platform. Only the creator of a Bunker can access it, not even InfoSum.
We don’t hold any data. We provide the identity infrastructure to power a decentralised ecosystem.
Federated technology keeps your data in its own unique Bunker, that only you can access.
You remain in control of who can analyse your data. This never grants access to the raw data.
First-party data sets are matched using existing identifiers, removing the need to share data.
Our proprietary Insight Engine generates a virtual database that enables multiple data sources to be analysed without moving, centralising or sharing data.
Learn moreWe utilise differential privacy concepts during both analysis and activation to safeguard personal data and ensure no individual can ever be identified within our UDP.
Learn moreOur technology doesn’t rely on a single ID or identity graph. Instead it automatically determines the identifier, or combination of identifiers, within the dataset to create the optimal match.
Learn moreOur rich permissions management ensures data owners remain in control of who can use their data in their analysis, and to what extent it can be analysed.
Learn moreOur automated normalisation and mapping process ensures no changes are required to the original data to make it compatible across multiple data sources.
Learn moreOur identity infrastructure is built on a federated architecture that ensures all datasets remain decentralised in their own isolated Bunker, but can be analysed ‘as one’.
Learn moreInfoSum’s identity infrastructure has been built on six core technologies that empower trust by allowing data to remain decentralised, while enabling multiple first and second-party data sources to be connected for analysis and activation.