Skip to main content

No Vendor Lock-in – Our Principle

We believe customers should stay because they want to – not because they have to.

Lock-in is not part of our business model.
At the same time, we acknowledge that not every technical setup can be fully vendor-neutral.
That’s why we openly document how we approach the issue – today and going forward.

What we mean by “Vendor Lock-in”

Vendor lock-in occurs when switching providers is difficult, costly, or technically unfeasible – for example, when:

  • proprietary tools are used without access or documentation
  • core components can’t be handed over
  • setups or processes are tightly tailored to one provider

For a detailed definition, see our Glossary entry on “Vendor Lock-in”.

Our Approach: Open, Transparent, Responsible

Infrastructure as a Service – not a Trap

When we provide infrastructure for clients, it always happens in a dedicated context – technically and organizationally isolated, documented, and transferable at any time.

This means:

  • No shared environments between customer systems
  • Full handover possible at the end of a project
  • Access to configurations, data, and operational parameters

Shared Platform Services (If It Makes Sense)

Some services – like monitoring, metrics, or databases – can be operated as multi-tenant platforms.

We ensure:

  • strict separation of data and access rights
  • export options for future migrations
  • transparent communication if a service is not exclusively operated

Shared infrastructure is never introduced without mutual agreement.

Our Own Platform – But Never a One-Way Street

Our infrastructure is provisioned via an internally developed platform – built for consistency, security, and speed.

That means:

  • Our tools are not public, but their behaviour is documented
  • They are based on open standards like Kubernetes, Helm, and Git
  • You can migrate without using our platform

We use our own tools – but we never lock you out.

Our IaC Framework – Designed Against Lock-in

Our Infrastructure-as-Code framework is explicitly built to reduce technical dependency on any particular cloud or infrastructure provider.

  • We can migrate infrastructure across bare metal, VMs, and cloud platforms
  • Configurations are modular, portable, and automatable
  • Backups (e.g. with Velero) allow for cluster recovery in minutes
  • The current system state is documented and can be reproduced elsewhere

Our goal: full control – no matter the hosting model.

Exit Strategies & Handover Processes

We actively support our customers during exit or handover phases:

  • transfer of access rights, configurations, secrets, and operational data
  • support with exports, snapshots, and replication
  • documented processes – transparent and contractually defined

To us, responsibility means: making it easy to leave, too.

Our Core Principle

We build infrastructure that works without us.
If it works even better with us: all the better.

Technical Notes for Infrastructure Leads

  • Provisioning is primarily handled via our internal tool chain.
  • All deployments are versioned and tracked in Git.
  • Secrets and configurations are encrypted and portable.
  • Logs, monitoring, container registries, and CI/CD artifacts can be run in dedicated or multi-tenant mode.
  • The system state is always exportable and reproducible.

Got questions about a specific setup?
Get in touch