In The Arena by TechArena - SayTEC Powers Scalable, Secure, Sovereign IT Infrastructure
Episode Date: July 7, 2025SayTEC redefines IT with a zero trust, hyper-converged platform delivering sovereign cloud, seamless scalability, and military-grade security for critical industries....
Transcript
Discussion (0)
Welcome to the Tech Arena, featuring authentic discussions between tech's leading innovators
and our host, Alison Klein.
Now let's step into the arena.
Welcome to Tech Arena Data Insights.
I'm Alison Klein.
This is a Data Insights interview, which means I am joined by our co-host, Janice Narowski
of Soledad.
Welcome to the program, Janice.
How are you doing?
Thank you, Alison.
It's great to be back today.
How are you?
I'm awesome.
I think the summer is heating up with data and I am so excited for today's
interview. Why don't you tell us who's on the program and what we're going to be talking
about?
Yeah, thank you. I couldn't agree more. It's definitely heating up and we're going to heat
things up with an interview here with Saytech. And on the call today, we have Bora Guzzi,
who is the Senior IT Consultant for Saytech.
Bora, welcome to the show.
Do you want to just give a little bit more about your role and the work you do for Saytech?
Exactly.
I'm very delightful to join this event.
And also, my name is Bora Guzi, and I'm a part of the team at SciTech AG. At SciTech, I focus on developing and communicating
advanced IT solutions that help organizations
secure their infrastructure more intelligently.
Our work spans across secure remote access,
high-performance hyper-converting infrastructure,
and sovereign cloud services.
It's a very exciting space, especially as we see growing demands for unified, cost-efficient,
and regulation-compliant solutions.
Now, I think that when we talk about Cetech, you describe yourself as a pioneer in sovereign
IT infrastructure.
Can you tell us about Saytek's mission and how you're helping organizations navigate
today's rapidly changing security and performance challenges?
And it's a very good question.
Our mission and our approach at Saytek is to build sovereign and secure, scalable IT environments that adapt to today's constantly evolving trade landscape.
We focus on addressing real-world challenges that existing solutions often overlook, such as fragmented architectures, complex gaps, and growing cyber risks.
architectures, complex gaps, and growing cyber risks. Whether it's through secure remote access and high-evaluity storage or zero-trust frameworks,
we provide plug-and-use systems that simplify complexity, maximize uptime,
and deliver military-grade security without compromising performance or cost efficiency.
Now CETEC is known for that holistic approach to IT security.
How does this differ from traditional solutions that treat security, access, and storage separately?
Traditional IT models tend to address security, access, and storage as siloed components,
often relying on separate vendors.
This approach increases risk, cost, and administrative overhead.
At SciTech, we have redefined this by building a unified security-first infrastructure where access control, data protection, and
system performance are integrated from the ground up.
Our hyper-commerce platform includes built-in compliance with regulations like NAS2 and
CITES, especially in Germany and especially in Europe, And our zero trust based architecture
ensures that security is not add on.
It's embedded across every layer of the system
at the end of this journey.
You know, one of the things that I was really impressed with
in terms of reading about Satec's engagement in the market
is your holistic approach.
You combine infrastructure, access and storage into a unified system.
How does this all-in-one model contrast with more fragmented security and IT solutions
that we often see in market?
Sure.
The fragmented model can be costly and vulnerable, requiring integration across multiple vendors,
each with different update cycles and protocols and compliance standards.
And in contrast, Cytex, all in one platform,
delivers a fully integrated stack,
combining compute, storage, secure access, and so on in cloud.
The result is greater resilience, dramatically reduced risk,
and far lower total cost of ownership.
And organizations don't just get IT components,
they get a harmonized ecosystem that works out of the box
with full visibility and control over
data access and performance.
So I guess with all that, let's talk about your HCI platform, your hyper-converged infrastructure
platform.
SciTech solution isn't just about covering compute and storage.
It includes sovereign cloud services and secure remote access.
So how do all of these elements kind of work together
to ensure performance, scalability and compliance?
Our hyperconverged infrastructure, it's called ACI
and platform combines and compute,
S3 object storage, backup and secure remote access into a single and integrated
system.
This architecture and this design simplifies deployment, improves scalability, and ensures
regularity compliance from day one.
Thanks to our partnership also with SolidIME and Virtuoso, we can deliver S3 storage speeds of up to 150 GB per
second and seamless cable up to 200 petabytes. It's a very huge amount of data for the companies
and the clients also, all with zero downtime. Our SciTech VPSC technology, virtual private secure communication technology, which
underpins our secure access layer, enforces zero trust principles through token-based
authentication and layered encryption, providing both security and performance across on-prem
and cloud environments.
So you just said it, you said zero trust.
So how does Saytex platform emphasize
zero trust architecture and sovereign data handling?
How do you implement this across this concept technically
and how is it resonating with say government
and enterprise customers?
Sure, our zero trust goes beyond the basics.
For example, the government part.
And our VPSS solution also actively monitors the full communication path and blocking unauthorized
traffic before it even enters the tunnel.
The tunnel is the magic part for this also the product. And technically, we deploy pre-tunnel verification,
token-based access control, and layered encryption
include perfect forward secrecy.
It's called PFS.
And you can check, for example, defense in-depth technology.
You can see the perfect forward secrecy and data isolation
mechanism to the dark net
environment. We are just calling that our clients globally, the dark net part in this technology. For sovereign data
handling, our systems ensure full control over where and how
data is stored and accessed. This resonates strongly with
governments and enterprises, especially those dealing with
that critical infrastructure or sensitive personal data where sovereignty and additability
are paramount.
Now, you promised dynamic scaling without system downtime, which we all know is a big
promise to customers. Can you walk through how you achieve this
with your solution and what it means to your customers?
Absolutely.
Our system architecture is designed for modular expansion.
It's a good reason for our clients and governments
and enterprise and also public sector.
And customers can start with a few S3 nodes and scale up to hundreds,
all without interrupting operations.
This is a true distributed workloads, erasure coding for redundancy,
and live data migration.
For organizations also facing rapid growth or new regularity
demands, this means no painful transitions or migrations.
They can grow their infrastructure in real time
while maintaining full compliance, business continuity,
and budget predictability also.
So you've formed some pretty amazing technology partnerships
with innovators like SolidIME.
Can you share a little bit more about how
these partnerships enhance your system's performance,
cost efficiency, and just your overall value for clients?
Sure.
Our R&D collaboration with SolidIME
allows us to leverage high-performance NVMe drives
that dramatically reduce latency while optimizing energy efficiency.
Also we have another R&D partners and we gain advanced virtualization and storage orchestration
capabilities, enabling features like Kubernetes as a service and software defined networking.
And together, these partnerships and also the SolidIME allow us to reduce infrastructure costs by over 50%,
accelerate deployed times, and offer unmatched return of investment, often with just 12 months.
These are tangible advantages to our clients and truly value,
especially at budget-sensitive or performance-critical environments also.
What kinds of customers or sectors are drawn to this solution,
and are you seeing strong uptake in any specific industries? Our solutions in SciTech are particularly well-suited for sectors where security, compliance,
and scalability are non-negotiable.
And we have seen strong demand in finance and public sector, defense, and healthcare, an industry that deals with sensitive data and
are under constant regularity security.
Our platform's ability to deliver an enterprise-grade performance while ensuring full data sovereignty
makes it an ideal choice for this market, as you know. And obviously, that said, our simplified deployment model and competitive cost structure are increasingly
attracting medium-sized enterprises looking for secure and future-proof IT systems without
needing large expertise.
And this is the exact story for this sector.
Now, this has been fascinating, Bura.
And you're such an exciting vendor.
Coming out of Europe and taking these platforms to customers,
I think that our listeners are going to be very interested in what you have to say.
Where can folks go to learn more about the solutions and engage your team?
Visit our website at www.sitech.eu and to explore our technologies in more details there.
You will find the product overviews and white papers and customer success stories also.
and white papers and customer success stories also. And for direct inquiries or demos and the test environment,
you can also reach out to us via LinkedIn or the email.
We are always happy to discuss how SciTech can help secure
and scale your IT environment effectively.
At the end, we continuously innovate to stay ahead of evolving IT security challenges.
Our future deployments include hyperconverged HCI with GPU computing.
It's a new area also after that moment, and it means unlocking high-performance
artificial intelligence and measured learnings workloads.
Also, we just want to focus to enhance zero trust for mobile
because we are going to do our office
and we are just connect our workloads from, for example,
Baanducar on train also.
And it means that sending security for mobile devices
will be the next part.
And PAM integration, Privileged Access Management integration,
and expanding identity and access management capabilities
in our strategy the next year.
And S3 storage acceleration, it means
that the doubling read and write pins to 300 GB per second.
And next step, expanded the compute power.
As you know that you have to enhance your skills and you have to focus the compute part in priority one.
It means that we want to support 256 core per node and scaling store up to one petabyte per node also.
And technology and Citrus VPSC with OTP, you know that there are some methods for the password
integration and we want to add the one-time password integration for enhanced authentication.
Our last message, by driving these advancements, we want to ensure our customers remain at
the forefront of IT security, scalability, and cost efficiency, and so much.
Thank you.
Wow, Bora.
That was quite a story.
Janice, another fantastic data collaboration featured on Data Insights.
It was such a pleasure to have you, Angora, here to share this incredible story.
Sure.
I really appreciate you for this action or the event and the podcast.
I really want to have the IT sector in the ecosystem.
And I think that the ecosystem and clients, the audience,
to understand the SciTech approach and mission and vision.
Thank you so much for you and take our team also.
Thank you, Bora.
Thank you, Allison.
Allison, I'm excited to potentially have Bora back
on for another episode.
That sounds great.
I can't wait, but let's wrap it here.
That's another edition of Data Insights.
Thanks for joining the Tech Arena. Subscribe and engage at our website, thetecharena.net.
All content is copyrighted by the Tech Arena.