• Thread Author
Space42’s announcement that it has partnered with Microsoft and Core42 to build what it calls the UAE’s first Sovereign Mobility Cloud marks a pivotal moment in how the Emirates plans to host, govern and accelerate mobility and autonomous systems at scale. The joint offering positions itself as a regulated, high-assurance cloud environment purpose-built for HD mapping, telematics, fleet operations, traffic management and digital twins — bringing hyperscaler innovation into an environment constrained by local data residency, cleared personnel and sovereign controls. This development was reported in the material provided and in contemporaneous press coverage, and it reflects broader trends in the UAE’s strategy to combine national sovereignty with access to advanced cloud AI capabilities.

A futuristic city skyline under a giant glowing cloud labeled Space42 above busy highways.Background / Overview​

The UAE has been explicit about treating cloud and AI infrastructure as strategic national assets. Over the past two years, government programmes and public‑private partnerships have accelerated deployments of sovereign-oriented cloud platforms that promise both compliance with domestic rules and access to hyperscaler services. The Space42–Microsoft–Core42 mobility initiative follows other sovereign projects in the Emirates that pair Microsoft Azure’s core platform services with locally controlled governance and operations, aiming to reconcile two previously competing aims: access to advanced AI toolchains and local control of sensitive data and operations.
The new Sovereign Mobility Cloud is described as a specialised sovereign public cloud environment for mobility stakeholders — governments, regulators, fleets and mobility-tech suppliers — that require strong assurances on data residency, administrative jurisdiction and operational transparency. Space42 frames the platform as enabling pilot programmes, co‑development with regulators and secure data sharing between public and private actors. Independent media coverage indicates the announcement was timed with industry events in Dubai, highlighting the offering’s role as a national infrastructure play rather than a simple commercial product launch.

What the Sovereign Mobility Cloud aims to deliver​

Core capabilities and target workloads​

The partnership’s public statements and press coverage emphasise a handful of core capabilities:
  • Trusted infrastructure for mobility data and autonomous systems, including compute, storage and networking operating under local legal jurisdiction.
  • High‑definition (HD) mapping and geospatial services that feed navigation, simulation and autonomous perception systems.
  • Telematics and fleet operations platforms designed for large-scale telemetric ingestion, real-time analytics and operational dashboards.
  • Traffic management and digital‑twin environments for city planners and transport agencies to test scenarios and optimise flows.
  • Confidential compute and sovereign governance controls, meant to restrict administrative access, enforce encryption and provide auditable trails for regulators.
These capabilities are pitched at use cases where the combination of high data volumes, low-latency requirements and regulatory sensitivity are existential: autonomous vehicle validation, smart‑city traffic optimisation, national transport analytics and multi‑party data sharing between agencies and regulated firms.

Deployment model and technical architecture (as described)​

The announced model follows the standard sovereign-cloud pattern the UAE has adopted:
  • Local Azure region infrastructure operated under contractual commitments.
  • A sovereignty controls layer (or “Insight”-style governance plane) that enforces policy, key management and auditability.
  • Cleared local engineering teams and managed services to support deployment, compliance and incident response.
  • Options for isolated connectivity and private links to minimise exposure and provide deterministic performance for real‑time workloads.
This architecture is designed so regulated workloads can run inside an environment that meets the UAE’s legal and operational expectations while still consuming Microsoft’s managed platform services (databases, ML platforms, confidential compute primitives and analytics stacks).

How the announcement fits into the UAE’s sovereign-cloud strategy​

A continuation of a known pattern​

The Space42 announcement is consistent with how the UAE approaches strategic technology: pairing global platforms with local operators to achieve both scale and sovereignty. The model has been visible in prior arrangements — including Core42’s sovereign public cloud built on Microsoft Azure — that combine hyperscaler cloud stacks with an added layer of local governance and cleared operations. These collaborations aim to deliver mainstream cloud services while adding contractual and technical guarantees for local regulation.

Why mobility specifically matters​

Mobility and autonomous systems generate uniquely sensitive data: high‑frequency telemetry, sensor feeds (lidar, camera), location traces tied to individuals and businesses, and safety‑critical control signals. That mix of privacy, national security and high availability makes mobility a natural candidate for sovereign models. A sovereign mobility cloud reduces political and legal uncertainties for fleet operators, automakers and urban agencies while enabling them to keep the latency and control they need for production‑grade systems. The National cited Space42’s explicit intention to use the platform for HD mapping, fleet operations and digital twins, underscoring mobility’s practical fit for a sovereign environment.

Strengths and strategic upside​

1. Balancing innovation and regulatory assurance​

The offering explicitly tries to resolve an industry trade‑off: letting organisations access hyperscaler AI and managed services while keeping sensitive mobility data and operations under national controls. This lowers a major barrier to adoption — legal and procurement concerns about cross‑border data flows — for banks, regulators, OEMs and governments that must certify systems and processes. When done properly, it enables faster adoption of advanced analytics, model training, and production ML while reducing compliance friction.

2. Operational readiness for regulated workloads​

The design emphasizes local cleared staff, contractually defined governance controls, and confidential compute — a technical and contractual stack that is attractive to regulated users such as transport authorities and large fleet operators. For safety‑critical systems like autonomous vehicles, that combination of technical controls and local oversight is a practical prerequisite to deployment at scale.

3. Ecosystem and economic benefits​

Sovereign clouds create demand for local data‑centre operations, MLOps talent, systems integrators and a partner ecosystem that can build and operate mobility services. The UAE’s broader initiatives — national skilling, investment in data infrastructure and public procurement for AI-native services — mean such projects can catalyse jobs, exports of geospatial products and domestic innovation. Space42’s prior geospatial and satellite investments position it to supply mapping and imaging data that complement the cloud offering.

Risks, trade‑offs and unanswered questions​

Vendor concentration and lock‑in​

Relying on an integrated hyperscaler + local operator stack concentrates several vectors of dependency:
  • Platform lock‑in (APIs, managed services, proprietary governance layers).
  • Operational lock‑in (cleared staff and bespoke processes).
  • Contractual lock‑in (data processing agreements, exit terms, and the geography of backups).
Procurement teams must demand strong portability, exit and interoperability clauses — technical and contractual — to avoid long‑term leverage by a small number of sellers. Sovereign controls reduce some geopolitical risk but add a different kind of vendor dependency if migration paths are poorly defined.

Cost and efficiency trade‑offs​

Localising compute, storage and high‑performance accelerators (GPUs for model training) can be more expensive than bursting to global hyperscaler regions. For training large generative models or very large-scale simulation workloads, economics still favour global capacity unless local supply is suitably optimised or subsidised. Organisations should model TCO carefully and consider hybrid approaches that keep the most sensitive datasets local while using global regions for episodic, compute‑intensive tasks.

Transparency, governance and public oversight​

Sovereign deployments are technically complex and politically sensitive. When public services are built on closed proprietary governance layers, questions arise about auditability, model explainability and independent oversight. For citizen‑facing mobility services (traffic enforcement, automated penalties, public transit decisions), transparent governance and third‑party audits are essential to sustain public trust. Contractual SLAs alone are insufficient without independent verification mechanisms.

Security and supply‑chain concerns​

Sovereign clouds reduce some geopolitical exposure but cannot eliminate supply‑chain risk — the underlying hardware, firmware, and global dependencies for AI accelerators and networking still create exposure. The 2024 Microsoft–G42 investment and subsequent assurances about hardware sourcing highlight how geopolitically sensitive these partnerships can be; operational assurances must be continually validated through audits and attestations.

Claims that need independent verification​

Several vendor or announcement claims should be treated as marketing until verified by procurement or third‑party attestations:
  • Specific performance guarantees for HD mapping pipelines or real‑time telematics SLAs.
  • Assertions about being the “first” sovereign mobility cloud — market definitions vary and competitors may have overlapping capabilities.
  • Exact numbers of customers, daily interactions or production workloads (unless contractually documented).
These claims should be validated via contractual SLAs, ISO/SOC attestations, and independent performance benchmarks before trusting them for mission‑critical deployments.

Practical guidance for CIOs, transport agencies and mobility providers​

Assessing the Sovereign Mobility Cloud for production use​

  • Map workloads by sensitivity: classify telemetry, mapping data, PII, model artifacts and control planes to decide what must stay in a sovereign zone.
  • Insist on auditable SLAs: require measurable KPIs (latency p95/p99, ingestion throughput, incident response times, and data-export timelines).
  • Verify governance controls: obtain technical descriptions of the sovereignty control plane — access controls, key‑management, logging and attestation mechanisms.
  • Negotiate portability: require data export tools, standardised storage formats and a migration pathway to alternative clouds or on‑premises environments.
  • Run independent benchmarks: commission third‑party performance and compliance tests before moving safety‑critical workloads.

Operational and security best practices​

  • Use layered encryption with keys controlled by the local customer for sensitive data.
  • Implement strong identity and access management with role separation (no single admin can move or export production datasets).
  • Build hybrid resilience with cross‑region encrypted backups (to a pre‑approved, jurisdictional fallback) and clear failover plans for compute or network outages.
  • Operationalise model governance: establish DPIAs, change control for models in production, and continuous monitoring for drift and adversarial manipulation.

Competitive and regional implications​

What this means for hyperscalers, local operators and competitors​

The Space42–Microsoft–Core42 combination illustrates how hyperscalers can be embedded into national strategies without ceding operational control — a model other Gulf and APAC nations are considering. For Microsoft, it is a continuation of efforts to meet sovereignty needs through regional Azure investments and partner models. For local players (Space42, G42, Core42), partnerships with hyperscalers provide access to managed services and toolchains that would be costly to replicate in isolation.

Geopolitical and market dynamics​

Sovereign clouds change procurement dynamics: governments and large regulated industries gain more negotiating leverage by demanding local governance primitives, but they also concentrate technical capacity in a smaller set of large providers. This dynamic increases the importance of competitive procurement, transparent audit mechanisms and government oversight to ensure the long‑term health of the domestic cloud ecosystem.

What remains unconfirmed and should be watched closely​

  • The depth of independent auditing and attestation available to customers and regulators beyond vendor statements.
  • Precise SLA commitments for mission‑critical mobility workloads (e.g., 99.99% availability for telematics feeds).
  • Migration and exit mechanics — how customers can extract their data and models without disruption.
  • The cost profile for large-scale model training inside the sovereign environment vs. hybrid burst models.
Until these are contractually defined and independently validated, procurement teams should treat public claims as indicative rather than definitive.

Conclusion — a strategic but cautious step​

The launch of a Sovereign Mobility Cloud by Space42 in partnership with Microsoft and Core42 is a logical next phase in the UAE’s tactical approach to sovereign infrastructure: marry hyperscaler innovation to local governance and cleared operations. For mobility and autonomous systems — where data sensitivity, safety and regulatory oversight intersect — a purpose‑built sovereign environment can materially lower barriers to production deployment. At the same time, buyers must guard against vendor lock‑in, confirm technical attestations, and insist on transparent governance and migration paths to keep their options open.
The announcement is strategically significant for the UAE — advancing national ambitions in smart mobility, geospatial services and AI-enabled infrastructure — but it is not a procurement endpoint. For CIOs, transport authorities and mobility providers, the next step is pragmatic and contractual: validate the technical claims, demand auditable controls, and model the economic trade‑offs before entrusting safety‑critical or large‑scale systems to any single sovereign stack.

Source: TechAfrica News Space42 and Microsoft Launch UAE’s First Sovereign Mobility Cloud - TechAfrica News
Source: Finimize https://finimize.com/content/uae-rolls-out-its-own-secure-mobility-cloud-with-microsoft/
 

Space42’s announcement that it will build what it calls the UAE’s first Sovereign Mobility Cloud with Microsoft and Core42 is a strategic move that crystallizes a broader regional trend: combine hyperscaler AI and platform capabilities with locally controlled governance layers to host, operate, and certify safety‑critical mobility and autonomous systems inside national borders.

Futuristic cityscape beneath a glowing blue globe hovering above a busy highway.Background​

The UAE has pursued sovereign‑cloud initiatives for several years, driven by regulatory aims, national security, and a desire to host advanced AI workloads domestically. That pattern—hyperscaler platform + local operator + a sovereignty controls plane—has become the operational model for many Gulf states aiming to accelerate AI and cloud adoption while keeping data and administrative controls under national jurisdiction.
Space42 says the new offering is enabled by Core42’s Sovereign Public Cloud, built on Microsoft Azure, and will act as a purpose‑designed foundation for HD mapping, telematics, fleet operations, traffic management and digital twins—workloads that are both data‑intensive and regulation‑sensitive. The company frames the platform as the environment to run pilots, regulatory sandboxes and commercial rollouts for autonomous mobility.

What the Sovereign Mobility Cloud will deliver​

Core capabilities (as described by the partners)​

  • Trusted sovereign infrastructure: compute, storage and networking physically and contractually anchored in the UAE.
  • HD mapping and geospatial services: hosted pipelines for mapping, change detection, and map tile serving for navigation and simulation.
  • Telematics and fleet operations: high‑throughput ingestion, stream processing and operational dashboards for live fleets.
  • Traffic management and digital twins: city‑scale simulation and scenario testing for planners and operators.
  • Secure multi‑party data sharing: controlled, auditable information flows between government, industry and research participants.
Microsoft’s stated role is to provide the Azure regional foundation, confidential compute and data governance primitives, plus training, technical assistance and co‑investment to grow the ecosystem. Core42 supplies the sovereign controls layer—marketed in various materials as a governance plane that enforces residency, admin separation, and auditable controls—while Space42 will lead mobility application deployment and stakeholder engagement.

Why mobility is a special case​

Mobility and autonomous systems generate a unique mix of data types: high‑frequency telematics, sensor feeds (LiDAR, radar, cameras), continuous location traces, and safety‑critical telemetry. Those datasets raise privacy, safety and national‑security concerns and they often require sub‑second responses or deterministic connectivity for production systems. A sovereign mobility platform aims to remove legal and operational friction that otherwise slows or blocks production deployments.

The strategic fit for Space42, Microsoft and Core42​

For Space42​

Space42 brings operational experience in autonomous mobility through the TXAI service and geospatial capabilities (GIQ), and positions itself as the application and operations lead—running pilots, proving regulatory compliance, and driving adoption across transport agencies and commercial fleets. Space42’s public materials note long operational mileage and passenger counts for its TXAI robotaxi service—figures the company uses to argue operational readiness for production scale.

For Microsoft​

Microsoft extends Azure’s reach into sovereign deployments by supplying platform services and confidential compute, demonstrating how a hyperscaler can be embedded into national strategies without giving up local governance. Microsoft’s public posture has emphasized sovereign cloud whitepapers, joint technical playbooks with Core42, and mechanisms to combine data residency with advanced AI services.

For Core42 (and its G42 lineage)​

Core42 provides the sovereignty control plane and local operational fabric—cleared staff, data center commitments, and contractual guardrails—so that regulators and enterprises get enforceable, auditable assurances. Core42’s model has already been positioned as capable of supporting high‑volume government workloads in the UAE and combines Azure technology with local enforcement controls.

Independent verification of key claims​

Several of the partners’ public claims are verifiable through corporate press materials and independent reporting:
  • Space42’s announcement of the Sovereign Mobility Cloud was published as a company press release on 24 September 2025.
  • Independent regional coverage (The National, Gulf News and others) reported the tie‑up and reiterated the core features of the offering.
  • Microsoft and Core42 have produced whitepapers and statements describing the Core42 Sovereign Public Cloud architecture and how Azure technologies are being used inside sovereign programs. These materials reflect repeated public messaging about confidential compute, regional Azure infrastructure, and a governance plane named Insight.
Space42’s operational metrics for TXAI—notably the figure often quoted in the announcement of nearly 20,000 passenger trips and ~600,000 km of autonomous driving since 2021—appear in Space42’s own releases and are corroborated by multiple company statements and regional media reporting summarizing those figures. Earlier TXAI trial phases in 2021 reported thousands of riders and measured autonomous kilometres in the tens of thousands; Space42’s 2025 materials present the aggregated numbers used in company positioning. Readers and procurement teams should treat operational metrics coming from vendors as important signals but still require contractual guarantees and independent attestation when used to qualify mission‑critical operations.

Strengths: why this matters for CIOs and mobility operators​

  • Regulatory clearance and procurement friction reduced: Sovereign clouds lower a major barrier to adoption by offering legally and operationally aligned environments for regulated industries such as transport, finance and healthcare. This reduces uncertainty for regulators, insurers and OEMs.
  • Operational readiness for safety‑critical workloads: Combining confidential compute, access‑control separation and cleared local engineers makes it easier to meet the audit and safety requirements expected for autonomous systems.
  • Ecosystem and talent development: A sovereign mobility platform creates demand for local MLOps, geospatial mapping, and systems‑integration skills—an economic multiplier that aligns with national digital transformation targets.
  • Faster route to production: By giving regulators and pilots a controlled environment, the platform can speed movement from demonstration projects to commercial rollouts—especially for fleets that need traceable governance and auditable controls.

Key risks, trade‑offs and governance questions​

Despite its strategic upside, the model carries substantive risks:
  • Vendor concentration and lock‑in: A sovereign offering that combines a hyperscaler’s managed services with a proprietary sovereignty layer increases dependency on specific stacks and contractual terms. IT leaders must negotiate clear portability, data export and migration guarantees.
  • Transparency and independent auditability: Sovereign clouds may reduce geopolitical risk, but they can also become opaque systems if audit records, attestation reports and operational controls are not independently verifiable. Public trust—especially for citizen‑impacting services—requires external attestations and third‑party audits.
  • Cost and efficiency for large training jobs: Localizing compute, storage and accelerators (GPUs) can be materially more expensive than using global capacities for episodic, compute‑intensive tasks. Organisations should model TCO carefully and consider hybrid bursting strategies.
  • Supply‑chain and geopolitical exposure: Even sovereign deployments rely on global hardware, firmware and supply chains. Operational assurances must be supported by continuous verification and secure procurement practices.

Practical guidance: what CIOs, transport authorities and fleet operators should demand​

  • Require auditable SLAs that specify measurable KPIs: ingestion throughput, latency (p95/p99), availability and incident response timelines.
  • Insist on independent third‑party attestations: SOC/ISO reports, confidential compute attestation records and regular penetration testing.
  • Contract portability and exit clauses: standardised export formats, encrypted backups, and a defined migration pathway to alternative clouds or on‑premise fallback.
  • Define model governance controls: DPIAs, versioning, drift detection, and model‑change approval workflows for any ML models that influence safety or enforcement actions.
  • Implement strict key management: cryptographic keys for the most sensitive datasets must be under local and customer control, not solely controlled by the platform operator.

Technical architecture patterns to expect​

Sovereign Public Cloud (typical)​

  • Local Azure region(s) hosting platform services.
  • An overlay sovereignty control plane (Insight‑style) enforcing admin separation, KMS policies and auditability.
  • Cleared local operations team providing managed services and incident response.
  • Private connectivity (MPLS/ExpressRoute equivalents) to edge nodes and telematics gateways.

Hybrid/Edge complement​

  • Edge inference nodes (on‑vehicle or roadside) for ultra‑low latency perception and control.
  • Encrypted telemetry streams to the sovereign region for aggregation, mapping updates and model retraining.
  • Cross‑region encrypted backups to pre‑approved jurisdictions as part of resilience planning.

Competitive and regional implications​

This tri‑party effort (Space42 + Core42 + Microsoft) illustrates a replicable template for other governments and regional operators: hyperscaler platforms paired with a local sovereignty operator create an attractive route to production for regulated industries. Expect competing sovereign offerings to emphasize different trade‑offs: deeper national control (private signature clouds), lower cost (shared regional models), or open governance models (third‑party attestation marketplaces). Procurement teams across the Gulf and APAC will watch this model closely.
Geopolitically, alliances between hyperscalers and national champions (including G42/Core42) have already attracted attention and regulatory scrutiny in some markets; transparency and clear legal frameworks will be critical to sustain broader enterprise adoption. Public trust will depend on independent auditability and clear redress mechanisms for citizens affected by mobility systems.

How this fits into the UAE’s broader sovereign cloud strategy​

The Space42 announcement dovetails with an ongoing national effort to create sovereign cloud capacity, accelerate AI adoption, and localize critical digital infrastructure. The UAE has publicly committed multi‑billion‑dirham strategies and procurement programs that favor domestic sovereign offerings for government and regulated sectors. Core42’s earlier public partnerships to handle millions of daily interactions for Abu Dhabi government services are an example of the scale ambitions driving these programs.

What remains to be proven​

  • Exact SLA commitments for safety‑critical telematics and HD mapping pipelines (latency, ingestion throughput) are not yet published in contract form and must be contractually validated.
  • The scope and independence of attestation and audit mechanisms beyond vendor statements need confirmation.
  • Migration and exit mechanics: the practical process of extracting petabytes of map tiles, model artefacts and telematics logs under time constraints remains an open operational and contractual detail.
When vendors frame these programs as “first” or “world‑leading,” procurement teams should ask for primary evidence: signed contracts with public entities, independent benchmarks, and live technical dashboards exposing the KPIs that matter for production systems.

A pragmatic roadmap for adoption​

  • Start small: run non‑safety critical workloads (analytics, map update batch jobs) inside the sovereign zone to validate controls.
  • Expand to regulated pilots: implement telematics and fleet‑ops with staged KPIs and live audits.
  • Move safety‑critical inference to hybrid: keep perception inference on edge, but stream training data and model retraining to the sovereign cloud under strict governance.
  • Full production: after independent attestations and successful pilot metrics, scale to broader fleet operations and integrate with traffic management and city digital twins.

Final analysis — strategic promise with operational caveats​

Space42’s Sovereign Mobility Cloud partnership with Microsoft and Core42 is strategically significant: it aligns hyperscaler innovation with local governance and operational readiness for mobility workloads that cannot tolerate legal or operational uncertainty. For the UAE this is a logical extension of broader sovereign cloud ambitions that aim to capture both economic value and national control of sensitive infrastructure.
However, the initiative will only deliver systemic value if it offers clear, auditable governance, robust SLAs for safety‑critical workloads, verifiable third‑party attestations, and contractual portability that prevents long‑term lock‑in. Procurement teams and regulators must insist on those guarantees before entrusting mission‑critical autonomous systems to any vertically integrated sovereign stack.
The next 12–36 months will determine whether the Sovereign Mobility Cloud becomes a practical production environment for wide‑scale autonomous mobility—accelerating deployment while preserving trust—or remains primarily a national showcase until the ecosystem proves migration, auditability and economic viability at scale.

Space42’s initiative is a significant milestone in the UAE’s push to marry national sovereignty with the speed and scale of hyperscaler AI — promising faster adoption of autonomous mobility, but demanding rigorous oversight, contractual discipline, and independent verification before it can be entrusted with the safety and privacy of millions of trips.

Source: Via Satellite Space42 Teams up with Microsoft for Sovereign Cloud Initiative
 

Space42’s announcement that it will build the UAE’s first Sovereign Mobility Cloud, enabled by Core42’s sovereign public cloud platform and underpinned by Microsoft Azure, marks a notable push to fuse national data sovereignty with large-scale autonomous-mobility infrastructure and HD mapping services. The initiative, unveiled on the sidelines of the Dubai World Congress, positions Space42 as the application and systems integrator for a mobility-focused sovereign cloud stack intended to host telematics, high-definition maps, fleet operations, traffic management, and digital-twin services inside UAE jurisdictional boundaries.

Futuristic city with a glowing blue cloud and data streams arcing to skyscrapers.Background​

Why “sovereign cloud” and why now​

The UAE has been explicit about its ambition to accelerate AI and digital government services while keeping sensitive data under national control. Over the last two years, partnerships between Microsoft and local AI and cloud players — notably Core42, the sovereign-cloud arm of G42 — have set the technical and commercial groundwork for sovereign-enabled cloud offerings in the Emirates. Microsoft and Core42 have published joint material and white papers outlining how a sovereign public cloud can balance regulatory compliance, data residency, and AI innovation.
Microsoft’s existing UAE Azure regions (Dubai and Abu Dhabi) already provide data residency and a number of the technical building blocks typically required by sovereign deployments — from region-specific availability zones to confidential compute primitives. Azure’s confidential computing offerings and its UAE region presence are explicitly designed to let regulated customers keep data in-country while benefiting from hyperscale services. Those same Azure capabilities are being invoked by Core42 and its partners as part of the sovereign stack that will host mobility workloads.

Who the players are​

  • Space42: The ADX-listed entity formed by the 2024 merger of Bayanat and Yahsat; it combines geospatial AI, satellite connectivity, and smart-mobility operations and is already operating autonomous taxi services and mapping platforms in Abu Dhabi.
  • Core42: A G42 group company building sovereign cloud and AI infrastructure; Core42 offers a sovereign controls platform called Insight and partners with hyperscalers to deliver “sovereign-enabled” public cloud services.
  • Microsoft: Supplying Azure’s regional datacenters, Azure security and governance tooling, confidential compute primitives, and ecosystem support for application development, training, and operationalization.

What Space42 is promising: platform and features​

Core capabilities described​

Space42 describes the Sovereign Mobility Cloud as a sovereign-enabled platform for intelligent transport that will provide:
  • Trusted infrastructure for mobility data and autonomous systems, housed in UAE jurisdiction.
  • Platform services for HD mapping, telematics ingestion and processing, fleet operations, traffic management, and digital twins—functions critical to city-scale autonomous mobility.
  • Secure data-sharing mechanisms that allow government agencies, industry participants, and research institutions to exchange data under controlled, auditable rules.
Those functional categories line up precisely with what large-scale mobility ecosystems require: low-latency map and perception services, telemetry ingestion pipelines, model training and validation environments, and controlled multi-party data enclaves for research and regulatory oversight.

Roadmap and early-stage plans​

Space42 says the initiative will move from platform construction to reference deployments, regulatory sandboxes and test hubs with UAE transport authorities, supported by pilots and demonstrations designed to accelerate commercial rollouts. Microsoft and Core42 are expected to supply the sovereign-enabled cloud foundation — combining Azure’s regional infrastructure, confidential compute and data-governance tooling with Core42’s Insight control plane.

Technical architecture — how a Sovereign Mobility Cloud actually fits together​

Layers and components (high level)​

  • Infrastructure: Microsoft Azure UAE regions provide the underlying compute, storage, and network zones with in-country data residency. Azure supports availability zones in Dubai and Abu Dhabi and a catalogue of services required by mobility platforms.
  • Sovereign control layer: Core42’s Insight acts as a policy and governance platform to enforce data residency, access controls, and regulatory guardrails on top of Azure. This is positioned as the “sovereign control plane” that co-locates policies with data and compute.
  • Application & data services: HD map stores, telematics ingestion pipelines, digital-twin engines, and fleet-management systems run as platform services on top of Azure compute and Core42 controls; Space42 will own application deployment, regulatory liaison, and service orchestration.
  • Confidential computing: When workloads require protection while data is in use (for example, multi-party model training on private datasets), Azure confidential compute can be used to minimize privileged access and provide verifiable execution enclaves.

Why confidential compute matters for mobility​

Autonomous systems depend on large datasets — sensor logs, HD maps, route traces — that can include personally identifiable information and proprietary perception models. Confidential compute protects code and data during processing and reduces the need to trust cloud operators or external administrators with plaintext data. That technical capability is frequently cited by Microsoft and its sovereign-cloud partners as a cornerstone technology for regulated workloads.

The strategic logic: national sovereignty meets mobility economy​

For the UAE: faster, safer, sovereign mobility​

A mobility-focused sovereign cloud aligns with national priorities: it reduces friction for domestic public-sector adoption, gives regulators auditability and control, and creates a domestic environment for testing and scaling autonomous systems. Space42’s operational footprint in Abu Dhabi — including its TXAI autonomous service and mapping projects — gives it a pathway to package live operational data, reference deployments, and sandboxed regulatory experiments.

For Microsoft and Core42: a replicable playbook​

Microsoft gains by anchoring Azure deeper into government and regulated-industry workflows in the Middle East, while Core42 and G42 gain a hyperscale technology partner to make a sovereign cloud offering credible at enterprise and government scale. The joint white paper and government agreements already discussed demonstrate a model that can be replicated for other sectors — healthcare, finance, or national services — where sovereignty and AI adoption must coexist.

Claims to verify and a note on available evidence​

  • Space42’s announcement and feature list are available as a company press release and have been reported by national outlets. The headline claim — a UAE Sovereign Mobility Cloud enabled by Core42 and Microsoft Azure — is documented in Space42’s release and coverage by major UAE media.
  • The technical claim that Core42’s Sovereign Public Cloud “leverages Microsoft Azure” and uses a sovereign controls layer called Insight is confirmed by Microsoft’s Core42 white paper and Core42/G42 publications. This shows multi-source corroboration for the technical partnership and the presence of Insight as a control plane.
  • Space42’s operational data about its autonomous service (TXAI) — specifically the frequently-cited figures "nearly 600,000 km of autonomous driving" and "20,000 passenger trips" — appears in Space42 materials and is echoed in several news outlets. However, authoritative government-sourced figures from Abu Dhabi’s Integrated Transport Centre (ITC) and other reporting have given different numbers (for example, Gulf News reporting ~600,000 km and 40,000 trips). This divergence suggests that trip/odometer figures should be treated with caution until reconciled with public regulator statistics. Readers should note the discrepancy and treat those operational metrics as company-reported figures pending direct regulator confirmation.
  • Precise financial or timeline commitments (for example, detailed co-investment amounts or strict go-live dates for the Sovereign Mobility Cloud) are not yet publicly documented in consistent, multi-source detail in the announcement materials. Several outlets mention training, co-investment and technical support from Microsoft, but exact dollar figures and contractual timelines are not part of the Space42 release. Those specifics remain unverified in public sources at the time of reporting.

What this means for developers, integrators and the Azure ecosystem​

Opportunities​

  • Azure-native developers will find richer demand for cloud-native telemetry, streaming, and model-training solutions that run in Azure UAE regions and that can be wrapped with Core42/Insight policy controls.
  • Mapping and GIS vendors can partner with platform operators (Space42 and others) to supply HD-map layers, lane-level semantics and validation tooling for continuous map updates. These services are explicitly singled out in Space42’s platform description.
  • Edge and connected device vendors will have demand for telematics gateways, secure message brokers, and low-latency inference appliances that integrate with the sovereign cloud stack. Confidential compute primitives will likely be used for privacy-preserving analytics.

Developer guidance (practical)​

  • Architect mobility services for region-aware deployment: tag storage and compute so that sensitive data remains in UAE regions and use Azure tools to enforce residency.
  • Use confidential computing patterns for multi-party model training or for running proprietary perception models on shared datasets.
  • Design telemetry pipelines to accept policy-based filtering at ingestion time so regulatory sandboxes can expose only the permitted views of operational data.

Risks and governance considerations​

Vendor concentration and technical lock-in​

Stacking Core42’s sovereign control plane on top of Microsoft Azure creates a potent, but concentrated, supplier architecture. While the model is designed to preserve data residency, it can also create operational and contractual lock-in if data-export, inter-region portability, or independent third-party audits are not explicitly guaranteed in procurement contracts. Procurement teams should insist on clear exit, audit and data-portability terms.

Geopolitics and supply-chain scrutiny​

G42 — Core42’s parent group — has become strategically important to the UAE’s AI ambitions and has attracted international attention as a deep-pocketed regional AI champion. Coverage in international outlets shows an ongoing debate about geopolitics, U.S. scrutiny, and the global flow of cloud and AI technologies. The international posture of any sovereign-cloud provider can affect multinational customers and third-party suppliers who must navigate export controls and foreign-investment screening. Organizations should include geopolitical risk assessments as part of supplier due diligence.

Data governance and multi-party sharing​

The Sovereign Mobility Cloud’s promise to enable “secure data-sharing” between government, industry and research groups is attractive — but the mechanics matter. Without robust policy templates, mutability controls, and independent audit logs that are transparent to regulators, there is a risk of policy creep where data is repurposed beyond the original consented uses. The Core42 Insight control plane claims to provide these governance capabilities, but independent verification and third-party audits will be crucial.

Security exposure and the attack surface​

Mobility stacks aggregate large amounts of sensor data, identity metadata, and operational logs. Consolidating these under a sovereign cloud reduces some attack vectors (data stays in-country) but raises others: a concentrated platform becomes a higher-value target and requires defense-in-depth across network, compute and hardware roots of trust. Confidential compute reduces exposure when data is in use, but careful design of key management, enclave attestation, and logging policies remains essential.

Regulatory and operational realities: sandboxes, certification, testing​

Space42 and partners have outlined plans for regulatory sandboxes and test hubs to allow controlled trials. Sandboxes are a sensible mechanism because they permit incremental risk-controlled experimentation while regulators evolve certification and liability frameworks for autonomous systems. For software and services developers, these sandboxes will likely impose specific telemetry retention, access controls and incident-reporting obligations that must be respected to participate.
Public-sector ambition is high: Microsoft and Core42 have documented intentions to create a sovereign public cloud environment to handle millions of government interactions daily, and Abu Dhabi’s digital strategy has already signaled multi-year, large-scale digitization programs. Translating those ambitions into consistent compliance frameworks across municipalities, transport agencies and private operators is non-trivial and will require sustained governance investment.

Competitive and market implications​

Regional competitive landscape​

The UAE’s move is consistent with a broader regional trend: governments in the Middle East and beyond are building sovereign-enabled cloud offerings to reconcile hyperscale innovation with regulatory control. For hyperscalers, the approach is to partner with local sovereign-cloud specialists rather than attempt to deliver fully isolated sovereign clouds alone. That partnership pattern is visible in the Microsoft–Core42 collaboration.

Potential exportability of the model​

If successful, a mobility-focused sovereign-cloud blueprint could be packaged and exported to other countries seeking to host autonomous systems or sensitive mobility data domestically. However, exportability will hinge on clear certification, modular control planes that support different legal regimes, and transparent audit mechanisms that reassure international automakers and cloud customers.

Practical checklist for organisations evaluating the Sovereign Mobility Cloud​

  • Insist on documented data residency guarantees and clear service-level agreements for data export and portability.
  • Require independent third-party audits of the sovereign control plane and confidential-compute attestation processes.
  • Validate incident response and cross-jurisdiction breach notification procedures ahead of production deployment.
  • Confirm the policy model (who can query what data, under what conditions) and test it in a regulatory sandbox before scaling.

Conclusion​

Space42’s Sovereign Mobility Cloud announcement stitches together three converging dynamics: the UAE’s political will to own and control critical digital infrastructure; hyperscaler technology (Microsoft Azure) that delivers regionally resident compute and confidential-compute primitives; and local sovereign-cloud engineering (Core42 and its Insight control plane) that promises policy-first governance atop hyperscale services. The resulting stack is compelling for autonomous-mobility use cases that require low-latency processing, HD mapping, and strict data residency.
That promise comes with practical trade-offs. Developers and buyers should treat operational metrics and company-provided performance figures cautiously until regulator-validated data is available; they must negotiate portability and auditability protections to avoid supplier lock-in; and they need to build security and governance into the fabric of their services rather than as an afterthought. For the UAE, the move can accelerate safe, sovereign autonomous mobility — and for the Azure ecosystem, it creates a fertile field of demand for mapping, telemetry and AI operations services. The critical tasks ahead are the rigorous, transparent execution of governance controls, and the open reconciliation of operational claims against independent regulator data.


Source: Telecompaper Telecompaper
 

Space42’s announcement at the Dubai World Congress marks a major step toward building a sovereign mobility cloud in the UAE — a purpose-built, sovereign-enabled platform for hosting HD mapping, telematics, fleet operations, traffic management and digital twins — backed by Core42’s Sovereign Public Cloud layer and Microsoft Azure’s enterprise-grade cloud and AI capabilities. The initiative promises tighter data residency controls, confidential compute options and a single platform designed to accelerate adoption of autonomous mobility services, but it also raises tough questions about vendor architecture, governance, regional geopolitics and the operational realities of scaling mission-critical mobility infrastructure.

A glowing holographic world map hovers above a futuristic cityscape at dusk.Background​

Since 2021 the UAE has invested heavily in smart mobility pilots and autonomous vehicle trials, creating an ecosystem of regulators, operators and technology partners that now includes Space42, G42/Core42 and Microsoft. Space42 — formed by the merger of Bayanat and Yahsat and positioned as a national SpaceTech and geospatial AI champion — has operated the TXAI autonomous taxi service across Yas, Saadiyat, Al Maryah and Al Reem Islands and to Abu Dhabi Airport. The company reports a substantial operational record for TXAI: roughly 600,000 kilometres of autonomous driving and about 20,000 passenger trips accumulated since 2021, an operational dataset and public trial history that underpins its credibility to lead application deployment for a mobility platform.
Core42, the sovereign-cloud and AI-infrastructure arm of G42, has been building a “Sovereign Public Cloud” offering that layers controls and governance on top of hyperscaler infrastructure (notably Microsoft Azure in this context), marketed under an Insight controls platform. Microsoft, for its part, has deepened commercial and strategic ties with Emirati partners in recent years, including a major investment and technical collaboration with G42, and has positioned Azure to support region-specific, sovereign-enabled solutions that combine data residency, confidential compute, and Azure’s AI and cloud services.
Taken together, these players are pitching the Sovereign Mobility Cloud as an industry-first platform in the UAE dedicated to intelligent transport and autonomous systems — a national-grade environment intended to relieve public agencies and regulated companies of the awkward trade-off between hyperscale innovation and data sovereignty.

Overview of the Sovereign Mobility Cloud concept​

What the platform intends to provide​

The Sovereign Mobility Cloud is presented as a verticalised cloud platform tailored for mobility and autonomous-system workloads. Core elements include:
  • HD mapping and geospatial services for localization and route planning.
  • Telematics and fleet operations: telemetry ingestion, fleet health monitoring and orchestration.
  • Traffic management: integration with road-side sensors and centralized traffic-control systems.
  • Digital twins for city-scale simulation, scenario testing and regulatory approvals.
  • Secure data sharing between government bodies, operators, researchers and OEMs under regulated access controls.
Those components are common building blocks for modern mobility stacks, but the platform’s defining attribute is the “sovereign” controls and governance that aim to keep sensitive mobility and personal data under the jurisdictional, regulatory and technical protections of the UAE.

How the stack is being positioned technically​

The announced architecture layers include:
  • Azure hyperscale infrastructure (compute, storage, networking) hosted in the UAE region for data residency.
  • Core42’s Sovereign Public Cloud overlay that provides pre-built controls, policy enforcement and a governance application (Insight) designed to implement UAE-specific compliance and security requirements.
  • Confidential compute technologies (used to isolate workloads and limit data exfiltration risks).
  • Application platform and AI tooling supplied by Microsoft, plus Space42’s geospatial AI products (notably its GIQ platform) and mobility application suites (TXAI operational software, HD map pipelines).
Microsoft and Core42 will supply the underlying cloud foundation and governance frameworks, while Space42 will lead application deployment, regulatory engagement and pilot rollouts.

Why the UAE is pursuing sovereign mobility clouds​

The UAE’s strategy is straightforward: preserve the benefits of hyperscale cloud innovation while ensuring critical national data (transport, citizens, infrastructure) is subject to domestic control, auditability and regulatory policy. Key drivers include:
  • National security and privacy: Autonomous mobility systems generate detailed telemetry that can implicate national infrastructure and personal privacy. Sovereign hosting reduces cross-border data exposure.
  • Regulatory clarity: Governments prefer local, auditable platforms when they oversee trials, liability, and approvals for autonomous services.
  • Economic and industrial strategy: Hosting platforms locally fosters in-country capability building, high-value jobs, and exportable IP for the region’s nascent mobility supply chain.
  • Performance and integration: Local cloud regions reduce latency for real-time perception and telematics workloads, which is critical for teleoperated functions and connected traffic management.
These motivations align with broader Abu Dhabi and UAE digital strategies that have embedded sovereign cloud initiatives and AI-targeted investments into national roadmaps.

Technical analysis: strengths and practical capabilities​

Strength — Dedicated, domain-specific infrastructure​

A standalone mobility cloud gives the UAE a domain-specific environment where the entire lifecycle of mobility data — collection, storage, model training, simulation and operations — can be governed holistically. That reduces friction between transport authorities, private operators and researchers who often struggle with incompatible data formats and cross-border legal barriers.

Strength — Data residency + confidential compute​

Combining Azure’s regional infrastructure with a sovereign controls layer and confidential compute provides a convincing technical posture for governance. Confidential compute (e.g., hardware-backed enclaves and trusted execution environments) can limit who sees raw telemetry, sensor streams, and high-resolution map data while still allowing aggregated analytics and model training when permitted.

Strength — Operational experience and live telemetry​

Space42’s TXAI operational history — extensive kilometres and thousands of passenger trips — gives the project an operationally grounded partner to run pilots, demonstrate safety, and provide real-world datasets to validate platform services such as HD mapping and fleet orchestration.

Strength — Ecosystem and training commitments​

With Microsoft promising training, technical enablement and co-investment, the project is positioned as an ecosystem play rather than a vendor-only deployment. That can accelerate local skills development for operators, regulators and system integrators.

Risks and unanswered questions​

No major infrastructure project is without trade-offs. The Sovereign Mobility Cloud raises several practical and geopolitical risks that must be assessed honestly.

Risk — Vendor composition and concentration​

The platform will combine Azure infrastructure with G42/Core42 controls and Space42 applications. While this hybrid provides convenience, it also concentrates critical mobility infrastructure within a small number of vendors and an interdependent supply chain. That creates potential points of failure and raises questions about:
  • Operational independence: If one provider experiences outages, how resilient is the national mobility fabric?
  • Lock-in: How portable are critical assets — HD maps, trained models, telemetry pipelines — if regulators or operators want to move workloads between providers?
Mitigation requires clear portability standards, open data formats for HD maps and route data, and contractual SLA/backout clauses that protect national continuity.

Risk — Geopolitical and export-control exposure​

The collaborations between Microsoft and G42 (including previous investments and technology-sharing arrangements) have attracted international scrutiny. Investments and technology transfers that enable sovereign cloud capabilities can interact with export controls, foreign policy constraints and concerns around advanced chip exports. The project’s ability to use state-of-the-art AI accelerators, for example, depends on export licensing and cross-border policy. Any constraints on supply chains, chip availability or software licensing could delay deployments or limit compute scale.

Risk — Trust model and transparency​

Sovereign clouds trade a lot on trust. Governments and citizens expect controlled access, auditable policies and demonstrable protection against foreign intelligence access. But trust is built through transparent governance processes, independent audits and clear third-party validation of security claims. The announced stack needs independent verification (e.g., security audits, penetration tests and governance attestations) to avoid skepticism about whether confidential compute and resident controls truly prevent unauthorized access.

Risk — Data governance complexity​

Mobility data is not monolithic. It contains personal data (passenger manifests, ride telemetry), operational data (fleet diagnostics) and infrastructure data (traffic flow, sensor health). The platform must implement fine-grained policy enforcement that distinguishes permitted uses (e.g., aggregated research) from prohibited ones. Handling cross-stakeholder access requests (researchers, OEMs, enforcement agencies) will require robust attribute-based access control (ABAC), purpose limitation, logging and precise consent models.

Risk — Safety and liability​

Scaling autonomous services from pilots to city-wide deployments introduces liability questions. If the sovereign cloud manages the mapping and fleet controls, how will liability be apportioned between operators (Space42 or third-party operators), platform providers (Core42/Microsoft) and hardware vendors? Regulatory sandboxes are needed to clarify fault models and to run safety-case analysis across edge, vehicle and cloud layers.

Regulatory and governance considerations​

Regulatory sandboxes and test hubs​

The announced next steps — reference deployments, regulatory sandboxes and test hubs — are the correct pragmatic approach. Sandboxes let regulators test real-world scenarios and craft rules that reflect operational evidence. Test hubs provide sanitized environments for stress-testing HD mapping updates, vehicle-to-infrastructure integration and teleoperation under controlled conditions.

Data-sharing frameworks​

Secure cross-sector data sharing will be a central capability. Effective frameworks should include:
  • Data classification: a taxonomy separating anonymized telemetry, pseudonymized passenger data, and national-infrastructure-sensitive information.
  • Role-based and purpose-based access: technical enforcement that mirrors legal permissions.
  • Auditability and provenance: immutable logs of who accessed what and when, plus lineage for derived AI models.
  • Retention and deletion policies: automated lifecycle controls to ensure data isn’t retained longer than allowed.

Certification and independent oversight​

To maintain credibility, the platform should adopt third-party security certifications, regular compliance assessments and publicly verifiable audit reports that cover confidentiality, integrity and availability controls.

Commercial and market implications​

For mobility operators and OEMs​

A sovereign mobility cloud could lower barriers for OEMs and operators who require local data residency and regulated testing environments. Rather than provisioning standalone on-prem stacks, smaller operators can rely on the sovereign platform to provide mapping, fleet orchestration and regulatory-compliant telemetry ingestion.

For startups and researchers​

Access to a national dataset, sandboxes and compute resources (if priced reasonably) could catalyse local innovation, spurring startups to develop perception modules, vehicle controllers and simulation tools that are tuned to Middle East urban topologies and weather patterns.

For global cloud providers and hyperscalers​

The model underscores an emerging business approach: hyperscalers providing core infrastructure while sovereign-cloud integrators layer controls and compliance packages for national markets. Expect other markets to replicate this pattern where national data sovereignty is a priority.

Technical deep dive: what to expect under the hood​

While the service architecture is vendor-specific, several technical patterns are likely to be used:
  • Edge-cloud hybrid model: latency-sensitive workloads (vehicle control loops, perception pre-processing) will likely run on edge nodes or within vehicles, while heavier workloads (HD map generation, model training) will be hosted in the sovereign cloud.
  • Streaming ingestion pipelines: real-time telematics and LiDAR/radar feeds will require scalable streaming platforms (Kafka or Azure Event Hubs equivalents) with guaranteed delivery and schema management.
  • HD map versioning and distribution: maps will be treated as first-class artifacts with semantic versioning, delta update streams and signed bundles to ensure consistency across vehicles.
  • Model governance: model registries, experiment tracking and model explainability tooling will be needed to demonstrate safety, auditability and rollback.
  • Confidential compute enclaves: these will be used for sensitive model training or workloads where raw citizen data cannot be exposed even to administrators.
Operational excellence will depend on well-defined CI/CD for models and infrastructure-as-code templates to keep deployments reproducible and auditable.

Implementation challenges​

  • Scaling storage and bandwidth for HD mapping and sensor data will be expensive; designs should prioritise smart compression, temporal retention limits and derived data storage.
  • Interfacing legacy traffic-control systems and heterogeneous edge devices requires robust protocol adapters and hardened telemetry gateways.
  • Coordination across public agencies, private fleets and academic partners will necessitate a governance board, common APIs and standard SLAs for shared services.
  • Ensuring vehicle safety when maps or control signals become stale requires strict update policies and fallback behaviour built into vehicle software.

What this means for the region and the industry​

The Sovereign Mobility Cloud is more than a national tech project — it represents a template for how countries can reconcile AI-driven mobility innovation with sovereignty and regulatory control. If delivered successfully:
  • Abu Dhabi and the UAE could become a regional testbed and exporter of mobility services and standards.
  • The model could be replicated by other governments balancing innovation and control.
  • It could accelerate safe, regulated deployment of autonomous vehicles by giving operators a reliable compliance-first cloud environment.
At the same time, the initiative heightens geopolitical attention to where and how sensitive AI systems are hosted, how national champions partner with global hyperscalers, and how export-control regimes interact with sovereign cloud rollouts.

Recommendations and red flags for policymakers and operators​

  • Require independent security and privacy audits of sovereign controls, especially confidential compute claims, before scaling to production-critical workloads.
  • Mandate open interfaces and portability standards for HD maps and telemetry to avoid vendor lock-in and to enable multi-cloud resilience.
  • Establish clear liability frameworks that define responsibilities for software, hardware, platform operators and infrastructure failures.
  • Create transparent governance with public reporting on access requests, data uses and cross-border transfers.
  • Monitor export-control dependencies for critical hardware such as AI accelerators, and develop contingency plans to ensure compute capacity if supply chains shift.
These steps balance the benefits of rapid innovation with the responsibilities of delivering safe, sovereign services.

Next steps and likely timeline​

The announcement signals immediate activity around pilots, regulatory sandboxes and reference deployments. Typical program phases for a project of this complexity include:
  • Short-term (3–9 months): regulatory sandbox deployments, targeted pilots with limited fleet sizes and specific urban zones, security and compliance baseline testing.
  • Medium-term (9–18 months): expanded city deployments, integration with traffic management centers, initial multi-tenant operations and service-level agreements.
  • Long-term (18–36 months): full-scale production rollouts, third-party integrations, and potential export of the sovereign mobility platform model to partner nations.
Timeframes will be influenced by regulatory approvals, availability of AI compute and the pace at which independent security attestations are completed.

Conclusion​

The Space42–Core42–Microsoft Sovereign Mobility Cloud is an ambitious convergence of national policy, hyperscaler capability and operational mobility know-how. It addresses a genuine market need: a secure, compliant environment for operating autonomous systems and the rich datasets they produce. The initiative leverages real operational experience from TXAI and the technical muscle of Azure and Core42 to create a verticalised platform that could accelerate safe, governed deployment of autonomous mobility across the UAE and the wider region.
Yet ambition must be matched by rigorous governance, transparent audits and hard engineering that prevents vendor lock-in, ensures portability and protects national interests. Sovereign clouds are not a silver bullet; they are an architectural commitment that requires clear regulatory frameworks, independent verification and contingency planning for geopolitical and supply-chain risk. If the partners deliver on those foundations, the Sovereign Mobility Cloud could become a replicable model for balancing innovation and sovereignty in the AI era — but success will be measured by operational resilience, safety outcomes and the platform’s demonstrable ability to serve the public interest.

Source: Gulf Business Space42 to develop UAE’s first sovereign mobility cloud with Microsoft and Core42
 

Space42’s announcement at the Dubai World Congress marks a bold upgrade in the UAE’s mobility playbook: the company will build what it calls the nation’s first Sovereign Mobility Cloud, a sovereign-enabled platform powered by Core42’s Sovereign Public Cloud and Microsoft Azure that is intended to host HD mapping, fleet telematics, traffic management, digital twins and other critical services — all with data residency and regulatory compliance guaranteed inside the UAE.

Futuristic city under the Sovergin Mobility Cloud with drones and holographic displays.Background​

The UAE has been aggressively positioning itself as a regional leader in AI, space and next-generation transport. Space42 — the merged entity formed from Bayanat and Yahsat under the G42 umbrella — has spent 2024–2025 rolling out geospatial platforms and autonomous mobility pilots, and the Sovereign Mobility Cloud is being promoted as the next structural layer in that strategy. The project was unveiled by Space42 at the Dubai World Congress on September 24, 2025 and announced alongside partners Core42 (a G42 sovereign-cloud unit) and Microsoft Azure.
Space42 frames the platform as a “trusted” and sovereign-enabled cloud specifically designed to accelerate safe, large-scale deployment of autonomous mobility services while keeping data under UAE jurisdiction. Microsoft’s Azure stack and Core42’s local sovereign cloud capabilities will be combined to offer residency, confidential compute, and regulatory controls tailored to transport and infrastructure use cases.

What is a Sovereign Mobility Cloud?​

Defining the idea​

A Sovereign Mobility Cloud is a cloud service designed and operated so that sensitive mobility data — vehicle telemetry, passenger movement logs, high-definition (HD) maps, sensor feeds and simulation models — are stored, processed and governed under a nation’s legal and technical controls. For the UAE project, the stack has three logical layers:
  • A sovereign public cloud layer providing data residency, accredited data centers and regulated operational controls (Core42).
  • An enterprise and platform layer with mobility-specific services (HD mapping, telematics, fleet management, traffic analytics, digital twins) operated by Space42.
  • An application and ecosystem layer where government agencies, OEMs, logistics providers, researchers and integrators exchange, test and scale solutions under defined governance and sandbox rules.

Why mobility needs a sovereign layer​

Mobility systems collect personally identifiable information (PII), continuous video, LIDAR point clouds and precise location traces that, when aggregated, create a highly sensitive portrait of national movement and critical infrastructure. A sovereign mobility cloud promises:
  • Data residency: clear guarantees that datasets remain within national borders and are subject to local legislation.
  • Regulatory alignment: built-in compliance and audit paths so transport authorities can authorize pilots, data sharing and eventual commercial rollouts without ad-hoc legal work.
  • Operational assurance: local compute, secure enclaves and confidentiality tools for safety-critical workflows such as real-time control and incident forensics.

Technical architecture and partners​

Core42 + Microsoft Azure: sovereign foundation​

Core42, the G42 subsidiary specializing in sovereign cloud and AI infrastructure, provides the local sovereign public cloud, while Microsoft contributes Azure region services, confidential compute and its enterprise tooling. Core42’s public documentation and recent Microsoft-Core42 whitepaper explain the intended combination of local control with Azure’s platform capabilities — a model that aims to deliver compliance, confidential compute and performance for AI and mobility workloads.
The collaboration leverages:
  • Localized data centers and regulated technology environments operated under Core42’s frameworks.
  • Microsoft Azure’s enterprise tooling, identity services, and confidential compute options to lock down sensitive workloads.
  • Co-investment, training and technical enablement from Microsoft to seed partners and transport agencies.
Space42 will run the mobility-specific software and services (mapping, fleet ops, telematics, digital twins), coordinate regulatory sandboxing, and lead pilot deployments; Microsoft and Core42 supply the sovereign cloud, governance templates and technical support.

Platform components (expected)​

The Sovereign Mobility Cloud is being touted to host a typical mobility stack tailored for urban and autonomous systems:
  • HD mapping and map update pipelines (real‑time and offline).
  • Fleet management and telematics with live telemetry and incident logging.
  • Traffic management, simulation and digital twins for policy testing and resilience planning.
  • Secure data-sharing APIs / data clean rooms between government, industry and research nodes.

Use cases and near-term pilots​

Autonomous passenger services​

Space42’s existing autonomous taxi service, TXAI, provides the firm a ready use case and dataset for the new cloud. Space42 reports that TXAI has logged nearly 600,000 km and about 20,000 passenger trips across Abu Dhabi locations such as Saadiyat, Yas, Al Maryah and Al Reem Islands, plus Abu Dhabi Airport. Those real-world operations are the primary testbed Space42 will use to validate integrations, safety telemetry ingestion and regulatory approval workflows.

City-scale traffic management and digital twins​

The platform is designed to support digital twins that combine HD maps, live telemetry from fleets and infrastructure sensors to run traffic simulations, emergency planning and scenario testing under controlled regulatory sandboxes. Governments will be able to run fidelity-varied tests (from simple route analytics to full autnomous-stack simulations) before releases.

Research and interoperable ecosystems​

Reference deployments and test hubs are planned in partnership with UAE transport authorities to offer sandboxed environments for OEMs, academic researchers and startups to validate algorithms and safety cases without exposing production data. The program intends to attract global partners from automotive, logistics and academic sectors to scale an ecosystem around the sovereign stack.

Strengths: what this could deliver​

  • Legal clarity and trust for regulated data: By guaranteeing data residency and providing auditable controls, the Sovereign Mobility Cloud reduces legal friction for public bodies and regulated businesses to participate in autonomous mobility trials. This is a strategic advantage for government-backed pilots.
  • Faster path from pilot to production: Hosting mapping, telematics and fleet orchestration in a single sovereign environment simplifies integration, accelerates certification pathways and shortens the time required to scale successful pilots.
  • Local AI and compute for safety-critical workloads: Core42’s local GPU/AI infrastructure (NVIDIA H100/H200 availability and DGX deployments) and Azure’s confidential compute offer high-performance inferencing for real-time autonomy and model training within sovereign bounds.
  • Ecosystem leverage: Space42’s GIQ geospatial intelligence platform is already listed on Microsoft’s marketplace and Space42’s Map Africa partnership with Esri and Microsoft shows momentum in building cross-border geospatial services that can plug into the mobility cloud. That marketplace presence and previous MoUs can expedite uptake by third parties.

Risks, trade-offs and open questions​

Sovereignty vs. concentration of power​

Centralizing mobility and mapping data inside a sovereign cloud solves residency concerns but concentrates enormous operational and governance power in a small number of entities. Core42 sits inside the G42 ecosystem and Microsoft has deep commercial stake and strategic ties with G42; that combination delivers capabilities but also raises legitimate concerns about centralized control, auditability and vendor concentration. These are governance questions that require independent oversight, transparent SLAs, and strict access-control auditing.

“First” claims require caution​

Space42 calls this the UAE’s “first” Sovereign Mobility Cloud. Multiple outlets repeat that framing (Space42, industry press), but evaluating the absolute primacy of “first” requires a careful look at other sovereign cloud services and mobility platforms in the region. The claim is a marketing-forward positioning and should be treated as Space42’s stated objective rather than an uncontested historical fact.

Vendor lock-in and interoperability​

Leveraging a sovereign public cloud integrated closely with Microsoft Azure tooling offers high efficiency but raises vendor lock-in concerns for governments and mobility operators. Long-term portability of HD maps, simulation models and telemetry archives across different sovereign clouds and regional operators will be essential to avoid dependence on any single commercial stack.

Security and supply-chain exposure​

Even sovereign clouds are vulnerable to cyber threats, insider compromise and hardware/software supply chain risks. The platform’s effectiveness will hinge on independent security accreditation, continuous red-team testing, third-party audits and clear incident response agreements involving transport regulators. Core42’s deployment of high-end GPUs and localized infrastructure mitigates latency; however, it also imports complex supply-chain dependencies that must be managed and inspected.

Privacy and civil liberties​

Centralizing mobility metadata creates a rich set of analytics with consequences for surveillance and civil liberties if governance is weak. Policies for data minimization, anonymization, retention, lawful access and transparent oversight will be necessary to limit misuse. The platform must provide privacy-preserving capabilities such as purpose-bound data partitions and robust data-governance tooling as standard.

Safety, standards and liability​

Autonomous systems raise safety and liability questions that go beyond pure cloud architecture. Regulators will need to define testing thresholds, safety validation criteria and incident liability frameworks — especially when decision-support (AI-assisted) systems interact with live vehicles and public users. Sandboxes and reference deployments are positive steps, but operational safety standards, third-party verification and liability insurance regimes must follow.

Strategic and geopolitical implications​

UAE’s ambition and industrial strategy​

This initiative reinforces the UAE’s ambition to be a regional AI and mobility hub. Combining domestic sovereign-cloud capacity (Core42/G42) with a major global cloud provider (Microsoft) is an explicit strategy to import capability while retaining national control over data and operations. That model surfaces in multiple UAE initiatives — Map Africa among them — where local infrastructure and global tech partnerships coexist as an exportable stack.

Microsoft, G42 and investment context​

Microsoft’s commercial ties to G42 and investments in the group are well-documented; those relationships materially shape how Azure technologies are provisioned and marketed in parts of the Middle East. The involvement of Microsoft brings enterprise maturity and global enterprise trust, but it also embeds geopolitical and commercial complexity that regional decision-makers must manage.

Export controls and cross-border data flows​

Sovereign clouds reduce cross-border data exposure, but future cross-border collaborations (e.g., Map Africa’s continentwide basemap plans) will require careful legal and technical bridges that respect both national controls and multinational research needs. Mechanisms such as federated data models, encrypted data exchange and clear licencing frameworks will be necessary to unlock cross-border value while maintaining sovereignty.

Governance and operational recommendations​

For public bodies and enterprises evaluating participation or procurement, the following principles should guide adoption:
  • Demand independent security and privacy audits that are published to the regulator and relevant stakeholders.
  • Require portable data export formats and open APIs for HD maps, telemetry and digital twin assets to avoid long-term lock-in.
  • Insist on transparent governance: published SLAs, lawful-access transparency reporting and a multistakeholder oversight board (government, academia, civil society, industry).
  • Use privacy-by-design controls: purpose-limited data partitions, anonymization tools, retention limits, and data minimization baked into platform services.
  • Establish safety certification pathways with well-defined test thresholds, third-party verification, and documented incident/forensics procedures for autonomous systems.
  • Implement federation patterns so national clouds can interoperate with trusted external nodes under strict contractual and cryptographic controls for research and cross-border services.
These steps are practical insurance against the technological and political risks a sovereign mobility platform concentrates.

What to watch next​

  • The contents and terms of the regulatory sandboxes: whether they provide public transparency on permitted tests, safety metrics and data retention rules.
  • The technical SLAs and audit mechanisms Core42 and Microsoft publish for confidential compute, key management and access controls.
  • How the project handles third-party audits and independent verification of safety claims arising from TXAI and other pilots.
  • The terms under which Map Africa data and mobility datasets may be shared or licensed across borders, including whether national mapping agencies retain ownership and control.

Conclusion​

Space42’s Sovereign Mobility Cloud is a strategic, well-resourced attempt to build the digital backbone for next-generation transport in the UAE: a sovereign cloud foundation (Core42), enterprise-grade tooling and global platform integration (Microsoft Azure), and an operator with real-world autonomous experience (Space42/TXAI). The architecture and partnerships check many boxes — residency, compute, enterprise integration and ecosystem outreach — and the plan to combine regulatory sandboxes with reference deployments is the right operational posture for safety-critical mobility applications.
Yet the programme’s promise depends on governance as much as on technology. Centralization of mobility data creates powerful opportunities for efficiency and resilience, but it also concentrates risk — from vendor lock-in and supply-chain exposure to privacy, civil‑liberties and geopolitical concerns. Independent audits, open interfaces, clear liability rules and robust, transparent regulation will determine whether the Sovereign Mobility Cloud becomes a practical blueprint for trusted autonomy — or a cautionary example of centralized control dressed as sovereignty. The initial announcements and the lineup of partners suggest the UAE has the political will and the industrial partners to make the platform work; execution and oversight will decide whether it becomes a new global benchmark or simply another regional cloud project with high aspirations.

Source: SatellitePro ME Space42 to create UAE’s first Sovereign Mobility Cloud - SatellitePro ME
 

Space42 has announced plans to build what it calls the UAE’s first Sovereign Mobility Cloud, a dedicated, sovereign-enabled cloud platform for smart mobility and autonomous systems that combines Space42’s operational mobility stack with Core42’s Sovereign Public Cloud and Microsoft Azure to keep mobility data and workloads inside the UAE while accelerating pilots, mapping, fleet operations and regulatory sandboxes.

Futuristic cityscape with a holographic AI cloud, glowing blue interfaces, and flying vehicles.Background / Overview​

Space42 unveiled the initiative on the sidelines of the Dubai World Congress for Self‑Driving Transport, positioning the platform as a purpose-built, sovereign environment for critical mobility workloads: HD mapping, telematics ingestion, fleet operations, traffic management and digital twins. The stated goal is to provide a trusted platform that allows government agencies, industry and research partners to share data securely under UAE jurisdiction while making it easier to move from research and pilots into regulated commercial rollouts.
The project assembles three visible pieces:
  • Space42 (the applications, HD mapping, digital‑twin and mobility operator layer).
  • Core42 (the G42‑affiliated sovereign cloud and controls plane marketed as a Sovereign Public Cloud and governance/control layer).
  • Microsoft Azure (the hyperscale compute, storage, confidential compute primitives and ecosystem enablement).
This announcement builds on multiple prior initiatives: Space42’s geospatial AI platform GIQ is listed on the Microsoft (Azure) Marketplace, and the firm recently joined Microsoft and Esri in the Map Africa Initiative to produce continental base maps — moves designed to show both operational product readiness and global ambition.

Why a “Sovereign Mobility Cloud” — strategic rationale​

Sovereignty meets mobility requirements​

Autonomous systems and smart‑mobility platforms generate enormous volumes of sensitive, location‑specific data: raw sensor feeds (video, LIDAR, radar), telematics, passenger trips and high‑definition map tiles. These datasets are both commercially valuable and politically sensitive, because aggregated traces can reveal critical infrastructure patterns and personal movement. Placing the stack in a sovereign‑enabled cloud aims to:
  • Guarantee data residency and compliance with national laws.
  • Offer auditable governance and fine‑grained administrative separation.
  • Use confidential compute for workloads where even operators cannot see plaintext data during training or analysis.

Operational advantages for low‑latency mobility services​

Sovereign clouds hosted in‑country reduce network latency for real‑time map updates, fleet telemetry and teleoperation lanes. For city‑scale traffic management and safety‑critical operations, deterministic latency and local redundancy matter — a combination that Azure’s UAE regions plus a locally operated sovereign stack is intended to deliver.

Technical architecture — how the stack fits together​

Layered architecture (high level)​

The announced architecture follows a three‑layered pattern commonly used for sovereign deployments:
  • Infrastructure layer — Azure UAE regions providing hyperscale compute, storage, networking and availability zones.
  • Sovereignty control plane — Core42 Insight (the governance and policy layer) that enforces residency, admin separation, audit and compliance guardrails.
  • Application and ecosystem layer — Space42 services (GIQ, HD map pipelines, fleet operations, digital twins), plus partner applications and research sandboxes.

Key technical building blocks​

  • Confidential compute (hardware-backed enclaves) for multi-party model training and sensitive analytics so raw citizen or proprietary data isn't exposed to cloud administrators.
  • Streaming ingestion and telemetry pipelines (e.g., Azure Event Hubs / Kafka equivalents) for high‑throughput LIDAR/camera and telematics feeds used by perception and fleet analytics.
  • HD map versioning and distribution, with semantic version control and delta updates to vehicle fleets to avoid inconsistent map states.
  • Model governance: experiment tracking, model registries and explainability artifacts to meet regulator audit requirements.

What the Sovereign Mobility Cloud promises to host and enable​

  • HD mapping and localization services that are essential to Level 3/4 autonomous operations.
  • Fleet management and telematics analytics (health telemetry, routing, OTA updates).
  • Traffic management and city digital twins to run simulations, scenario testing and emergency response planning.
  • Secure, controlled data‑sharing environments and regulatory sandboxes for co‑development and testing between government and private operators.
Microsoft, per the announcement, will supply Azure platform services, training and co‑investment; Core42 provides the sovereign control layer; Space42 will lead application deployment and coordinate pilots and regulatory engagement. This division of responsibilities is intended to blend hyperscaler scale with local operational control.

Evidence and public record — what’s verifiable now​

  • Space42 published a press release announcing the Sovereign Mobility Cloud and naming Core42 and Microsoft Azure as core partners.
  • Independent regional outlets reported the announcement and summarized the platform’s capabilities as a sovereign, mobility‑focused cloud.
  • Core42 (a G42 company) has publicly positioned itself as a sovereign cloud provider for the UAE and published whitepapers and news about collaborations with Microsoft and vendors like AMD and NVIDIA for AI compute. Microsoft and Core42 have also jointly produced material explaining "sovereign‑enabled" public clouds.
  • Space42’s geospatial AI platform GIQ is listed on the Azure Marketplace, demonstrating that at least some of Space42’s software is already packaged for Azure customers.
  • The Map Africa Initiative (Space42, Microsoft, Esri) is documented by Esri and Space42, supporting the claim that this partnership activity is ongoing beyond the mobility cloud announcement.

TXAI: Space42’s operational track record — numbers and caveats​

Space42 cites TXAI, its autonomous taxi service, as operational experience underpinning the Sovereign Mobility Cloud. The company’s materials claim the fleet has logged roughly 600,000 km and about 20,000 passenger trips since 2021, operating across Saadiyat, Yas, Al Maryah and Al Reem Islands and Abu Dhabi Airport.
Independent reporting from regional media provides a similar but not identical set of operational figures: some outlets reported TXAI had logged 430,000–450,000 km and 30,000+ trips in coverage earlier in 2025, while Space42/parent materials use slightly different aggregated numbers. That divergence suggests the metrics are updated over time and that press figures may have been captured at different cut‑off dates. Treat operational numbers as useful indicators of scale and experience, but verify exact figures against the company's audited disclosures or regulator‑validated logs if precision is required.

Strengths — why this could matter​

  • Domain specialization: A mobility‑focused sovereign cloud is tailored to the unique needs of autonomous systems — map cadence, telemetry ingestion and rapid simulation — so it is more than a generic government cloud.
  • Operational proof points: Space42’s TXAI service provides live fleet data, live testing zones and a practical testbed for validation, enabling the platform to be tested against real-world operations.
  • Ecosystem leverage: Microsoft brings mature platform tooling, Azure region presence and confidential compute; Core42 brings local governance and control frameworks; Space42 brings mobility apps and geospatial intelligence. The partnership blends commercial scale and local sovereignty.
  • Regulatory facilitation: The plan explicitly includes regulatory sandboxes, reference deployments and test hubs — critical mechanisms for safely moving from trials to commercial services in high‑liability domains.

Risks, trade‑offs and open questions​

Vendor concentration and lock‑in​

Concentrating HD maps, telemetry, model registries and fleet control in a single sovereign stack—especially one that layers Core42 governance on top of Azure—raises vendor lock‑in risks. Portability of critical artifacts (map formats, model weights, telemetry schemas) must be contractually guaranteed to avoid future migration headaches.

Independent verification and auditability​

Claims about confidential compute, access controls and administrative separation should be validated via third‑party security audits and transparent audit trails. Operators and regulators must be able to verify that "sovereign" controls function as promised — including evidence that privileged cloud administrators cannot access protected data.

Resilience and supply‑chain dependencies​

Sovereign clouds still depend on global hardware (AI accelerators, networking equipment) and software supply chains. Export controls or component shortages can impact compute capacity for large model training or inference. Programs should include contingency plans for compute capacity and supply‑chain risk.

Geopolitical scrutiny and transparency​

Large sovereign players (G42/Core42) partnering with hyperscalers invite geopolitical scrutiny. Transparent governance, clear contracts, and documented access request procedures are necessary to maintain international trust and assure partners and customers.

Safety, liability and standardization​

For safety‑critical autonomy, the cloud is one element in a larger system that includes vehicle software, perception stacks and fail‑safe behaviour. The platform will need clear liability frameworks that delineate responsibilities for software faults, map errors and infrastructure outages. Standards for HD map formats, telemetry schemas and model interchange will help avoid brittle integrations.

Policy and procurement recommendations (for CIOs, transport authorities and buyers)​

  • Require independent security and privacy audits of the sovereign controls and confidential compute claims before onboarding mission‑critical services.
  • Mandate open formats and portability clauses for HD maps, model registries and telemetry exports to reduce lock‑in risk.
  • Include service continuity SLAs and multi‑region redundancy plans to reduce single‑vendor failure exposure.
  • Build public reporting obligations for data‑access requests and cross‑border data flows to improve accountability.
  • Ensure clear liability, insurance and incident response playbooks that allocate responsibility across cloud provider, sovereign operator and application owner.

Market context — where this fits in the global sovereign cloud trend​

The Space42–Core42–Microsoft announcement is part of a larger regional strategy where governments pair hyperscaler platforms with local sovereign operators to gain both scale and control. Core42 has publicly positioned itself as a sovereign‑cloud provider and has made strategic moves (hardware partnerships, confidential compute messaging) consistent with delivering regulated workloads in the UAE. Microsoft has similarly articulated frameworks to enable sovereign‑enabled clouds, combining local controls with Azure’s platform services. These moves reflect a global trend: countries want access to AI infrastructure and hyperscaler capabilities while retaining legal and operational control over critical datasets.
The Map Africa Initiative and GIQ’s Azure Marketplace listing indicate Space42 is pushing both national and exportable offerings: national infrastructure (sovereign cloud + TXAI) and international projects (Map Africa) that leverage the same geospatial / AI toolset. That suggests a commercial play to make sovereign‑enabled mobility and geospatial services exportable to partners in Africa and beyond.

Short‑term roadmap and expected milestones​

Public communications list the next steps as:
  • Establishing regulatory sandboxes and reference deployments with UAE transport authorities.
  • Building testing hubs and piloting integrations for HD mapping, fleet orchestration and traffic management.
  • Engaging global partners in automotive, academic and technology domains to scale the ecosystem.
Typical program timelines (industry‑standard expectations) are:
  • 3–9 months: sandbox deployments and targeted pilots.
  • 9–18 months: expanded city deployments and multi‑tenant operations.
  • 18–36 months: broader production rollouts and potential export of the sovereign mobility model. These timeframes depend on regulator approvals, independent security attestations and availability of AI compute capacity.

Critical analysis — strengths balanced against realistic caveats​

The concept of a Sovereign Mobility Cloud is strategically compelling: it addresses a real need (data residency, regulatory auditability) while leveraging the necessary technical enablers (confidential compute, Azure regions, local governance). Space42’s operational track record with TXAI and the GIQ platform gives the partnership practical assets to showcase during pilots. Microsoft’s involvement provides enterprise tooling, and Core42’s sovereign controls speak directly to the UAE’s policy priorities.
However, execution matters more than announcement. The technical claims around confidential compute and administrative separation require independent verification. The platform design must avoid single‑vendor lock‑in for critical artifacts. And procurement should embed transparency and contingency planning so that the sovereign mobility platform genuinely serves public interest rather than becoming a closed garden. Those conditions determine whether the Sovereign Mobility Cloud becomes a pioneering, replicable model — or a costly, brittle national silo.

What to watch next​

  • Publication of independent security and privacy audits validating the Core42 + Azure confidentiality and separation claims.
  • Concrete pilot results from regulatory sandboxes showing latency, uptime and model governance in operational conditions.
  • Detailed SLA and portability clauses in commercial offers that demonstrate practical mitigation of vendor lock‑in.
  • Updated, regulator‑verified operational metrics for TXAI (kilometres, trips, incident logs) to ground claims about readiness and safety. Note the publicly reported numbers vary by outlet and date, so follow regulator statements or Space42’s audited filings for final figures.

Conclusion​

Space42’s Sovereign Mobility Cloud represents a logical and timely experiment at the intersection of national sovereignty, cloud scale and autonomous mobility. If implemented with transparent governance, independent verification and clear portability guarantees, the platform could lower friction for regulators and accelerate safe deployment of autonomous vehicles and intelligent transport systems in the UAE and potentially beyond.
Yet the most important work begins now: turning a strategic announcement into a resilient, auditable and operable platform that balances innovation with accountability. For transport authorities, CIOs and mobility operators evaluating this offering, the next steps must be technical diligence, contractual safeguards and insistence on independent evidence that sovereign controls work as advertised — only then will a sovereign mobility cloud be more than a promise and become the backbone of the next generation of safe, trusted urban mobility.

Source: BroadcastPro ME Space42 to create UAE’s first Sovereign Mobility Cloud
 

Back
Top