Newsletter #8

by May 12, 2025e3, Centraya, Cloud Computing, DLP, Zero Trust

2025 is a special year for e3: e3 AG is 25 years old! Since 2000, we have stood for high-quality IT security - as the foundation for a secure digital future. Current developments show more clearly than ever: IT security remains a key prerequisite for sustainable digital success.

This also includes tackling new strategic issues at an early stage. With our new focus on Cloud governance we support boards of directors and management teams in actively managing cloud usage - minimizing risks, exploiting opportunities and securing corporate goals.

At the same time, our latest customer stories show how companies have worked with e3 to strengthen their digital security in the long term.

This year, we are once again bringing information protection managers together: On September 18, 2025, we are organizing the Symantec Customer Event for German-speaking Switzerland in Zurich. Make a note of the date today!

We are also planning an event for French-speaking Switzerland this year - we are currently still looking for a host. Interested companies are cordially invited to contact us. report.

Featured in this newsletter

1

Legal Washing

What is behind it and why is it not a security
strategy?

2

Cloud governance

How boards of directors can and must shape digital success.

3

Roundtable Luxembourg

How must information security be practiced in the future? A review and insight.

4

Data in our sights

Cybercrime adapts its strategy. How can companies protect their data?

1

Legal Washing

What is behind it and why is it not a security
strategy?

2

Cloud governance

How boards of directors can and must shape digital success.

3

Roundtable Luxembourg

How must information security be practiced in the future? A review and insight.

4

Data in our sights

Cybercrime adapts its strategy. How can companies protect their data?

Only Zero Trust Data Security is a future-proof concept for protecting your sensitive data.

Legal washing: Why contracts
are not a security strategy

We believe that cyber risks cannot be outsourced - and responsibility certainly cannot. Instead of investing in effective IT security, the risk is "negotiated away". We call this practice legal washing - the attempt to conceal cyber risks with formal compliance, while real security mechanisms fall by the wayside.

The problem: in an emergency, cyber criminals are not stopped by general terms and conditions or any liability clauses. What really protects is a rethink - towards zero trust data security.

Zero Trust follows the principle "Trust no one, check everything". Every access must be authenticated, every identity checked and every authorization strictly limited - regardless of whether it comes from your own network or from outside. There is no alternative to this approach, especially in cloud environments.

What legal washing overlooks

Legal washing is no substitute for a security strategy, because contracts do not prevent attacks. The risks remain. And with them the liability.
What companies need instead:

New business opportunities through controlled cloud innovations

Technical protective measures - Prevention works better than paragraphs.

Resilient systems - Those who are prepared remain capable of acting.

Real cyber security cannot be defined by contract. It begins with a well thought-out IT security strategy and is reflected in an infrastructure that reliably secures data, systems and access.

Paper does not protect data - encryption does

With Centraya Zero Trust can be realized where it counts: at data level - with complete control over encryption, keys and context-based access rights.
This creates real security: traceable, enforceable and independent of cloud providers.

Cloud governance: boards of directors
shape digital success

Cloud technologies are changing business models - and opening up new opportunities for companies. But those who only use the cloud without defining clear rules and objectives are wasting potential. Boards of directors have a key role to play here: with targeted cloud governance, they can not only manage risks, but also set the company on a strategic course for success.

What makes cloud governance possible

Cloud governance creates clear rules and structures that enable innovation, increase efficiency and ensure data sovereignty. It combines technology with business objectives - and thus becomes the basis for sustainable corporate success.

Why boards of directors must actively shape cloud governance

Every healthcare facility has individual challenges. Our Explorer Workshop is the first step towards an all-round secure IT environment. With 25 years of experience and established solutions in the areas of Data Loss Prevention (DLP) and Zero Trust Data, we ensure that you are always one step ahead of cyber risks.

New business opportunities through controlled cloud innovations

Better basis for decision-making thanks to transparent data and IT structures

Greater resilience to regulatory requirements, technological changes and market risks

How boards of directors set the right course

Cloud governance creates clear rules and structures that enable innovation, increase efficiency and ensure data sovereignty. It combines technology with business objectives - and thus becomes the basis for sustainable corporate success.

Why boards of directors must actively shape cloud governance

Every healthcare facility has individual challenges. Our Explorer Workshop is the first step towards an all-round secure IT environment. With 25 years of experience and established solutions in the areas of Data Loss Prevention (DLP) and Zero Trust Data, we ensure that you are always one step ahead of cyber risks.

Setting the course for the future:
Review of the roundtable
on information security

How do companies consistently implement data protection, compliance and zero trust in the cloud today?

At the roundtable in Luxembourg at the end of April, organized by ITnation (by MAKANA) and ArrowCISOs from leading financial and insurance companies discussed their current challenges in information protection - openly, practically and at eye level.

With their sound practical knowledge, Marius van der Valk and Thomas Fürling from e3 contributed valuable input to the discussion - in particular on zero trust in the cloud and current challenges relating to data protection, data security posture management (DSPM) and data loss prevention (DLP). Her input was met with great interest by the panel and provided important food for thought for dealing with complex security issues.

Would you like to be part of the next exchange? 

Data in our sights: How DLP and
Encryption to protect your company

Cyber attackers are moving in a new direction: they are no longer encrypting systems - they are stealing them. Their target is sensitive data, which they use to blackmail or sell.

This development makes it clear that companies need to realign their security strategies. It is no longer enough to simply control access to systems - the data itself must also be actively protected. What is needed is a multi-layered approach that detects attacks, prevents data loss and minimizes the impact of potential incidents.

Why DLP and encryption are now indispensable

Traditional protective measures are no longer sufficient. Only the combination of DLP and strong Encryption creates holistic protection:

DLP prevents confidential information from flowing out uncontrolled

Encryption ensures that even stolen data remains unreadable

Both together significantly reduce the risk of blackmail and damage to image

The IT security solutions from e3 protect your data comprehensively

With e3 DLP and Centraya, we offer companies seamless protection for sensitive data: DLP prevents unwanted leakage, while encryption based on the zero-trust principle ensures that stolen information remains unusable. Our solutions integrate seamlessly into any IT architecture - flexible, scalable and future-proof.

Subscribe to our newsletter

Dieses Feld dient zur Validierung und sollte nicht verändert werden.