Digital Transformation.
Powered by Security.

Don't have an account yet? Register now to make sure you don't miss any news and to access exclusive content for professionals.
2025 is a special year for e3: e3 AG is 25 years old! Since 2000, we have stood for high-quality IT security - as the foundation for a secure digital future. Current developments show more clearly than ever: IT security remains a key prerequisite for sustainable digital success.
This also includes tackling new strategic issues at an early stage. With our new focus on Cloud governance we support boards of directors and management teams in actively managing cloud usage - minimizing risks, exploiting opportunities and securing corporate goals.
At the same time, our latest customer stories show how companies have worked with e3 to strengthen their digital security in the long term.
This year, we are once again bringing information protection managers together: On September 18, 2025, we are organizing the Symantec Customer Event for German-speaking Switzerland in Zurich. Make a note of the date today!
We are also planning an event for French-speaking Switzerland this year - we are currently still looking for a host. Interested companies are cordially invited to contact us. report.
What is behind it and why is it not a security
strategy?
How boards of directors can and must shape digital success.
How must information security be practiced in the future? A review and insight.
Cybercrime adapts its strategy. How can companies protect their data?
What is behind it and why is it not a security
strategy?
How boards of directors can and must shape digital success.
How must information security be practiced in the future? A review and insight.
Cybercrime adapts its strategy. How can companies protect their data?
We believe that cyber risks cannot be outsourced - and responsibility certainly cannot. Instead of investing in effective IT security, the risk is "negotiated away". We call this practice legal washing - the attempt to conceal cyber risks with formal compliance, while real security mechanisms fall by the wayside.
The problem: in an emergency, cyber criminals are not stopped by general terms and conditions or any liability clauses. What really protects is a rethink - towards zero trust data security.
Zero Trust follows the principle "Trust no one, check everything". Every access must be authenticated, every identity checked and every authorization strictly limited - regardless of whether it comes from your own network or from outside. There is no alternative to this approach, especially in cloud environments.
Legal washing is no substitute for a security strategy, because contracts do not prevent attacks. The risks remain. And with them the liability.
What companies need instead:
New business opportunities through controlled cloud innovations
Technical protective measures - Prevention works better than paragraphs.
Resilient systems - Those who are prepared remain capable of acting.
Real cyber security cannot be defined by contract. It begins with a well thought-out IT security strategy and is reflected in an infrastructure that reliably secures data, systems and access.
With Centraya Zero Trust can be realized where it counts: at data level - with complete control over encryption, keys and context-based access rights.
This creates real security: traceable, enforceable and independent of cloud providers.
Cloud technologies are changing business models - and opening up new opportunities for companies. But those who only use the cloud without defining clear rules and objectives are wasting potential. Boards of directors have a key role to play here: with targeted cloud governance, they can not only manage risks, but also set the company on a strategic course for success.
Cloud governance creates clear rules and structures that enable innovation, increase efficiency and ensure data sovereignty. It combines technology with business objectives - and thus becomes the basis for sustainable corporate success.
Every healthcare facility has individual challenges. Our Explorer Workshop is the first step towards an all-round secure IT environment. With 25 years of experience and established solutions in the areas of Data Loss Prevention (DLP) and Zero Trust Data, we ensure that you are always one step ahead of cyber risks.
New business opportunities through controlled cloud innovations
Better basis for decision-making thanks to transparent data and IT structures
Greater resilience to regulatory requirements, technological changes and market risks
Cloud governance creates clear rules and structures that enable innovation, increase efficiency and ensure data sovereignty. It combines technology with business objectives - and thus becomes the basis for sustainable corporate success.
Every healthcare facility has individual challenges. Our Explorer Workshop is the first step towards an all-round secure IT environment. With 25 years of experience and established solutions in the areas of Data Loss Prevention (DLP) and Zero Trust Data, we ensure that you are always one step ahead of cyber risks.
How do companies consistently implement data protection, compliance and zero trust in the cloud today?
At the roundtable in Luxembourg at the end of April, organized by ITnation (by MAKANA) and ArrowCISOs from leading financial and insurance companies discussed their current challenges in information protection - openly, practically and at eye level.
With their sound practical knowledge, Marius van der Valk and Thomas Fürling from e3 contributed valuable input to the discussion - in particular on zero trust in the cloud and current challenges relating to data protection, data security posture management (DSPM) and data loss prevention (DLP). Her input was met with great interest by the panel and provided important food for thought for dealing with complex security issues.
Would you like to be part of the next exchange?
Cyber attackers are moving in a new direction: they are no longer encrypting systems - they are stealing them. Their target is sensitive data, which they use to blackmail or sell.
This development makes it clear that companies need to realign their security strategies. It is no longer enough to simply control access to systems - the data itself must also be actively protected. What is needed is a multi-layered approach that detects attacks, prevents data loss and minimizes the impact of potential incidents.
Traditional protective measures are no longer sufficient. Only the combination of DLP and strong Encryption creates holistic protection:
DLP prevents confidential information from flowing out uncontrolled
Encryption ensures that even stolen data remains unreadable
Both together significantly reduce the risk of blackmail and damage to image
With e3 DLP and Centraya, we offer companies seamless protection for sensitive data: DLP prevents unwanted leakage, while encryption based on the zero-trust principle ensures that stolen information remains unusable. Our solutions integrate seamlessly into any IT architecture - flexible, scalable and future-proof.