loader image

The Blog

Here’s what we want to talk about.
In a critical, controversial, progressive way.

Writing about what moves us.

What moves the IT world? What moves companies? What moves us?
We go ahead and open up new perspectives. Join the discussion.

Data Residency V – Encryption in a Multi-Cloud

Data Residency V – Encryption in a Multi-Cloud

If you use multiple cloud services connected in one sequence of a business process, we speak of multi-cloud usage. There are good chances that the same data and cloud services will be used in several of your company’s business processes. Congratulations – you’ve internalized the cloud. And our condolences – you have reached the highest level of complexity for data protection.

read more
The biggest business risks under control

The biggest business risks under control

Cyber attacks, business interruptions, loss of reputation – consistent IT security measures help to combat the greatest risks for Swiss companies. The solutions of the e3 offer comprehensive protection from a single source.
The exponential increase in the number of cyber attacks is giving Swiss companies sleepless nights , as confirmed by the Allianz Risk Barometer 2022. In its annual survey, the insurer asks companies around the world where they suspect the greatest business risks.

read more
I know what you’re listening to

I know what you’re listening to

It’s that time of year again – and I’m not talking about the omnipresent «Jingle Bells» tunes, the ugly Christmas sweaters or the useless junk that magically turns into the perfect present – or so we are told.

No, it’s the time of year when Spotify presents us our personal «Wrapped year-in-review». Recorded down to the minute of listening, listed in categories, ranking our personal favourites. And holding a mirror up to us: tell me what music you listen to, and I’ll tell you who you are.

read more
Data Residency IV – How does encryption work?

Data Residency IV – How does encryption work?

In the fourth part of our series on data residency, we discuss the different encryption techniques and highlight their pros and cons. Messages and information have been encrypted since ancient times. However, modern times set new requirements. For maximum protection, the encryption must take place as close as possible to the user: Encryption must be user-friendly, operate transparently and ensure a high level of operational reliability.

read more
Data Residency III – Data Encryption: Why It Matters

Data Residency III – Data Encryption: Why It Matters

There are only limited ways to protect data appropriately. Actually, there are only two basic principles that ensure the necessary data protection: you lock up the data and/or you encrypt it. However, we are convinced that only strong, fully-restricted encryption provides the necessary data protection and enables compliance that allows us to sleep peacefully in order to securely exchange data with each other as individuals, companies or public institutions.

read more
Data Residency II – When local data storage is no longer automatically secure

Data Residency II – When local data storage is no longer automatically secure

Data residency: An important and not to be ignored topic – also referred to as “data localization” or “data sovereignty”. If a company that works with sensitive data takes data security seriously, then it is important to carefully examine the data residency laws and their consequences for data security. These rules enforce data storage location requirements – across different jurisdictions and geographical areas – in order to protect them against unauthorized access. But is this protection really sufficient?

read more
Digital transformation in the government

Digital transformation in the government

Digitalization opens up completely new opportunities for the federal government, the cantons and the communities to provide their services in a customer-oriented manner and to optimize cooperation between the authorities and the business community. Here you can find out how e3 AG is helping to shape digitalization in public administration in a goal-oriented manner.

read more
Cooperation

Cooperation

Data Leak Prevention systems provide good functionality to reduce the unintended outflow of data via
prevent e-mail. But how should internal emails be verified?

read more

The right one hasn’t been found yet? Browse our exciting archiveand read what moved us earlier. Many items have not lost their validity.