The Blog
Here’s what we want to talk about.
In a critical, controversial, progressive way.

Writing about what moves us.
What moves the IT world? What moves companies? What moves us?
We go ahead and open up new perspectives. Join the discussion.
Data Residency V – Encryption in a Multi-Cloud
If you use multiple cloud services connected in one sequence of a business process, we speak of multi-cloud usage. There are good chances that the same data and cloud services will be used in several of your company’s business processes. Congratulations – you’ve internalized the cloud. And our condolences – you have reached the highest level of complexity for data protection.
The biggest business risks under control
Cyber attacks, business interruptions, loss of reputation – consistent IT security measures help to combat the greatest risks for Swiss companies. The solutions of the e3 offer comprehensive protection from a single source.
The exponential increase in the number of cyber attacks is giving Swiss companies sleepless nights , as confirmed by the Allianz Risk Barometer 2022. In its annual survey, the insurer asks companies around the world where they suspect the greatest business risks.
I know what you’re listening to
It’s that time of year again – and I’m not talking about the omnipresent «Jingle Bells» tunes, the ugly Christmas sweaters or the useless junk that magically turns into the perfect present – or so we are told.
No, it’s the time of year when Spotify presents us our personal «Wrapped year-in-review». Recorded down to the minute of listening, listed in categories, ranking our personal favourites. And holding a mirror up to us: tell me what music you listen to, and I’ll tell you who you are.
Data Residency IV – How does encryption work?
In the fourth part of our series on data residency, we discuss the different encryption techniques and highlight their pros and cons. Messages and information have been encrypted since ancient times. However, modern times set new requirements. For maximum protection, the encryption must take place as close as possible to the user: Encryption must be user-friendly, operate transparently and ensure a high level of operational reliability.
Data Residency III – Data Encryption: Why It Matters
There are only limited ways to protect data appropriately. Actually, there are only two basic principles that ensure the necessary data protection: you lock up the data and/or you encrypt it. However, we are convinced that only strong, fully-restricted encryption provides the necessary data protection and enables compliance that allows us to sleep peacefully in order to securely exchange data with each other as individuals, companies or public institutions.
Data Residency II – When local data storage is no longer automatically secure
Data residency: An important and not to be ignored topic – also referred to as “data localization” or “data sovereignty”. If a company that works with sensitive data takes data security seriously, then it is important to carefully examine the data residency laws and their consequences for data security. These rules enforce data storage location requirements – across different jurisdictions and geographical areas – in order to protect them against unauthorized access. But is this protection really sufficient?
Data Residency I – Are local data centers really safe?
If your data is distributed internationally or even globally across several locations, a targeted analysis of the applicable laws and regulations with regard to these locations is mandatory. Then you are also in the middle of a new challenge: Data Residency.
Digital transformation in the government
Digitalization opens up completely new opportunities for the federal government, the cantons and the communities to provide their services in a customer-oriented manner and to optimize cooperation between the authorities and the business community. Here you can find out how e3 AG is helping to shape digitalization in public administration in a goal-oriented manner.
Cooperation
Data Leak Prevention systems provide good functionality to reduce the unintended outflow of data via
prevent e-mail. But how should internal emails be verified?
The right one hasn’t been found yet? Browse our exciting archiveand read what moved us earlier. Many items have not lost their validity.