eperi sees two key trends for 2025

AI and new regulations such as NIS2 & DORA will shape cyber security in 2025. eperi sheds light on how companies can proactively prepare for these trends.
Guidelines for secure and function-preserving data encryption in companies

Data encryption is essential for IT security and compliance. The new white paper from eperi highlights current challenges, regulatory requirements and best practices for the secure encryption of sensitive data.
eperi expands partner network and signs cooperation agreement with ndaal

eperi, a leading provider of encryption technology, is entering into a strategic partnership with the IT consulting company ndaal. Together, they will support companies in implementing secure data protection strategies for the cloud. The collaboration focuses on compliance and the protection of sensitive data using the eperi sEcure encryption solution.
eperi encrypts personnel data in the cloud to preserve functionality

With eperi sEcure, eperi now offers secure cloud data protection for HR applications such as Personio, HRworks and CGM ISIS MED. Thanks to innovative encryption and tokenization, sensitive personal data remains protected at all times, even if traditional IT security fails. Only the company has access to the encryption keys – cloud providers or app providers have no access to the data.
IT security standards depend on the size of a company

A recent eperi survey reveals that large companies share their encryption keys more frequently with cloud providers, while smaller companies insist on internal key access. Despite the high risks, a significant proportion of the IT companies surveyed entrust their keys externally. eperi calls for comprehensive education on the secure handling of sensitive encryption keys and emphasizes that data access in the hands of third parties is like an open front door key.
eperi encrypts digital identities of health insurance policyholders in the cloud

eperi gives millions of policyholders secure access to their digital identities and insurance data. By integrating modern encryption and individual user keys into a leading verification platform, users’ data and identities remain protected. The solution meets the strict requirements of the healthcare sector and simplifies the digital patient record.
Industries disagree on encryption

A recent survey by eperi reveals that only 30% of retail companies in Germany encrypt sensitive data, while 67.5% in other sectors use this protection. Legal certainty with regard to NIS2 is particularly important for the retail sector. Andreas Steffen, CEO of eperi, emphasizes the need for increased awareness of effective encryption techniques in order to close data protection gaps.
The masters of encryption: business decision-makers

A recent survey by eperi shows that 87.5% of business decision-makers make the encryption of sensitive data a top priority. While banks and insurance companies achieve high levels of encryption, there are differences between industries and between management and IT professionals in their assessment of the level of protection. Managing Director Andreas Steffen emphasizes the importance of encryption for protection against cybercrime and compliance with legal regulations.
Encryption of 100 percent of all web applications with REST protection

With eperi’s REST protection solution, companies secure sensitive data in web applications with 100% encryption. This innovative technology enables data protection and at the same time ensures the unrestricted usability of data without additional development effort or changes to existing applications.
Working securely in the public sector with Microsoft 365 email and calendar data

Working securely in the public sector with Microsoft 365 email and calendar data The eperi solution encrypts sensitive Microsoft 365 data and users retain their usual work efficiency and application functions Pfungstadt, April 18, 2024 – For public sector organizations and systemically important utilities that fall under KRITIS guidelines, the rules for data security are […]

