Request Demo

Frequently asked questions about eperi® sEcure and industry-specific data protection solutions

On this page you will find comprehensive answers to the most frequently asked questions about the eperi® sEcure encryption solution and find out how our product optimally supports your company in implementing data protection-compliant cloud strategies. With eperi® sEcure, you can securely protect sensitive information in the cloud - be it for personal customer data, financial transactions or business-critical information.

Use the two buttons below to go directly to the information that interests you most:

  • Product FAQ: All the details about eperi® sEcure - from functionality and integration to compliance and security issues.
  • Industries FAQ: Industry-specific data protection solutions for finance, healthcare and public administration.

This FAQ is dedicated to the product-specific details of eperi® sEcure: You will learn how eperi® sEcure works and what specific advantages it offers for your IT security. We explain the simple integration into existing systems as well as the various options for complying with national and international data protection standards such as the GDPR, the DORA standard and other industry-specific requirements.

You will also find information on the use of eperi® sEcure in various industries, including finance, healthcare and public administration. For each of these sectors, we highlight the particular challenges in data protection and show how eperi® sEcure offers customized solutions to effectively protect and control sensitive data in highly sensitive areas.

Product FAQs for eperi® sEcure - Your solution for data protection and cloud security

The eperi® sEcure product FAQs provide comprehensive answers to all important questions about our powerful encryption solution and its application in your company. Here you can find out how eperi® sEcure protects data and the many benefits encryption offers for the security and trust of your customers.

The questions are clearly structured and cover all important areas:

  • General information and benefits of eperi® sEcure - Here you can find out which data can be protected and why eperi® sEcure encryption is essential for companies that value data security and compliance.
  • Implementation and technical deployment - Learn about the benefits and easy integration of eperi® sEcure into your IT environment and find out about the technical details of implementation.
  • Compliance and security measures - Discover how eperi® sEcure helps you to comply with industry-specific and international data protection regulations such as GDPR and DORA and which additional security measures are integrated.
  • Use cases and flexibility - Find out more about specific areas of application and how eperi® sEcure can be used flexibly with common business and IT applications.
  • Licensing, pricing and frequently asked questions - Here you will find information on the licensing model, costs and answers to frequently asked questions and concerns.

These FAQs will help you to fully understand the benefits and possible applications and take data protection in your company to the next level.

General Information

  • Which sensitive data can be secured with eperi® sEcure?

    Sensitive data that can be protected by eperi® sEcure includes

    • Personal data of employees, customers, patients, clients, citizens as well as pupils and students (e.g. names, addresses, dates of birth, medical information, financial data, credit card numbers, intellectual property).
    • Company-relevant data, such as parameters for machine and production control systems, power plants, generators, transformers, drives and data on control and regulation technology.
    • Data for research and product development, including recipes, calculations, analyses and mixing ratios.
    • Research and scientific data.
    • Data of political or public relevance.
  • What are the advantages of encryption with eperi® sEcure?
    • eperi® sEcure helps organizations implement a cloud-first strategy while providing true data protection and compliance in public cloud environments.
    • The solution enables flexible, scalable and targeted data security with non-disruptive encryption, without significant limitations in functionality or speed.
    • eperi® sEcure ensures that the use of cloud services complies with data protection regulations – regardless of the location of the cloud operator, whether in the EU or worldwide.
    • Companies retain full control over their encryption and keys, ensuring true data sovereignty vis-à-vis leading cloud providers.
    • The focus is on data-centric security that provides protection even if the system boundary (perimeter) has been breached.
    • eperi® sEcure enables proactive security measures that prevent damage and loss, as opposed to concepts that only focus on recovery or emergency response.
    • Encryption can be customized at field level. This means that the entire data set does not have to be protected, which is often associated with losses in system performance, user-friendliness and high costs.
    • With eperi® sEcure, the protection of your data is comprehensive and permanent – both during transfer to the cloud and during storage within the cloud.
  • Why is data so valuable for companies and how does eperi® sEcure support?

    Data is the backbone of modern, growth-oriented companies, as it serves as the basis for important business decisions – from market analysis to product development and internal processes. Therefore, the protection of this data is essential. eperi® sEcure provides the necessary technical protection to encrypt this valuable data according to the latest standards and protect it from unauthorized access.

  • For whom is eperi® sEcure particularly relevant?
    • For companies that do not want to give up their data security and want to use applications from the public cloud or store them in cloud environments.
    • For companies with a “cloud-first” or “cloud-only” strategy.
    • For organizations that rely on global and decentralized data storage
    • For companies and organizations in highly regulated industries that are subject to the requirements of DORA (Digital Operational Resilience Act) or KRITIS (Critical Infrastructure), for example
    • For organizations that must comply with EU directives such as NIS 2 (Strengthening Protection against Cyberattacks)
    • For companies that follow the requirements of BaFin (German Federal Financial Supervisory Authority).
    • For professionals who are legally obliged to maintain professional secrecy, as stipulated in Section 203 of the German Criminal Code (violation of private secrets).
  • How does eperi® sEcure help to increase the value of the company and enhance its credibility for customers and investors?

    Improving insurance ratings: eperi® sEcure can positively influence the rating of both corporate cyber insurance and D&O (Directors & Officers) insurance, as the encryption of data is under the company’s own control.

    Relief for the management: In the event of data theft or misuse (data breaches), the data is protected according to the current state of the art. This means that the management fulfills its duty of care and is relieved of personal liability (including private assets).

    Legal claim for damages: According to the German Trade Secrets Protection Act (GeschGehG), damages can only be claimed if the data is protected by appropriate technical measures. Without such measures, the protected status as a trade secret is revoked and there is no legal claim.

  • Why cloud? The advantages of cloud applications
    • Flexibility and adaptability: Companies can scale IT resources quickly and thus react flexibly to market changes - a decisive factor for rapid growth.
    • Relief for IT experts: By using the cloud, IT teams can be relieved of day-to-day tasks, which creates space for strategic developments.
    • High system availability: Fail-safe architectures and operation by specialized experts guarantee stable system availability.
    • Predictable costs: The business models of large cloud providers offer transparent, controllable and predictable cost structures.
    • Flexible license models: Software-as-a-Service subscriptions enable flexible adaptation of usage according to company requirements.
  • What protection goals are achieved with eperi® sEcure?
    • Confidentiality: eperi® sEcure ensures that sensitive data is only accessible to a limited group of recipients and is not passed on in an unwanted way.
    • Integrity: Data remains protected from unauthorized access and administrators can only see encrypted information, which minimizes the risk of misuse.
    • Data integrity: Ensuring the correctness and consistency of data, as required by the GDPR. Encryption prevents data from being passed on or manipulated. In the event of changes by third parties, decryption is not possible, making illogical data records visible.

Implementation and technical deployment

  • What advantages does eperi® sEcure offer for IT system administration?
    • Flexible ecosystem: eperi® sEcure offers protection for various applications and use cases and is scalable at any time. The central administration of the encryption solution is clear and efficient.
    • Simple implementation: The solution does not require installation in the applications to be protected or on the clients, which simplifies the implementation process.
    • Seamless user experience: eperi® sEcure can be integrated without user training, as the use of the protected apps remains unchanged.
    • Proxy-based approach: eperi® sEcure is the only solution in the world that enables encryption and tokenization without a client application, allowing flexible use in almost all IT infrastructures.
    • Support for multi-cloud environments: eperi® sEcure works in multi-cloud scenarios, e.g. cloud-to-cloud, on-premises-to-cloud and cloud-to-on-premises.
    • Compatibility with RMS/IRM systems: The solution supports rights management systems such as Active Directory/Entra ID without additional rights management.
  • Technical questions on implementation and data management
    • Encryption of existing data: Existing unencrypted data can be encrypted during the implementation phase either directly by eperi® sEcure or in combination with third-party backup and restore solutions.
    • Need for backups: A backup system is also recommended for eperi® sEcure to ensure the security and recovery of data.
    • Data recovery: The recovery of data is similar to that of unencrypted data, provided a complete backup is available.
    • Restoring eperi sEcure: Requires a complete database backup including keys, configuration and tokens. After importing the backup, the system can be restored.
    • Exit strategy: In the event of an exit, the encrypted data can be decrypted and restored to the target environment as clear data.
    • Data from retired users: Encrypted data from retired users does not need to be handled specially, as all authorized users can continue to decrypt this data.
  • Implementation period and procedure
    • Implementation time: Once a software subscription has been taken out, installation and configuration can be completed within a few hours, provided the IT infrastructure is in place. An assisted system setup is recommended for a smooth implementation.
    • Recommended approach: A supervised implementation project with support from system experts is advisable. Experience shows that implementation takes around four weeks, depending on customer-specific requirements.
    • Setup package: Includes software licenses and support from system experts for successful system installation, data migration, testing and user acceptance prior to go-live.
  • Operating and availability models of eperi® sEcure
    • Installation variants: eperi® sEcure can be installed and operated by the customer, with the option of support from system experts during implementation. Subsequent operation takes place independently, supported by maintenance services and support.
    • Hosted variant: eperi® sEcure can be hosted in a secure environment on dedicated or virtual machines, which is an option for companies that want to avoid having their own IT infrastructures.
    • Software as a Service (SaaS): eperi® sEcure is available as a SaaS solution offered by partners with appropriate service and availability agreements.
    • High-availability version: A high-availability version is possible, either as a SaaS solution via partners or as an independently operated solution with failover cluster architecture. In this version, components such as proxy and load balancer are installed and distributed multiple times.
  • Is eperi® sEcure an “out of the box” solution or a developer tool?

    Out-of-the-box protection offers eperi® sEcure for:

    • M365 SharePoint: Encryption of document libraries and list box content.
    • M365 OneDrive: Encryption of file content and protection of data flows to and from the cloud.
    • M365 Teams: Protection of chat messages, attachments (in conjunction with SharePoint and OneDrive) and calendar data (in conjunction with Outlook).
    • M365 Outlook/Exchange: Encryption of emails (subject, content, attachments) and calendar entries.
    • M365 Planner & ToDo: Protection of task names, notes, checklists and attachments.
    • ServiceNow: Protection of personal and customer-related data in reports, contacts and files.
    • HubSpot: Protection of all data provided via API, e.g. contacts and marketing campaigns.
    • HRWorks: Protection of sensitive profile data, e.g. names, addresses and bank details.
    • Atlassian Trello: Encryption of task titles, descriptions and personal names.
    • Personio: Protection of personal data, e.g. names and birthdays.
    • Salesforce: Selective encryption of personal data and contacts.

    In addition, with the eperi® sEcure Software Development Kit (SDK), we offer our partners the opportunity to independently develop new adapters to connect additional cloud platforms and open up new business opportunities. The SDK offers exclusive API access to our patented technology and thus enables the development and maintenance of additional templates for individual application scenarios.

  • What can a project path for implementation look like?
    • Interest and inquiry: An initial exchange with eperi experts clarifies the protection objective, the technical requirements and the schedule.
    • System demonstration: A live administration demo can be shown on request.
    • System setup: The system setup with active support from experts serves as the basis for efficient implementation. The duration varies according to requirements and is agreed individually.
    • Go-live and productive operation: After implementation, operation can be carried out independently by the customer or via a managed service partner. Maintenance and support are provided by the license subscription.

Compliance and security measures

  • Which regulations and laws doeseperi® sEcure help with?
    • EU Cyber Resilience Act: A draft law to improve cyber resilience, which sets out binding security requirements for products with digital elements.
    • Trade Secrets Protection Act (GeschGehG): Companies are obliged to take technical confidentiality measures, as only protected information is legally recognized as a trade secret.
    • International and national data protection regulations (GDPR/DSGVO):
      • Art. 32 GDPR: Requires measures such as pseudonymization and encryption according to the state of the art.
      • Art. 25 GDPR: Requires data protection through technology design and data protection-friendly default settings.
      • Recital 78 GDPR: Describes “data protection by design” and “data protection by default”.
    • § Section 64 BDSG (Federal Data Protection Act): Emphasizes the importance of pseudonymization and anonymization as a protective measure.
    • § Section 203 StGB: Regulates the violation of professional secrets and concerns, for example, doctors, lawyers and other professionals.
    • Resilience measures against third country laws: For example, the US “Cloud Act”, which regulates access to data by US authorities.
    • NIS 2 Directive: EU directive to improve protective measures against cyberattacks, in force since January 2023
    • Schrems II: ECJ ruling declaring the Privacy Shield agreement invalid. Companies must now increasingly use measures such as encryption to comply with data protection standards.
    • IT Security Act and IT Security Act 2.0: Protection of critical infrastructures and companies in the public interest.
  • Which technical requirements are met by eperi® sEcure and what does it achieve?
    • Integration of external users: Internal and authorized external users can be securely integrated into communication and collaboration, depending on the respective app and use case.
    • Additional security layer: eperi® sEcure provides an independent security layer that ensures complete data sovereignty, unlike cloud provider solutions where the provider could have access to keys and clear data.
    • Data protection in the event of data leaks: In the event of a data leak, encrypted data remains unusable by unauthorized parties, minimizing potential damage.
    • Protection against ransomware: eperi® sEcure does not cause any additional restrictions. In combination with a separate data backup, ransomware encryption can be bypassed.
    • Sovereignty and key sovereignty: Data sovereignty remains with the company. The encryption process, keys and clear data remain under the control of the data owner or a trusted partner.
    • Metadata management: Metadata remains unencrypted to maintain the integrity and functionality of the cloud apps. This ensures that services such as Microsoft 365 remain fully usable.
    • Key management: New keys can be generated at any time to meet the requirements for cryptographic key management, such as those prescribed in DORA. Data that has already been encrypted remains decryptable, while new data uses the latest key.
    • Key replacement in the event of compromise: If a key is compromised, a new key can be generated and the process for securing the data can be carried out.
    • Protection against unauthorized access by administrators: Strict role separation allows administrators of the database and the gateway to have different rights so that only encrypted data can be viewed. An even higher level of security is achieved by distributing the master key to different people or by using a hardware security module (HSM).
  • What is the current threat situation? Why is the use of eperi® sEcure particularly important?

    The threat of cyberattacks has increased significantly in recent years due to political changes and increasing digital networking, which is confirmed by reports and statistics from organizations such as the BKA or Forbes.

    Proactive security measures are now more important than ever for data owners to ensure the security of their data and meet data protection requirements. The real-time processing of user data in online services can entail risks due to unauthorized access if this data is not adequately protected. Data leaks can occur unintentionally or intentionally and often have serious consequences.

    The importance of encryption: The ECJ decision “Schrems II” has tightened the legal framework for the transfer of sensitive data to countries outside the EU, in particular the USA. The adequacy decision of July 10, 2023 on data transfers to the USA also leaves open legal uncertainties. Companies should therefore rely on technical protection measures such as encryption in order to retain control over their data and meet the requirements.

    Further risks and threats:

    • Third country laws such as the US Cloud Act allow US authorities to access data. This poses a significant risk, especially in politically turbulent times.
    • Employees of the cloud operator could gain unauthorized access to data if it has not been encrypted or pseudonymized in advance.
    • Attacks during transmission: Data that is transferred between the client and the cloud is susceptible to man-in-the-middle attacks.
    • Limits of IT perimeter protection: Traditional protection is often not enough to guarantee data sovereignty, especially when accessed by external service providers.
  • What are the risks of not using eperi® sEcure?
    • Loss of reputation: A loss or misuse of data can cause considerable damage to the company’s reputation.
    • Penalties and fines: Data breaches can result in large fines.
    • Loss of D&O insurance cover: The management is personally liable if it has not fulfilled its duty of care and has not taken sufficient protective measures. In this case, D&O insurance cover may also lapse.
    • Loss of cyber insurance cover: Many cyber insurance policies require preventive protective measures, such as state-of-the-art encryption. If these are missing, the insurance cover may lapse in the event of a claim.
  • Does eperi® sEcure replace the cloud’s own security measures or does it supplement them?
    • Use of Microsoft Defender: Microsoft Defender can still be used on end devices, as the data there is unencrypted. However, unencrypted data is required for Microsoft Defender for Office 365 in order to implement security measures. Trusted third-party products can be used for additional protection.
    • Advantages over Microsoft Double Key Encryption (DKE): DKE can lead to functional limitations, e.g. for search functions, malware scanners, data loss prevention, mail forwarding rules and other functions. eperi® sEcure enables the retention or partial use of these functions and at the same time supports the integration of trusted third-party products.
    • Additional layers of security: The use of eperi® sEcure provides more comprehensive data sovereignty as the encryption process remains completely under the control of the data owner, unlike cloud solutions where vendors could have access to the keys.
  • What happens in the event of data loss or attacks?
    • Data leaks: Encrypted data protected by eperi® sEcure remains unusable for unauthorized persons in the event of a data leak, which significantly reduces the potential damage.
    • Ransomware attacks: eperi® sEcure does not adversely affect existing backup solutions. A separate backup process can be used to restore data in the event of an emergency.
    • Data sovereignty: With eperi® sEcure, data control remains with the data owner, including key management.

Use cases

  • Which use cases does eperi® sEcure cover?
    • Microsoft Outlook: Encryption of emails (subject line, content, attachments) and calendar entries (title, description, attachments) to protect against administrators of the cloud provider and cyber criminals.
    • Microsoft SharePoint: Encryption of files and documents.
    • Microsoft OneDrive: Storage of files from local clients in encrypted form.
    • Microsoft Teams: Encryption of chat messages, files and channels.
    • Websites: Encryption of contact forms, especially for cloud-based CRM systems such as Salesforce or HubSpot.
    • Machine-to-machine communication: Encryption of data for synchronizing customer accounts and orders between web stores and cloud-based ERP systems.
    • Test database management: Generation of auditable cloud data for tests to simulate real-life scenarios and protect sensitive data from internal and external developers (e.g. for DORA requirements)
    • IoT applications: Protecting cloud-to-cloud integrations for product, supplier, production and R&D data.
    • Marketing tools: Encryption and pseudonymization of email addresses in campaigns to protect them from cloud providers.
    • MSSQL database: Encryption of sensitive data to selectively control access by DB administrators.
    • Company data for different locations: Encryption of files and documents to anonymize or pseudonymize sensitive PII data depending on the legal background.
    • HR applications (e.g. HRWorks and Personio): Protection of personal data (name, addresses, bank details, insurance details) from administrators and cyber criminals.
    • HubSpot: Encryption of personal and customer-related data from contacts, reports and marketing campaigns.
    • ServiceNow: Protection of personal and customer-related data from contacts, production data and files.
    • Atlassian Trello: Protection of personal and customer-related data in task titles and descriptions.
    • Salesforce: Selective encryption of personal and customer-related contact data in order to continue using operational data as plain text for analyses.
  • What data is encrypted in the individual solutions?
    • M365 SharePoint: Encryption of file content and list items (including attachments).
    • M365 OneDrive: Protection of file content, including during data transfer using native functions.
    • M365 Teams: Encryption of chats, attachments and calendar content.
    • M365 Outlook/Exchange: Encryption of emails and calendar content (subject, description, attachments).
    • M365 Planner & ToDo: Protection of tasks and notes.
    • ServiceNow: Protection of contacts, reports and production data.
    • HubSpot: Encryption of personal data in contacts and campaigns.
    • HRWorks: Protection of profile data and master data.
    • Atlassian Trello: Encryption of task information.
    • Personio: Protection of employee data.
    • Salesforce: Protection of personal data at field level.
    • Test data: Encryption of test data in databases such as MSSQL, mySQL, Oracle etc. to ensure protection against unauthorized access during tests.
  • Can eperi® sEcure also be used for applications not listed?

    Yes, the eperi® sEcure SDK API can be used to develop individual solutions for specific requirements. This enables customized security solutions and strengthens customer loyalty as well as service models for IT experts.

  • Other myths and prejudices:
    • Complexity and performance: eperi® sEcure is user-friendly and does not noticeably affect performance.
    • Costs and resources: Encrypted data does not require significant storage resources and the solution is cost-efficient.
    • Independence: The customer retains full control over the master key, which ensures a high level of security and data protection.

Licensing, pricing and frequently asked questions

  • How does eperi® sEcure help me to minimize costs and risks?
    • Improved insurance rating: eperi® sEcure can positively influence the rating of both corporate cyber insurance and D&O (Directors & Officers) insurance, as the encryption of data is under the company’s own control.
    • Relief for management: In the event of data theft or misuse (data breaches), the data is protected according to the current state of the art. This means that the management fulfills its duty of care and is relieved of personal liability (including private assets).
    • Legal claim for damages: According to the German Trade Secrets Protection Act (GeschGehG), damages can only be claimed if the data is protected by appropriate technical measures. Without such measures, the protected status as a trade secret is revoked and there is no legal claim.
  • How is the eperi® sEcure license model structured?
    • Trial versions: eperi® sEcure is only available in combination with licenses and implementation support at fair prices to ensure fast and error-free installation and configuration.
    • Flexibility of the technical infrastructure: Licenses are independent of the infrastructure and can be installed on dedicated hardware or virtual machines. The use of Docker technologies, different operating systems and cluster setups for redundancy are also possible. Multiple tenants can be used.
    • Scalability and flexibility: The license model allows a small-scale selection of user licenses and offers flexible terms (12, 24 or 36 months).
    • Flexible payment plans: The subscription model allows different payment options.
    • No high upfront investment: The license model is structured as a subscription, eliminating high upfront costs.
    • Transparent and simple structure: There are no complex license conditions; the licenses scale according to the number of users and the applications to be protected. Additional modules do not cause any additional costs or license complexity.
  • What prices does eperi® sEcure have?

    Pricing structure: The prices are based on license fees per user and app adapter for the respective cloud application to be protected. The price per user decreases as the number of users increases.

    Industry-specific models: There is a standardized price list, but special partner relationships, resellers and specific industries are taken into account via a consistent discount policy.

  • Critical opinions on eperi® sEcure and responses to them
    • Single point of failure: To avoid this, a high-availability SaaS solution can be implemented via partners or an independently operated failover cluster. The software components such as proxy and load balancer are distributed redundantly across different machines.
    • Digital correspondence with external partners: Communication with external business partners remains possible. For example, emails reach external recipients unencrypted via Outlook and external users can be invited to chats in Teams.
    • Circumvention of security measures by users: IT administrators can set local restrictions to manage the devices, and access can be restricted in cloud applications via conditional access policies.
    • Feature restrictions: eperi® sEcure places great emphasis on maximum data security while maintaining the familiar functionality of the applications, including content-based search functions, collaboration and identification and authentication of users and roles.
  • What are the myths and prejudices about data encryption and eperi® sEcure?
    • „Cloud providers promise comprehensive security“: However, they do not protect against their own administrators.
    • „Search functions are not possible with encrypted data“: With special techniques that use substitute values for metadata, the search function is retained with the eperi® sEcure search index.
    • „Encryption brings complexity and effort for the user“: Encryption runs in the background and does not affect the user.
    • „Encryption makes collaboration more difficult“: Modern solutions such as eperi® sEcure enable seamless collaboration without compromising data security.
    • „Encryption leads to performance losses“: eperi sEcure has shown no measurable performance losses in tests and in productive use.
    • „Encryption requires a lot of storage space“: The encrypted data or replacement values do not generate a significant increase in data size.
    • „Protection against the manufacturer required“: eperi® sEcure can be operated independently. The data owner has sole access to the master key, not the manufacturer.
    • „Third-party scanners for content filtering and malware protection cannot be used“: Third-party scanners can be implemented within the data stream.
    • „Email forwarding rules do not work“: Client-side rules work because the data is available in plain text; server-side rules are based on unencrypted content.
    • „Backup and migration tools do not work“: Encrypted backups and migrations are possible with eperi® sEcure, e.g. with Veem-Backup or Quest.
    • „There is no need for third-party encryption solutions“ : Application providers such as Microsoft DKE offer solutions, but with access options by cloud operators. Only independent solutions such as eperi® sEcure guarantee true data sovereignty.
    • „Data encryption is always an ‚all or nothing‘ approach“: eperi® sEcure enables selective encryption at field level.

eperi® sEcure: Secure data in all cloud and web applications

Explore the comprehensive functions and benefits of eperi® sEcure in our product overview. Find out how our innovative encryption solution helps companies protect sensitive data and meet compliance requirements worldwide.

Person sitzt vor dem Laptop und überprüft Daten auf dem Laptop und Smartphone

Industries FAQ on eperi® sEcure - Data protection solutions for finance, healthcare and the public sector

In our Industries FAQ, we answer specific questions about the use of eperi® sEcure in the financial, healthcare and public sectors. Each of these industries faces unique challenges when it comes to protecting sensitive data in cloud environments. eperi® sEcure offers tailored security solutions that not only meet strict compliance requirements such as DORA, PCI DSS, HIPAA and GDPR, but also ensure effective protection against unauthorized access.

Find out more about the comprehensive security functions and high flexibility of our product, which enables secure and efficient use of the cloud for financial service providers, medical facilities and public institutions.

Finance

  • How does eperi® sEcure support compliance with financial regulations such as DORA and PCI DSS?

    eperi® sEcure helps financial institutions meet regulatory data security requirements such as DORA or PCI DSS by protecting sensitive data through robust yet function-preserving encryption and tokenization. These technologies ensure that personal data and financial transactions are processed and stored securely without jeopardizing compliance with these stringent regulations.

  • What are the particular challenges of data encryption in the financial sector?

    The financial sector faces specific challenges such as the need to process large volumes of highly sensitive data while strictly adhering to data security regulations. eperi® sEcure enables companies to encrypt data without compromising user experience or performance, which is critical to ensuring smooth financial transactions.

  • How does eperi® sEcure protect financial transactions in the cloud?

    eperi® sEcure protects financial transactions in the cloud by encrypting sensitive data before it reaches the cloud environment. Even if the cloud providers have access to the data, it remains unreadable thanks to the encryption, which minimizes the risk of data loss or misuse.

  • Why is encryption essential for banks and financial institutions?

    Banks and financial institutions process enormous amounts of sensitive information, from customer data to transaction data. Encryption is essential to ensure that this information cannot be accessed without authorization in the event of a security incident. With eperi® sEcure, banks can not only protect this data, but also comply with regulatory requirements worldwide.

  • How does eperi® sEcure help to minimize insider threats in the financial sector?

    eperi® sEcure minimizes insider threats by ensuring that only authorized users can access decrypted data. Even employees within a company do not have direct access to sensitive data if they are not authorized. This prevents insiders from viewing or passing on sensitive information without authorization.

  • What advantages does eperi® sEcure offer for securing payment data?

    eperi® sEcure offers robust encryption and tokenization technologies that effectively secure payment data. These technologies anonymize sensitive data and protect it from unauthorized access, which is particularly important for compliance with regulations such as PCI DSS.

  • How does eperi® sEcure support the protection of sensitive customer data at financial service providers?

    Financial service providers benefit from eperi® sEcure’s ability to protect sensitive customer data through encryption before it leaves the internal systems and reaches the cloud applications. This ensures that personal data cannot fall into the wrong hands, even in the event of a data leak.

  • How can eperi® sEcure help with compliance with the EU General Data Protection Regulation (GDPR) in the financial sector?

    eperi® sEcure enables financial institutions to meet the requirements of the GDPR by protecting personal data through encryption and pseudonymization. By ensuring that sensitive data is not accessible to unauthorized parties, companies can avoid penalties for violating the GDPR.

  • How does data encryption affect the performance of financial applications?

    eperi® sEcure is designed not to affect the performance of financial applications, although data remains encrypted during transmission, storage and use. The solution is specifically optimized for the requirements of the financial sector and offers seamless integration that ensures both security and efficiency.

Healthcare

  • How does eperi® sEcure support compliance with healthcare regulations such as §203 StGB, HIPAA and GDPR?

    eperi® sEcure ensures compliance with regulations such as §203 StGB, HIPAA and the GDPR in healthcare by protecting electronic patient records and other sensitive healthcare data through encryption. This ensures that the confidentiality, integrity and availability of the data are maintained.

  • Why is the encryption of electronic patient records (EPRs) crucial in healthcare?

    Electronic patient records (EPRs) contain extremely sensitive information that can have serious consequences if data is leaked. Encrypting ePAs with eperi® sEcure ensures that this data is only accessible to authorized persons, even if the systems are attacked.

  • How does eperi® sEcure protect sensitive patient data in cloud-based systems?

    eperi® sEcure protects sensitive patient data in the cloud by ensuring that this data is encrypted before it is transferred to the cloud. This approach is state of the art. As a result, the data remains secure and inaccessible to third parties even if the cloud platform is compromised.

  • What role does eperi® sEcure play in securing telemedicine platforms?

    Telemedicine platforms process and transmit sensitive health data in real time. eperi® sEcure protects this data with robust, function-preserving encryption so that both patients and doctors can be confident that their communications and data are secure.

  • What are the specific challenges of data encryption in the healthcare sector?

    One of the biggest challenges is to ensure that encryption does not have a negative impact on the user experience and speed of applications. eperi® sEcure is designed to overcome these hurdles by providing fast and efficient encryption without compromising medical workflows.

  • How can eperi® sEcure help prevent data breaches in the healthcare sector?

    eperi® sEcure helps prevent data breaches by ensuring that all sensitive data is encrypted so that no readable information is exposed even in the event of a security incident. This protects patient information and reduces the risk of financial penalties due to data leaks.

  • How does eperi® sEcure support compliance with regional and international health regulations?

    eperi® sEcure helps healthcare organizations comply with regional and international data protection regulations by providing flexible, cross-platform encryption. This is crucial, as requirements can vary in different countries and regions.

  • How easy is it to integrate eperi® sEcure into existing healthcare systems?

    The integration of eperi® sEcure into existing systems is simple and does not require extensive changes to existing IT structures. It can be seamlessly integrated into cloud platforms and on-premise systems already in use so as not to disrupt ongoing operations.

  • Which healthcare applications can be protected with eperi® sEcure?

    A wide range of healthcare applications can be protected with eperi® sEcure, including electronic patient records (ePAs), telemedicine platforms and laboratory information systems. The solution provides comprehensive protection for all data processed in these applications.

Public Sector

  • How does eperi® sEcure support compliance with data protection regulations in the public sector?

    eperi® sEcure helps public sector organizations to comply with national and international data protection regulations by protecting sensitive data through encryption. This is crucial for compliance with laws such as the GDPR or specific regulations such as the NIS2 directive.

  • Why is data security particularly important in the public sector?

    In the public sector, highly sensitive citizen data is often processed, which can have serious consequences if lost or misused. eperi® sEcure ensures that this data is protected by advanced encryption technologies, which strengthens citizens‘ trust in government services.

  • How does eperi® sEcure protect sensitive data in the cloud?

    eperi® sEcure protects data in the cloud by encrypting it before it is transferred to the cloud environment. Even if cloud providers or external third parties have access to the data, it remains secure and unreadable.

  • What role does eperi® sEcure play in protecting citizen data in the public sector?

    Citizen data is particularly worth protecting as it contains personal information that could be misused for identity theft and other criminal activities. eperi® sEcure protects this data through strong encryption, thus ensuring trust in public authorities.

  • How can eperi® sEcure help to ensure the security of cloud-based management applications?

    eperi® sEcure ensures the security of cloud-based management applications by providing an additional layer of security that ensures sensitive information is encrypted before it is transmitted to the cloud. This protects against potential threats such as data loss.

  • What are the particular challenges of data encryption in the public sector?

    One of the biggest challenges in the public sector is to ensure that encryption solutions can cope with the often complex and outdated IT infrastructures. eperi® sEcure offers flexible solutions that can be easily integrated into existing systems without disrupting their operation.

  • Which public cloud services can be secured with eperi® sEcure?

    Public cloud services such as e-government platforms, citizen portals and administrative applications can be secured with eperi® sEcure. The solution ensures that sensitive data is encrypted before it is uploaded to these services, providing an additional layer of security.

  • How can eperi® sEcure ensure the security of data in the context of smart city projects?

    Smart City projects are based on the collection and processing of large amounts of personal data. eperi® sEcure protects this data with robust encryption so that it remains inaccessible even in the event of a security incident. This ensures a high level of data security in smart city solutions.

Data security and compliance in regulated industries

Discover how eperi® sEcure is specifically tailored to the requirements of the financial, healthcare and public sectors. Visit our industry page to find out how our solutions support the protection of sensitive data in your industry while ensuring compliance with strict data protection regulations.

DNA Strang

Newsletter

Sign up for our newsletter and receive regular updates on data protection topics, changes in legislation and the further development of eperi® sEcure.