Data-centric security.

When encryption and key management are combined, your data is secure at all times. Leading companies in the financial and telecommunications sectors are among our most satisfied customers, as are small and medium-sized enterprises. We guarantee compliance with all industry standards and compliance requirements.

✔️ Pay-as-you-use or project-based

✔️ No restriction in the use

✔️ Completely transparent for users

✔️ Security concept with separation of powers

  • Applications & Databases

    In standard applications or self-developed solutions and databases, the data is encrypted and safe from unauthorized access.

  • Secure cloud computing

    The secure way to the cloud. From the moment the data leaves the company, it is protected.

    • Project-based or as-a-service

  • Protect documents

    Persistent file encryption and complete control and visibility over usage and access across all platforms.

  • Test Data Management

    Anonymized test data creation for safe use. Sensitive data remains protected at all times in compliance with the law.

  • Encrypted communication

    Transparent end-to-end encryption of documents, emails, and attachments for complete data security and confidentiality.

  • Information Governance

    Locate, classify and manage documents such as structured and unstructured data - including data deletion.

  • Key-Management

    Securely manage your keys for cloud applications, regardless of the application, cloud provider, or service used.

    • Project-based or as-a-service

  • Tailored data security

    Design, implementation, and consulting for your projects with high demands and requirements for data security.

At your service

Security solutions, with no restrictions on use, no infrastructure of your own, and no internal know-how? Prewen takes over the complete data security for you. We will be happy to present our offer to you anytime - learn more about the future of data security and how you benefit from it.

In 4 phases to future-proof data security


1 — Proof of concept

 
  • Selection of the application (local or cloud)

  • Installation of the encryption solution

  • Definition of the fields to be protected

  • Definition of encryption formats

  • Integration of the selected application

  • Initial encryption of the data

  • Application test with the application


2 — Data Security Design

 
  • Service Description

  • Solution architecture

  • Encryption concept

  • Integration of applications

  • Testing

  • Operation


3 — Implementation

 
  • Establishment of encryption and HSM infrastructure

  • Integration of existing security and monitoring solution

  • Implementation of encryption formats

  • Connection to AD and other directory services

  • OnBoarding of application(s)

  • Integration of wildcard search

  • Initial encryption

  • Handover to the operations organization


4 — Operation

 
  • Updates and patches

  • Operational support (out-tasking)

  • Operation of the entire service (out-sourcing)

  • Backup and recovery

  • 24 × 7 on-call
    Audit support (documentation, compliance)

«We are fortunate to have had Prewen as an experienced integration partner right from the start.»

Dr. Klaus Brand, Product Manager, Swisscom Security Products and Services

Guaranteeing security by segregation of powers 

The encryption and the access keys are stored and protected independently. This guarantees that in the event of illegal access, the data is only available in encrypted form at all times and is thus unusable for misuse. 

 With Encryption-as-a-Service, we offer a managed security service in which the hardware security module (HSM) and the encryption solution are operated in a secure Swiss data center. In this way, the highest level of protection can be guaranteed despite outsourcing.