Data-centric security.
When encryption and key management are combined, your data is secure at all times. Leading companies in the financial and telecommunications sectors are among our most satisfied customers, as are small and medium-sized enterprises. We guarantee compliance with all industry standards and compliance requirements.
✔️ Pay-as-you-use or project-based
✔️ No restriction in the use
✔️ Completely transparent for users
✔️ Security concept with separation of powers
-
Applications & Databases
In standard applications or self-developed solutions and databases, the data is encrypted and safe from unauthorized access.
-
Secure cloud computing
The secure way to the cloud. From the moment the data leaves the company, it is protected.
• Project-based or as-a-service
-
Protect documents
Persistent file encryption and complete control and visibility over usage and access across all platforms.
-
Test Data Management
Anonymized test data creation for safe use. Sensitive data remains protected at all times in compliance with the law.
-
Encrypted communication
Transparent end-to-end encryption of documents, emails, and attachments for complete data security and confidentiality.
-
Information Governance
Locate, classify and manage documents such as structured and unstructured data - including data deletion.
-
Key-Management
Securely manage your keys for cloud applications, regardless of the application, cloud provider, or service used.
• Project-based or as-a-service
-
Tailored data security
Design, implementation, and consulting for your projects with high demands and requirements for data security.
At your service.
Security solutions, with no restrictions on use, no infrastructure of your own, and no internal know-how? Prewen takes over the complete data security for you. We will be happy to present our offer to you anytime - learn more about the future of data security and how you benefit from it.
In 4 phases to future-proof data security
1 — Proof of concept
Selection of the application (local or cloud)
Installation of the encryption solution
Definition of the fields to be protected
Definition of encryption formats
Integration of the selected application
Initial encryption of the data
Application test with the application
2 — Data Security Design
Service Description
Solution architecture
Encryption concept
Integration of applications
Testing
Operation
3 — Implementation
Establishment of encryption and HSM infrastructure
Integration of existing security and monitoring solution
Implementation of encryption formats
Connection to AD and other directory services
OnBoarding of application(s)
Integration of wildcard search
Initial encryption
Handover to the operations organization
4 — Operation
Updates and patches
Operational support (out-tasking)
Operation of the entire service (out-sourcing)
Backup and recovery
24 × 7 on-call
Audit support (documentation, compliance)

«We are fortunate to have had Prewen as an experienced integration partner right from the start.»
Dr. Klaus Brand, Product Manager, Swisscom Security Products and Services
Guaranteeing security by segregation of powers
The encryption and the access keys are stored and protected independently. This guarantees that in the event of illegal access, the data is only available in encrypted form at all times and is thus unusable for misuse.
With Encryption-as-a-Service, we offer a managed security service in which the hardware security module (HSM) and the encryption solution are operated in a secure Swiss data center. In this way, the highest level of protection can be guaranteed despite outsourcing.