Protect Your Business with
e3 Cyber Security
Highly Mature Cyber Security Solutions
Why choosing e3?
Protecting your success
We help safeguard not just your data, but also your company's achievements and growth.
20 years of cyber security expertise
In over 2 decades, we have successfully implemented over 100 cyber security solutions within the group, at e3 Cyber Security within it's existence of 2 years, has concluded already more than 10 projects.
We reduce the operational DLP costs up to 80%
Using our e3 DLP Platform, we are able to reduce your incident management costs for a DLP system up to 80%. Furthermore is e3 DLP one of the only platforms allowing customers to manage incidents from different detection platforms, such as Broadcom / Symantec, Forcepoint, Microsoft Purview or Trellix (former McAfee).
Centraya makes your data secure - even in the cloud - and returns the security control into your hands
Our high-end encryption system Centraya, completely developed by our swiss engineering team, is a leading CASB / CDPG system primarily designed for cloud and multi-cloud service usage. Having Centraya in place, your data in the cloud is yours again and you must not simply trust the provider for it's security.
Analysis
Risk Analysis - Among others: What sensitive data (Information Assets) you need to protect, which are the risky channels in scope etc.
Proof of Concept - Which solution fits best your needs
Requirements Analysis - Based on the Risk Analysis and Result of the Proof of Concept a detailed High Level Design for the implementation
Execution
In the execution phase our delivery team, consisting of a senior project manager, security architect and system engineer will implement the solution together with your specialists and stakeholders.
Managed Services
e3 not only offers maintenance and support for the delivered solutions, but also managed service contracts for DLP policy and incident management
Information Asset
One of the most important aspects is to understand, what assets the security solution shall protect.Protection Goal
In the protection goals, we define, what the security solution shall achieve on a high level, i. e. "Blocking customer leaks on the e-mail channel" or "Blocking copy action of credit card data to local drive"Policy Management
The policy management uses the defined assets and protection goals to define the actual policies in the security solutionData Logistics
The data dogistics implements all requried additional data for the solution to operate and to automate possible incident response actions.Incident Management
The workflow definitions to remediate the incidents most efficiently. Using the e3 DLP solution you may implement different models, such as Self Service, Fan-in / Fan-out, inner circle etc.Infrastructure Architecture
The infrastructure setup is the detail design of the integration of the security solution.
The e3 DLP solution enables a single-point-of-control for incidents from different DLP solutions, such as Symantec or MS Purview. It works as follows:
Vendor scanner detects a DLP violation on a specific channel, i. e. E-Mail
Vendor-specific incident response actions are processed
e3 DLP connector reports the incident to the e3 backend
Pre-Processing the case (incident) is executed, i. e. whitelist check, waiver check, duplicate match cleansing etc. - including automatic release or reject of e-mails depending on the result
Stakeholder assignment as per Workflow definition in e3 DLP
Notification of the assigned stakeholders
Manual remediation process of the case, which includes release / final reject of e-mails using an enhanced Mail Quarantine and Release solution from e3
Reminder notifications for pending DLP cases
Reporting during the remediation phase
Case closure, Archiving and Housekeeping
Remediation-Workflow (= Manual Remediation)
Remediation workflow enables to remediate cases exactly to the need of the client (centralized, decentralized, one step, two steps, multiple steps); all configurable (e.b. based on channel, severity, classification, etc.)
Processing (= Automated Remediation)
Preprocessing: enrich incident data and create cases
Processing: automated risk evaluation and remediation
Postprocessing: decide whether a manual remediation needs to be done and allocate the case to the correct workflow
Sync Tool (= Vendor Connector)
Detect new incidents in native management console incl. all relevant evidences
Upload Scan results and evidences from native tool to e3 DLP
currently supported vendors:
Broadcom/Symantec, McAfee/Trellix, Forcepoint, MicrosoftPersist data in e3 DLP and apply advanced workflow processing
On the left you see what authorized users see
Who ever accesses your data, must be routed through
the Centraya infrastructureThen they will be presented the data as normal in the
user interface they usually work with
On the left you see what authorized users see
Unauthorized users, hackers, or even the admins of the provider will not be able to view your sensitive data. They will only see the encrypted strings
e3 Centraya - Column data encryption for your cloud serviçes
Clients - excerpt
Projetos atuando
Bank- e3 DLP with Symantec DLP and MS Purview (teams) - Architect
Credit Card Institute - e3 DLP with Symantec DLP and MS Purview (teams) - Architect
Bank - e3 DLP with Symantec DLP and MS Purview (proof of concept para Endpoint) - Architect
Projetos concluido (ultimos 2 anos)
Infrastructure Service Provider - e3 DLP - Endpoint DLP - System Engineer, Policy Engineer
Bank - Symantec DLP - Consultor de Exact Match
Bank - Endpoint DLP using Exact Match - Arquiteto, Policy Engineer
Bank - Discovery using GRID Scanning - Arquiteto, Policy Engineer
Food and Beverage - Forcepoint DLP in partnership with PartnerOne - System Engineer
Coffee - Forcepoint DLP in partnership with PartnerOne - System Engineer
Insurance - Forcepoint DLP in partnership with PartnerOne - System Engineer
Lawyer - Forcepoint DLP in partnership with PartnerOne - System Engineer
Perfume - Forcepoint DLP in partnership with PartnerOne - System Engineer
Construction - Forcepoint DLP in partnership with PartnerOne - System Engineer
In adherence to our non-disclosure agreement and internal privacy policies at e3, we refrain from disclosing specific company names on our website. Nevertheless, as we progress through the contract-closing phase, we would be delighted to arrange a reference call, allowing you to gain insights from a selection of our over 100 meticulously executed DLP projects.
Success Stories
DLP success stories
In adherence to our non-disclosure agreement and internal privacy policies at e3, we refrain from disclosing specific company names on our website. Nevertheless, as we progress through the contract-closing phase, we would be delighted to arrange a reference call, allowing you to gain insights from a selection of our over 100 meticulously executed DLP projects.
Insurance (5000 employees - Symantec Suite incl. e3 DLP):
As part of the cyber security program of the firm, we implemented Symantec DLP for aproximately 5000 users. Our delivery team implemented the complete Symantec Suite for E-Mail (NPM), Web (NPW) and Endpoint, including Endpoint Discover.
One of the major challenges was to understand the more than 30 differnt types of sensitive data assetsof the company and create the automated indexing logistics for those and well-formed policies. Furthermore, we implemented our complete e3 Platform stack to fully automate data logistics and reduce operational costs for incident management.Austrian datacenter (serving 12 bank in a multi-tenant DLP approach):
Esta empresa é um dos nossos clientes multi-inquilinos, pois fornece DLP como um serviço para várias instituições financeiras. A solução é baseada na Symantec, no entanto, como não abrange a multi-inquilinagem para políticas e gerenciamento de incidentes, fornecemos nossa plataforma e3 DLP para segregação dos incidentes.Food and Beverages (90'000 employees Brazil and Eurasia):
This company decided to migrate to Forcepoint from a prior DLP solution and e3 Cyber Security was responsible for the implementation and integration of the new solution. Primary focus was e-mail prevent for the multi-national firm.
Who I am
e3 Cyber Security is a franchising partner of the e3 Group Switzerland. Our team of highly skilled staff in Brazil and Europe is dedicated to providing the best security solutions to protect your business. We offer risk analysis and proof of concepts prior to any implementation project, as well as implementation and integration of the system in your environment.
Besides the Group headquarter in Zurich, Switzerland, we have franchising partners in
Germany and the Netherlands.
Want to know more?
Call us under +55 21 98 276 1276,
e-mail rene.steg@e3ag.net us
or visit our social media sites:
René Guido Steg, Founder and
CEO of e3 Cyber Security
Who we are
I have been working in the IT industry for over 30 years. I started my career as a System Operator and worked as a Programmer, utilizing languages such as COBOL and NATURAL. After obtaining my Wirtschaftsinformatiker and post-graduation diploma in Software Engineering, I transitioned into the Software Change and Configuration Management domain and established my own company called Steg IT-Engineering in Switzerland. Through this venture, I successfully executed numerous projects primarily for banks.
During my professional journey, I had the opportunity to develop a longstanding relationship with Thomas Fürling, the founder of e3 AG. As a result, I joined e3 AG as an employee, assuming roles such as Project Manager, Product Manager, and eventually supporting the company as a Solution Architect for their DLP integration projects.
In 2021, I founded e3 Cyber Security Ltda, which serves as a franchising partner of e3 AG in Switzerland. Since then, I have successfully implemented over 10 Cyber Security projects in Brazil and Europe.
Get In Touch
Protecting Your Digital World with e3 Cyber Security
©2023 - e3 Cyber Security