Insights

- IT Security
How WhatsApp, Threema, Signal and Telegram differ in terms of data protection and security – an analysis
Element, WhatsApp, Threema, Signal, Telegram, Vibr, Wickr Me and Wire are not rock bands or fashion labels, they are instant messengers that enable the immediate exchange of text, video or voice messages with one or more recipients over the Internet. Thanks to smartphones, these messengers became extremely popular in a private as well as business context, since they allow data sharing in no time. The announcement of WhatsApp at the beginning of this year that the terms of use will be updated, moved data protection and the security of messengers to the fore. But what does this mean for WhatsApp users? How secure are messengers in general? And how are the messages securely stored and transmitted? This article compares four popular messengers – WhatsApp, Threema, Signal, and Telegram – to answer these questions.[1]-[3]

- IT Management
Increasing Project Success Rate Through Good Change Management Practices
There are various reasons why projects fail. It could simply be the result of insufficient project requirements, high complexity, unrealistic project expectations, even poor leadership, among many others. What many Project Managers (PM) underestimate is the social factor in project management—an inherent risk to any project.

- IT Infrastructure, IT Security
Benefits of Identity and Access Management (IAM)
Identity and access management (IAM) is the discipline to enable the right individuals to access the right IT resources, such as systems applications, files, and networks, at the right time for the right reasons. This often needs to be enabled across diverse technologies and the resulting processes must meet the security policies of the organization. The IAM system is a critical part of IT infrastructure of any larger organization.

- IT Management
It projects complete on time and on budget
The comparison with projects in other industries shows that IT projects are increasingly failing and are being cancelled. Or they end, but are over deadline or budget. According to an international study by the Standish Group, representatives of large companies in DACH, UK and North America stated that 84% of the projects would not be completed or fail in line with deadlines or budgets.

- Quality Assurance
This is How you Avoid Data Loss During Migrations
The ever-increasing amount of data is becoming a major challenge for our companies. The variety of data ranges from employee and customer information to complex scientific data—data that impacts decisions and strategic business movements.

- IT Methodology
Agile Projects, SCRUM or XP?
SCRUM has been made an everyday term by Jeff Sutherland and you are often confronted with it. Certain elements from SCRUM, such as the Kanban Board and the daily standup meetings, were very well received – even outside of IT.

- IT Security
Working safely in the home office
Our way of working has been turned upside down by the corona virus. Companies had to offer their employees the opportunity to work from home in the shortest possible time. It was not only a challenge to provide the necessary infrastructure. Not infrequently, the necessary safety precautions were also neglected. Thanks to the home office, productivity can be maintained as much as possible. But the new way of working is susceptible to hackers who want to profit from the current situation.

- IT Management, IT Methodology
Agile transformation in IT projects
The comparison with projects in other industries shows that IT projects are increasingly failing and are being cancelled. Or they end, but are over deadline or budget. According to an international study by the Standish Group, representatives of large companies in DACH, UK and North America stated that 84% of the projects would not be completed or fail in line with deadlines or budgets. Of these 84%, 53% are over the given time and budget or do not include all promised functionalities. 31% of projects either fail or are no longer pursued. Only 16% of all projects were delivered as promised.

- IT Security
Multi-factor authentication (MFA)
Two-factor authentication (2FA) –or multi-factor authentication (MFA) in general – has grown in importance in security in recent years. This is about how users (employees and customers) authenticate to systems. Authentication by username and password is called 1FA. However, in order to increase safety, 2FA or MFA has been increasingly used in recent years.