Threema Work

Data Minimization: The Secret Recipe for Sustainable Digitalization of Universities

Have you ever wondered why you have to provide personal information when shopping online? All too often, information such as the phone number and date of birth is provided without hesitation. But does the online shop really need all this information just to deliver baby diapers, for example?

Smartphone screen showing Threema.Work contact list with four contacts, avatars, IDs, and status indicators
Threema Work

The Limits of Encryption

The recent news story about a group chat where military information was leaked to a journalist due to human error shows that strong encryption isn’t sufficient for a corporate – let alone governmental – messaging service.

Illustration of secure Threema.Work messaging: data sent from laptop to smartphone by paper plane
Threema Work

Send the App Activation Link Directly from the Management Cockpit

Threema Work’s management cockpit has recently received an update: app activation links can now be sent to users directly via email from the management cockpit. This makes it easier for administrators to distribute the Threema Work app to their employees.

Person in party hat arranging large '2024' numbers on white platform with confetti on blue background
Threema Work

Threema’s 2024 in Review

Soon, the year 2024 will be history. We look back on the past twelve months and recap the most important milestones we achieved.

Isometric graphic of a central server linked to monitors by robot icons and interlocking gear symbols
Threema Work

Unlock the Full Potential of Instant Messaging Through Automation

Instant messaging is incredibly useful, and it’s hard to imagine the modern workplace without it. But there’s more: Threema Work and Threema OnPrem can be integrated into third-party systems, and thanks to versatile APIs, process automation is a piece of cake. This opens up possibilities that go far beyond mere mobile communication.

Smartphone screen with team avatars labeled Design and Marketing, featuring a pop-up highlighting the Illustrator
Threema Work

Job Title and Department in Threema Work

Threema Work introduces a useful new feature: Administrators can now specify a job title and department for each employee. This way, it’s immediately apparent whether a contact is John Smith from accounting or the other John Smith from the operations team. On top of that, the user management in the management cockpit now supports bulk editing.

Illustration of a server protected by a shield with padlocks and secure message icons
Threema Work

Total Data Sovereignty Thanks to On-Premises Messaging

Cloud services are incredibly popular, and for good reason. The “Software as a Service” model offers various advantages. However, there’s a flip side. When it comes to security, data protection, and legal compliance, self-hosted solutions are clearly ahead of the game. In this blog post, we’ll explore the benefits of total data sovereignty and shed some light on the risks associated with certain cloud services.

Three user avatars labeled 'Zurich Office' connect to a smartphone chat view labeled 'Zurich Office' on blue background
Threema Work

Manage Groups and Distribution Lists Automatically

Good news for Threema Work administrators: With the latest Threema Work and Threema Broadcast update, centrally managed groups and distribution lists can be automatically created and managed based on tags. This significantly reduces the administrative workload.

Laptop with red screen showing broken unlocked padlock beside smartphone displaying shield, lock icon and chat bubble
Threema Work

The Importance of an Out-of-Band Communication Tool

Email, collaboration tool, chat app, telephone: digital infrastructures in companies are becoming increasingly complex. Furthermore, the fact that the number of cyberattacks continues to grow makes having a reliable out-of-band communication tool increasingly urgent – especially in light of the EU’s NIS2 Directive, which is to be transposed into national law by October 17, 2024. The regulation obligates operators of critical infrastructures to ensure communication and business continuity in the event of a cyberattack. Whitepaper About Business Continuity Learn in our free whitepaper how companies can safeguard their existence in the event of a crisis thanks to solid business continuity management, and find out which steps are necessary to resume operations as quickly as possible. Download the whitepaper

Follow us

Threema

Made in Switzerland © 2025 Threema GmbH.