Instant messaging is incredibly useful, and it’s hard to imagine the modern workplace without it. But there’s more: Threema Work and Threema OnPrem can be integrated into third-party systems, and thanks to versatile APIs, process automation is a piece of cake. This opens up possibilities that go far beyond mere mobile communication.
In addition to Threema Gateway, the Threema Work API and the Threema Broadcast API provide interfaces that cover a wide range of use cases. Here’s an overview based on specific examples:
Table of Contents
1. Automate the Sending of Messages via Distribution Lists and Groups
2. Create Interactive Chat Bots
3. Automate Contact Synchronization and User Management
Automate the Sending of Messages via Distribution Lists and Groups
Threema Broadcast is primarily used for top-down communication. Of course, it’s possible to send messages manually, but they can also be sent using the Broadcast API. For example, you could automatically send monthly payslips or individual work schedules to the desired employees.
Or you may want to automatically assign tasks to the mobile workforce (like TK Elevator) or forward security information from IT service management platforms – e.g., ServiceNow or BMC Remedy – to IT employees (like Open Circle AG). In addition to these examples, there are countless other use cases where the automated sending of messages offers decisive advantages – reducing response time, increasing efficiency, and minimizing errors, to name a few.
Create Interactive Chat Bots
Threema Gateway doesn’t just enable you to automatically send messages, it also allows you to receive and process incoming messages. For example, you can create a custom chat bot that returns dynamic messages, is end-to-end encrypted, and can be used anonymously. For example, during the Covid-19 pandemic, the Corona Radar was used to provide up-to-date information on regional Coronavirus case numbers.
Automate Contact Synchronization and User Management
As you probably have guessed, user administration is another area where automation comes into play. Thanks to the Threema Work API, there’s really no need to manually create, modify, or delete users in the management cockpit. Furthermore, AD and Entra ID connectors are available, which can be used to synchronize AD users. This way, former employees won’t gain access to internal information by accident.
Video: How wicked.design Uses Threema Gateway
Tom F. Hofmann, CISO and founder of wicked.design GmbH, shows in the following video how the company integrates Threema into its Cyber Defense Center. He highlights how tying Threema to the security platform Wazuh opens up further possibilities, such as alerting from the Secure Configuration Management, file and cloud monitoring, threat intelligence, and malware detection.
How Threema Uses Threema Gateway Internally
True to the “Eat your own dog food” principle, Threema internally leverages the capabilities Threema Gateway provides to the fullest. Wherever possible, we try to streamline our processes using our own tools. Here are a few examples:
Meeting Bot
During the Covid-19 pandemic, a daily video call was established to keep employees in touch with each other. To join the call, the employees had to send a message to a Gateway ID, which returned an automatically generated meeting URL. Using the agree/disagree feature, employees could indicate whether they’re at home or at the office. A call moderator and some speakers were randomly selected and informed about their role.Parking Bot
The parking lots at Threema’s HQ are each equipped with a sensor. A Threema Broadcast feed lets those commuting by car know which spots are taken and which are free.Chat Support
Users of the Threema app can request technical support right in the app. Messages sent to *SUPPORT open a new ticket in the internal ticket system, and replies are sent back as Threema messages.Two-Factor Authentication (2FA) and Access Control
To access certain internal tools, employees are authenticated using 2FA, and the 2FA codes are sent securely via Threema. Besides that, access to particularly sensitive data must be authorized by the Operations team: one of the team members has to accept the request message that’s automatically sent by agreeing to the message.
As the parking bot example goes to show, third-party integration isn’t limited to software but can also involve hardware. There are virtually no limits. If you have a use case in mind and are in doubt about its feasibility, we will be happy to advise you.