Is Multilayered Cyber-Defense Out Already? Against Rising Breaches and Vulnerabilities, Data-Centric Security to the Rescue!

  • LANGUAGE: English DATE: Thursday, May 23, 2019 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Is Multilayered Cyber-Defense Out Already? Against Rising Breaches and Vulnerabilities, Data-Centric Security to the Rescue!

As the growing number of high-profile data breaches indicates, even the largest companies are still struggling with implementing consistent enterprise-wide information security measures. Setting up various security tools for numerous different applications, services, and heterogeneous systems and then making them work together efficiently is a massive challenge.

Sometimes it seems as if even the prospect of paying huge fines for compliance violations does not motivate these companies enough.

The reality, however, is that most companies do have various security solutions in place. Yet for various reasons, they are simply unable to maintain the proper balance between the overwhelming complexity and costs of comprehensive multilayered data protection systems and the risks caused by multiple gaps in less developed ones.

The growing skills gap in the IT industry only makes the situation worse, since many companies are simply unable to adequately estimate their risk postures. Is there really no hope for an easier alternative? Join us to find out!

In this KuppingerCole webinar, you’ll learn about:

  • challenges and hidden risks of the modern digital economy;
  • reviewing your (and your peers’) security strategy and identifying most common gaps;
  • reducing complexity and improving compliance with the data-centric approach towards security;
  • best practices and recommendations for highly regulated industries.

In the first part of the webinar, Alexei Balaganski, Lead Analyst at KuppingerCole, will talk about the security and compliance challenges organizations are facing when dealing with sensitive information and explain the not-immediately-obvious benefits of the alternative, data-centric approach.

In the second part, Felix Rosbach, Product Manager at comforte AG, will walk you through several real-world examples of businesses that failed to properly evaluate their data security risks and demonstrate how to utilize data protection solutions to address those gaps.


Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Felix has been passionate about technology, cyber-security and hacking since he was in grade school. He began his career as an IT professional over ten years ago and has gained a great deal of experience and market insight into the data security industry. He started off in systems integration...

Lead Sponsor

comforte was founded in 1998 by the creators of a connectivity solution for mission-critical systems. A logical next step for comforte was to not only connect systems, but to also make sure that communication is always done in a secure fashion. Organizations around the globe are running their ATM and Point-of-Sale networks securely thanks to comforte.

As our experience with securing data in motion increased, we decided to extend our technology to securing data at rest as well. Finally, after deploying our solutions at many payment organizations worldwide over the years, we took our portfolio one step further by adding an offering that enables digital payments transformation.

Building on more than 20 years of experience in unlocking more value from systems that never stop, comforte has evolved into a market leader for enterprise data protection and empowering mission-critical systems. We now proudly serve over 500 customers across the globe.

Watch now


Trending Videos

Next Webinar


Breaking the Ransomware Attack Chain

At some point, any business connected to the internet is likely to become a victim of a ransomware because they are relatively easy and inexpensive to carry out, but potentially yield large payouts for cybercriminals. The best way of tackling this threat is to know how to break the attack chain.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00