Cloud Data Protection Done Right: When Bringing Your Own Key Just Isn’t Enough

  • LANGUAGE: English DATE: Thursday, April 12, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Cloud Data Protection Done Right: When Bringing Your Own Key Just Isn’t Enough
As companies continue to expand their adoption of cloud services for such benefits as improved flexibility and scalability, reduced time to market, and cost savings, protecting their sensitive data across a large number of SaaS platforms is becoming increasingly complicated. For heavily regulated industries, security and data protection have been the largest barriers to cloud adoption for years, but with the upcoming General Data Protection Regulation (GDPR)’s significantly tightened compliance controls and massive penalties for violations, protecting sensitive data in the cloud is becoming mandatory for every organization.

Data encryption is undoubtedly the most popular technology for securing data in the cloud, but also one of the most misunderstood ones. Although most cloud service providers offer their own capabilities for encrypting data at rest or in transit, their implementations may vary dramatically in scope and quality. Without understanding of underlying principles, it is too difficult for most customers to see behind marketing buzzwords and to estimate what grade of security they are actually getting. Protecting your data from unauthorized access isn’t even your cloud provider’s legal responsibility – you are still fully responsible for all consequences of any data breach.

Although many SaaS vendors will gladly offer you to handle all your encryption needs and even let you manage your own encryption keys with absolute security, the bitter truth is that anyone that has access to your keys can potentially access your data – and that includes external administrators and overly curious intelligence agencies. Only by taking the matters in your own hands and establishing a holistic data encryption platform you are able to be absolutely sure that your data remains safe and compliant with the most stringent industry regulations. You stay in control of your data!

Join this KuppingerCole webinar and learn:

  • Why not all encryption solutions are equally secure and how to see beyond marketing buzzwords;
  • What operational, security and compliance challenges businesses face when dealing with cloud data encryption;
  • Reaping the benefits of third generation encryption solutions and overcoming their traditional drawbacks;
  • Keeping your cryptographic keys safe, your data secured and your auditors happy with a transparent end-to-end encryption gateway.

In the first part of the webinar, Alexei Balaganski, Lead Analyst at KuppingerCole, will talk about the challenges businesses are facing when moving their sensitive data into the cloud and explain why data encryption and tokenization are the most effective measures they can take to protect sensitive data in cloud environments. Finally, he will outline the ideal requirements an encryption solution must meet to ensure strong protection and full compliance for sensitive data in the cloud.

In the second part, Elmar Eperiesi-Beck, CEO & Founder of eperi GmbH, will share his decades-long experience in data tokenization, encryption and key management and will demonstrate how transparent encryption gateways can solve many problems traditionally associated with end-to-end encryption and demonstrate once again that security vs. convenience does not have to be a dichotomy.


Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Elmar’s career in IT security started with the transformation of the credit card system of the 80s when his team notified banks that PIN number for cards could be extracted from the code on the magnetic strip due to lack of encryption. From there, he had a successful career at IBM managing...

Lead Sponsor

eperi GmbH is a leading provider of Cloud Data Protection (CDP) solutions with several hundred customers addressing data security, compliance and data control use cases for custom applications and leading SaaS applications such as Office 365, Salesforce, ServiceNow, Custom Apps and others. eperi enables cloud usage while maintaining data compliance requirements, such as GDPR, PCI/DSS or HiPPA, and protects sensitive data from unauthorized access by encrypting all critical data proactively before it is transferred to the cloud.

eperi CDP solutions are software based solutions that can be used as on-premises gateway solutions under the full control of the enterprise, or are available through MSSP (Managed Service Security Partners) such as IBM, T-Systems and others. The eperi CDP solutions are unique in offering the broadest and deepest supports for cloud SaaS, applications, databases and files and are designed with a powerful template concept to support hundreds of different cloud SaaS applications.

Watch now


Webinar presentation, KuppingerCole

Webinar presentation, eperi

Webcast download

Popular Webcasts

Next Webinar


Digital Identities in the Internet of Things - Securely Manage Devices at Scale

The Internet of Things is disrupting all industries and use cases; from customer IoT, to Industrial IoT. Companies are forced to become more innovative with their products whilst their services are being, or will be, digitized. Top drivers of this digitization are eroding margins and changing customer behaviour, whereas new market disruptors face security challenges. The question now becomes: where do companies decide to focus their money and efforts, in order to capitalize on this disruption? Either on business optimization, by doing things better and more efficiently, or focusing on a business transformation, to move from CAPEX to OPEX.

Next Conference


Consumer Identity World USA 2018

The Consumer Identity World USA is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00