Is Multilayered Cyber-Defense Out Already? Against Rising Breaches and Vulnerabilities, Data-Centric Security to the Rescue!

  • LANGUAGE: English DATE: Thursday, May 23, 2019 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Is Multilayered Cyber-Defense Out Already? Against Rising Breaches and Vulnerabilities, Data-Centric Security to the Rescue!

As the growing number of high-profile data breaches indicates, even the largest companies are still struggling with implementing consistent enterprise-wide information security measures. Setting up various security tools for numerous different applications, services, and heterogeneous systems and then making them work together efficiently is a massive challenge.

Sometimes it seems as if even the prospect of paying huge fines for compliance violations does not motivate these companies enough.

The reality, however, is that most companies do have various security solutions in place. Yet for various reasons, they are simply unable to maintain the proper balance between the overwhelming complexity and costs of comprehensive multilayered data protection systems and the risks caused by multiple gaps in less developed ones.

The growing skills gap in the IT industry only makes the situation worse, since many companies are simply unable to adequately estimate their risk postures. Is there really no hope for an easier alternative? Join us to find out!

In this KuppingerCole webinar, you’ll learn about:

  • challenges and hidden risks of the modern digital economy;
  • reviewing your (and your peers’) security strategy and identifying most common gaps;
  • reducing complexity and improving compliance with the data-centric approach towards security;
  • best practices and recommendations for highly regulated industries.

In the first part of the webinar, Alexei Balaganski, Lead Analyst at KuppingerCole, will talk about the security and compliance challenges organizations are facing when dealing with sensitive information and explain the not-immediately-obvious benefits of the alternative, data-centric approach.

In the second part, Felix Rosbach, Product Manager at comforte AG, will walk you through several real-world examples of businesses that failed to properly evaluate their data security risks and demonstrate how to utilize data protection solutions to address those gaps.


Speakers

Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Felix has been passionate about technology, cyber-security and hacking since he was in grade school. He began his career as an IT professional over ten years ago and has gained a great deal of experience and market insight into the data security industry. He started off in systems integration...


Lead Sponsor

comforte was founded in 1998 by the creators of a connectivity solution for mission-critical systems. A logical next step for comforte was to not only connect systems, but to also make sure that communication is always done in a secure fashion. Organizations around the globe are running their ATM and Point-of-Sale networks securely thanks to comforte.

As our experience with securing data in motion increased, we decided to extend our technology to securing data at rest as well. Finally, after deploying our solutions at many payment organizations worldwide over the years, we took our portfolio one step further by adding an offering that enables digital payments transformation.

Building on more than 20 years of experience in unlocking more value from systems that never stop, comforte has evolved into a market leader for enterprise data protection and empowering mission-critical systems. We now proudly serve over 500 customers across the globe.

Watch now

Downloads

Webinar presentation, KuppingerCole

Webinar presentation, Comforte

Webcast download

Popular Webcasts

Next Webinar

Webinar

Upgrade your IAM with IDaaS IGA

The Identity-as-a-Service (IDaaS) market continues to develop with a significant push from organizations looking to adopt cloud-based delivery of security services including IAM. While IDaaS Access Management solutions, providing SSO (Single Sign-On) for the users and access to a variety of services are already established, IDaaS IGA is not as widely used yet. However, shifting IGA (Identity Governance and Administration) capabilities, e.g. Identity Lifecycle Management and Access Governance, to the cloud might provide significant benefits regarding time and cost of deploying and operating IGA.

Next Conference

Congress

European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00