Is Multilayered Cyber-Defense Out Already? Against Rising Breaches and Vulnerabilities, Data-Centric Security to the Rescue!

  • LANGUAGE: English DATE: Thursday, May 23, 2019 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Is Multilayered Cyber-Defense Out Already? Against Rising Breaches and Vulnerabilities, Data-Centric Security to the Rescue!

As the growing number of high-profile data breaches indicates, even the largest companies are still struggling with implementing consistent enterprise-wide information security measures. Setting up various security tools for numerous different applications, services, and heterogeneous systems and then making them work together efficiently is a massive challenge.

Sometimes it seems as if even the prospect of paying huge fines for compliance violations does not motivate these companies enough.

The reality, however, is that most companies do have various security solutions in place. Yet for various reasons, they are simply unable to maintain the proper balance between the overwhelming complexity and costs of comprehensive multilayered data protection systems and the risks caused by multiple gaps in less developed ones.

The growing skills gap in the IT industry only makes the situation worse, since many companies are simply unable to adequately estimate their risk postures. Is there really no hope for an easier alternative? Join us to find out!

In this KuppingerCole webinar, you’ll learn about:

  • challenges and hidden risks of the modern digital economy;
  • reviewing your (and your peers’) security strategy and identifying most common gaps;
  • reducing complexity and improving compliance with the data-centric approach towards security;
  • best practices and recommendations for highly regulated industries.

In the first part of the webinar, Alexei Balaganski, Lead Analyst at KuppingerCole, will talk about the security and compliance challenges organizations are facing when dealing with sensitive information and explain the not-immediately-obvious benefits of the alternative, data-centric approach.

In the second part, Felix Rosbach, Product Manager at comforte AG, will walk you through several real-world examples of businesses that failed to properly evaluate their data security risks and demonstrate how to utilize data protection solutions to address those gaps.


Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Felix has been passionate about technology, cyber-security and hacking since he was in grade school. He began his career as an IT professional over ten years ago and has gained a great deal of experience and market insight into the data security industry. He started off in systems integration...

Lead Sponsor

comforte was founded in 1998 by the creators of a connectivity solution for mission-critical systems. A logical next step for comforte was to not only connect systems, but to also make sure that communication is always done in a secure fashion. Organizations around the globe are running their ATM and Point-of-Sale networks securely thanks to comforte.

As our experience with securing data in motion increased, we decided to extend our technology to securing data at rest as well. Finally, after deploying our solutions at many payment organizations worldwide over the years, we took our portfolio one step further by adding an offering that enables digital payments transformation.

Building on more than 20 years of experience in unlocking more value from systems that never stop, comforte has evolved into a market leader for enterprise data protection and empowering mission-critical systems. We now proudly serve over 500 customers across the globe.

Watch now


Popular Videos

Next Webinar


Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können

Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00