Webinars
Upcoming
Webinar
Attend this webinar to:
Implementing Zero Trust With Microsoft Purview and Secude Solutions

In an era of escalating cyber threats, securing critical and commercially sensitive data becomes paramount. Join us for an informative webinar exploring the challenges posed by sophisticated cyber threats and the complexities introduced by the shift to remote working.

Discover the heightened risks in sharing and storing SAP, computer-aided design (CAD), and product lifecycle management (PLM) data and learn why zero trust is essential for compliance with regulations like GDPR, NIS2, ISO27001, and CMMC 2.0.

Speakers' Contributions

John Tolbert, Director of Cybersecurity Research and Lead Analyst at KuppingerCole Analysts, will provide an overview of the challenges and regulatory drivers of protecting sensitive unstructured and structured data such as found in CAD, PLM, and SAP systems. He will also discuss the Information Protection Lifecycle, methods for identifying and classifying information objects, access control architectures, and enforcement methods. 

Markus Nüsseler-Polke, Head of Consulting & Projects​ at Secude will provide an overview of Secude’s HaloCORE and HaloCAD solutions and how they implement zero-trust principles, extending Microsoft Purview Information Protection (MPIP) to safeguard these key systems.

Webinar
Zero Trust Unveiled: Securing Critical Data in SAP, CAD, and PLM Systems
Speakers
Markus Nüsseler-Polke Head of Consulting & Projects
SECUDE Solutions AG
Markus Nüsseler-Polke
Markus Nüsseler-Polke is a dynamic professional at the forefront of information protection and security in the realm of enterprise solutions. Holding a diploma in computer science with a...
View profile
John Tolbert Lead Analyst
KuppingerCole
John Tolbert
Background: John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises...
View profile
Lead Sponsor
Secude IT Security LLC
Top related content
Market Compass
Secure Collaboration
May 31, 2022
This KuppingerCole Market Compass provides an overview of the products or service offerings in a certain market segment. This Market Compass covers Secure Collaboration solutions, focusing on enabling data-centric security to facilitate virtual collaboration. This is an overview of vendors that are active and innovating in this space.
Webinar Recording
Trust No One: Zero Trust Strategy and Design
Aug 25, 2021
With workloads moving to the cloud and remote working increasing, traditional perimeter-based security strategies are no longer practical. A Zero Trust model of strict access control for every user or device offers an alternative that secures data while ensuring it is accessible to those who need it. But the shift to treating both internal and external users as untrusted can be challenging.
Event Recording
Implementing Zero Trust Principles: Crafting Your Cybersecurity Fabric
Nov 14, 2023
This interactive workshop will provide a practical approach to understanding and applying Zero Trust principles in creating your cybersecurity architecture. We will focus on transitioning from traditional security perimeters to an identity-driven Cybersecurity Mesh, acting as the backbone for implementing the Zero Trust model. A detailed case study will guide you through the initial stages of incorporating Zero Trust principles into your current security landscape, identifying potential challenges, and offering methodical solutions. The session will center on active learning through...
Event Recording
Matthias Reinwarth: Zero Trust for Reducing the Risks of Security Incidents
Feb 18, 2021
Webinar Recording
Transforming Governance, Security and Compliance
May 24, 2016
The number of companies investing in modern “Big Data”-type SAP products and cloud-based SAP deployment models is growing constantly. Having formerly been stored in standalone database silos, SAP information from CRM, ERP etc. for Big Data deployments is now being migrated to a central high-volume and high-performance database. Deploying traditional SAP environments in the cloud and leveraging new cloud-based SAP applications introduce new groups of customers to SAP services and shift the focus of existing SAP users.
Webinar Recording
The CISO Imperative: Taking Control of SAP Cyber Attacks
Sep 30, 2015
It is impossible to overestimate the importance of SAP system security for modern enterprises. SAP solutions are widely used in all industries to store sensitive information and run critical business processes: from Enterprise Resource Planning and Human Resources systems to Business Intelligence to Customer Relationship and Supply Chain Management. Constant availability and protection of SAP systems is critical for over 250,000 enterprises around the world, as is their continued visibility and auditability to ensure compliance.
Event Recording
Workshop | Zero Trust & Modern Digital Workplaces
Sep 16, 2021
Okay, sorry about that. So I'll start again. Welcome to this workshop on zero trust. My name is Paul Fisher Fisher. I'm a senior Analyst with KuppingerCole. We'll be joined. I hope by my colleague, John Tolbert. Who's he's here. Okay, good. He's he's in Seattle, so it's very early in the day for him. So let's get started. So this is our agenda for today. So I apologize to anyone here that is an expert on zero trust. Maybe some of this might be obvious, but the idea is it's a workshop, so we're t...
Webinar Recording
Uncovering the Truth About SAP Identity & Access Management
Oct 08, 2021
Ensuring everyone has access to the right systems and data is critical for security and compliance, but often the management of identity and access in SAP is siloed. A survey by SailPoint Technologies and Turnkey Consulting uncovers the extent to which this is true and points to potential solutions.
Event Recording
Arndt Lingscheid: How to Build a Strong Security and Compliance Foundation for Your SAP Landscape
Apr 14, 2021
Cyber-attacks can have severe consequences when it comes to SAP S/4HANA applications. These attacks increasingly focus on the company’s application layer and use privileged user accounts. Unfortunately, many security departments see the SAP application layer as a “black box,” and they view the security of SAP applications as the responsibility of their Basis or SAP application colleagues, leaving these applications at risk. Securing an SAP S/4HANA business application environment involves more than roles and authorizations. The loss of sensitive data can lead to severe...
FAQ
Why should I register for a KuppingerCole webinar?
Join this combined presentation to gain quick insights and hands-on solutions from a KuppingerCole analyst and selected industry expert, finishing with by a comprehensive Q&A for your individual business challenges.
How can I register for this webinar?
To register for the webinar, you need to log in to your KuppingerCole account first. If you do not have an account yet, you can sign up here. After logging in, please enter your requested personal data which is necessary for the further administration of your registration. Once registered, a booking confirmation will be sent to your indicated e-mail address.
How long does the webinar last?
Our webinars last approximately 50-60 minutes.
I did not receive a booking confirmation. What can I do?
If you didn’t receive the booking confirmation in your inbox, please check your spam folder. If you cannot find the booking confirmation in your spam folder, please contact us. We will get back to you within one business day.
What technical equipment do I need?
To participate, you need a computer or a laptop with Internet access. If you want to use the sound transmission via the computer, you will need headphones (headset) or speakers. You do not need a webcam or microphone. You can type in questions in the chat window. In the registration confirmation you will also receive a link that allows you to test the technical requirements in advance.
What does it cost to attend?
Our webinars are generally free of charge.
When will the recordings and presentation slides be available? Will I get notified? How can I access them?
The recordings and presentation slides will be available on the website shortly after the webinar. An e-mail will be sent to all registered users. In order to access the materials, you will need to log in first.
I registered for the webinar, but unfortunately I was not able to attend live. Do I still get access to the recordings and presentation slides?
Yes, the recordings and presentation slides are made available to all users that registered for the webinar, regardless if they attended live or were tied up with business.