Announcing OpenText Security Services

OpenText will feature new security services at Enterprise World 2018

According to a recent study from ISACA released at RSA, 59% of organizations have open security positions. This cybersecurity skills gap leaves organizations at risk. Over 80% of respondents to the same survey indicated that their enterprise is likely or very likely to experience a cyber attack this year – 50% already had during the previous 12 months! Many businesses lack the staffing or internal expertise to properly plan, develop, and implement a world-class incident response program, let alone forensically investigate an advanced cyber attack.

During his closing keynote at OpenText™ Enfuse 2018, Gary Weiss, OpenText SVP and GM for Security, Discovery and Analytics, announced a suite of new OpenText™ Security Services. At the conference, Weiss said, “OpenText now offers three leading services for operational readiness, endpoint threat assessments, and data breach incident response. Individually or together, these services can fortify your security posture by leveraging our cutting-edge detection and industry-leading forensic expertise.”

For customers like Sam Buhrow, Director of IT Incident Management & Forensics at Banner Health, the OpenText Professional Services team provided the process and operational support he needed. “At Banner Health we’ve created a world-class incident response and forensics group,” said Buhrow. “OpenText Professional Services worked with our team to develop the processes, playbooks and tools to accelerate our incident response and maximize our efficiency.”

The OpenText Security Services unveiled at Enfuse 2018 – and to be featured at OpenText Enterprise World 2018 next month – include:

  1. Process and Operation Development – Having a well-defined incident management and response strategy along with a corresponding implementation plan is one of the most important steps to ensure enterprises are effectively prepared when a breach occurs. The OpenText Professional Services team leverages extensive experience to craft response playbooks and custom workflows to drive the success of corporate security teams. OpenText consultants will implement the necessary technology, middleware and workflow automation across tools to ensure that organizations are prepared when the inevitable incident strikes.
  2. 360° Endpoint Threat Assessment – Leveraging our cloud-based, agentless technology, the OpenText Professional Services team will perform a comprehensive scan of the enterprise’s environment to expose any hidden threats. Because there is no agent to deploy, the assessment can be set up within minutes of arrival, ensuring minimal impact to corporate operations and systems.
  3. Threat Triage and Incident Response – If you’ve been breached, or we detect a potential threat during our threat assessment, OpenText can provide highly skilled digital forensic incident response (DFIR) professionals with decades of forensic investigation and incident response experience to help triage and remediate the issue through a complete forensics investigation.

OpenText is uniquely positioned to enable and help protect the intelligent and connected enterprise, with tools, techniques and procedures that are field proven and court-approved. OpenText consultants are armed with the complete suite of OpenText™ EnCase™ enterprise solutions and dozens of powerful, third-party modules and custom scripts created and used over the course of hundreds of engagements to deliver the most comprehensive approach to incident management and response.

To learn more, join us at Enterprise World 2018, visit our website or contact us.

Charles Choe

Charles is a Senior Product Marketing Manager responsible for the OpenText Security product suite of incident response and forensic solutions. He brings almost ten years of product management and technical marketing experience, with advanced degrees in both law and business. He writes about market trends, industry challenges, and solutions in the areas of cybersecurity, risk management, and compliance.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Close