Security

The Internet of Things has an identity problem

According to Juniper Research, the number of Industrial IoT connections is expected to reach 46 billion by 20231.  As IoT…

Read more »

Developing an industry, creating the experts

It’s difficult to grasp today that, even in the mid 1990s, the legal industry struggled to understand how to properly…

Read more »

Data privacy is changing the relationship between you and your customers

The capture and collection of personal data is an important requirement in order to provide the individual, customized and tailored…

Read more »

OpenText at RSA: EnCase wins top forensic award from SC Magazine

On March 5 at RSA 2019, SC Magazine named OpenText™ EnCase™ Endpoint Investigator, OpenText™ EnCase™ Forensic, and OpenText™ EnCase™ Mobile…

Read more »

OpenText at RSA: Detection and response from the bottom up

It’s 2019, yet the fact still remains: attackers can compromise a network in a matter of minutes, but only a…

Read more »

The three problems OpenText Security will be talking about at RSA

RSA 2019 is right around the corner. The most exciting security conference of the year – apart from OpenText™ Enfuse of…

Read more »

Powerful digital forensics with OpenText EnCase Forensic 8.08

As technology evolves, so do the challenges of digital forensic investigation. Whether in the field or the lab, digital forensic…

Read more »

New logical imaging feature now available with OpenText Tableau TX1 2.0

OpenText™ is excited to announce the release of the new Logical Imaging feature for the Tableau Forensic Imager TX1 2.0.…

Read more »

Learn digital forensic skills to advance your career

The landscape of digital forensic investigations is continually evolving. Skilled investigators are in high demand and organizations need to ensure their…

Read more »

Shining a light inside the firewall

Security has always been a priority for organizations. Thirty years ago, organizations managed documents by paper and locked them up…

Read more »

What makes a great CIAM platform?

The growth of Consumer Identity and Access Management (CIAM) has been phenomenal. The first CIAM systems only started to appear…

Read more »

Security begins with consistency, reliability and predictability

In today’s digital landscape, security has to be a top priority for organizations. With cyberattacks and information breaches happening every…

Read more »

Treating digital risk at Banner Health

As high-profile data breaches make headlines around the world, cybersecurity has quickly become a C-level priority. To keep pace with…

Read more »

The importance of consumer IAM in the world of the ‘digital-savvy’ customer

Consumer Identity and Access Management (CIAM), also known as B2C IAM, is still relatively new but it is rapidly becoming…

Read more »

Continuous monitoring and advanced threat detection for the global enterprise

Information Security Continuous Monitoring (ISCM) projects can be expensive, data and network intensive implementations which often end in frustration for…

Read more »

GDPR puts focus on the security of your EIM solutions

In its report, The role of technology in your GDPR strategy, IDC identifies EIM technologies as central to achieving compliance with…

Read more »

Announcing OpenText EnCase Advanced Detection

Malware detection, while important, is a daily occurrence. As the cyber security industry shifts from legacy anti-virus to Endpoint Protection…

Read more »

Charting the future of Documentum with OT2

When OpenText™ acquired Documentum in 2017, we committed to protecting our customers’ existing investments in both Documentum and Content Server.…

Read more »

When good B2B Managed Services turns bad

The promise of B2B Managed Services is great. According to Ovum, good B2B Managed Services can cut operating costs by at least…

Read more »

The importance of knowing ‘where’ in digital forensic analysis

With so many devices, file systems, operating systems, user artifacts, application artifacts, and more, keeping-up with relevant knowledge is a…

Read more »
Close