Security

The importance of consumer IAM in the world of the ‘digital-savvy’ customer

Consumer Identity and Access Management (CIAM), also known as B2C IAM, is still relatively new but it is rapidly becoming…

Read more »

Continuous monitoring and advanced threat detection for the global enterprise

Information Security Continuous Monitoring (ISCM) projects can be expensive, data and network intensive implementations which often end in frustration for…

Read more »

GDPR puts focus on the security of your EIM solutions

In its report, The role of technology in your GDPR strategy, IDC identifies EIM technologies as central to achieving compliance with…

Read more »

Announcing OpenText EnCase Advanced Detection

Malware detection, while important, is a daily occurrence. As the cyber security industry shifts from legacy anti-virus to Endpoint Protection…

Read more »

Charting the future of Documentum with OT2

When OpenText™ acquired Documentum in 2017, we committed to protecting our customers’ existing investments in both Documentum and Content Server.…

Read more »

When good B2B Managed Services turns bad

The promise of B2B Managed Services is great. According to Ovum, good B2B Managed Services can cut operating costs by at least…

Read more »

The importance of knowing ‘where’ in digital forensic analysis

With so many devices, file systems, operating systems, user artifacts, application artifacts, and more, keeping-up with relevant knowledge is a…

Read more »

Epic endpoints

By 2025, there will be 80 billion devices worldwide connecting to the Internet of Things (IoT). That’s the equivalent of…

Read more »

Information is at the heart of your business

Even though digital information is evolving at a rapid pace, the world is still document-centric. Documents, whether created by a…

Read more »

Delivering the Intelligent and Connected Enterprise

It is a new world. The Latin term for this is Mundus Novus. In the new world, industries are facing…

Read more »

The benefits of site-to-site VPNs when moving to the cloud

The Virtual Private Network (VPN) has been an important part of enterprise computing for many years. For many companies, it…

Read more »

Enterprise World 2018 delivers security, equality, entertainment, and more!

If you’ve attended before, you’ll know that the OpenText™ Enterprise World conference is our biggest event of the year! Our…

Read more »

Three things I learned at my first OpenText EnFuse

With OpenText™ Enterprise World approaching, I can’t help but reflect on the recent OpenText Enfuse® conference (my first). Some of the…

Read more »

On-premises or in the cloud? Which is best for my EDI capabilities?

EDI (electronic data interchange) is increasingly important today for businesses large and small. You need to be able to trade…

Read more »

Holistic security: Augmenting endpoint protection with intelligent automation

With hackers, hostile bots, data misuse, leaks, and privacy invasions so much in the news these days, it’s not surprising…

Read more »

Announcing OpenText Content Services 16 EP4

The adoption and consumption of content services are fueling advances in automation and integration. Together, they’re changing the way we…

Read more »

Integration and automation let cybersecurity teams do more with less

OpenText™ EnCase™ Endpoint Security 6.04 is the newest release of our leading endpoint detection and response (EDR) solution. With the…

Read more »

Traditional records management isn’t working for government – or anybody else

Government agencies at all levels are realizing traditional records management practices are insufficient and ineffective in a digital world. Why?…

Read more »

Connected device data exchange – who’s minding the store on security?

The OpenText™ Business Network blog post Top Ten Supply Chain Predictions for 2018, prediction #9 Augmented Reality Technology — talks…

Read more »

Ten things impacting the world: the nature of conflict

In 2010, a malicious virus known as Stuxnet destroyed nearly 1,000 centrifuges in an Iranian uranium enrichment facility. The cyberattack…

Read more »
Close