Line of Business

Is your Contact Center as a Service PCI-DSS compliant?

Is your Contact Center as a Service PCI-DSS compliant?

Navigating the world of data security can sometimes feel overwhelming, however, understanding the Payment Card Industry (PCI) Data Security Standard it is crucial for anyone…

4 minute read

Embark on a journey to next-level personalization

Embark on a journey to next-level personalization

Unlock the power of personalization with 5 layers of maturity

4 minute read

Self-service content and experience at your fingertips

Self-service content and experience at your fingertips

Serve up better DIY experiences for customers and employees across all touchpoints

4 minute read

Three key aspects of being a threat hunter  

Three key aspects of being a threat hunter  

In today’s digital landscape, the role of a threat hunter has become indispensable. As cyber threats grow increasingly sophisticated, the need for professionals who can…

5 minute read

Enhancing Security Operations with OpenText Cybersecurity Services

Enhancing Security Operations with OpenText Cybersecurity Services

In today’s hyper-connected digital landscape, the proliferation of devices and applications has expanded the attack surface for potential cybersecurity threats. Cyberattacks are on track to…

4 minute read

Ensuring compliance with the NIS2 Directive 

Ensuring compliance with the NIS2 Directive 

In an increasingly digital world, the security of network and information systems is paramount. The European Union’s NIS2 Directive, a successor to the original NIS…

4 minute read

Celebrating HR success and shaping the future

Celebrating HR success and shaping the future

Valuable insights from our 3rd customer roundtable

4 minute read

A study of threat hunters  

A study of threat hunters  

In today’s ever-evolving cybersecurity landscape, the role of threat hunters is becoming increasingly vital. These professionals are the frontline defenders against sophisticated cyber threats.

8 minute read

Ensuring AI-readiness with secure information management (SIM) 

Ensuring AI-readiness with secure information management (SIM) 

According to McKinsey, the enterprise use of Generative AI could generate an astounding $2.6 trillion to $4.4 trillion annually across more than 60 use cases….

5 minute read

Reimagine information with Cloud Editions (CE) 24.3

Reimagine information with Cloud Editions (CE) 24.3

The latest innovations in Business AI, Business Cloud, and Business Technology

7 minute read

Accelerate strategic decisions with AI-enabled IoT business intelligence 

Accelerate strategic decisions with AI-enabled IoT business intelligence 

Aviator IoT CE 24.3 release introduces new AI tools to interact and gain insight from IoT data.

3 minute read

CIO.com: NetSuite EDI integration made easy, fast, and affordable

CIO.com: NetSuite EDI integration made easy, fast, and affordable

In a recent CIO.com interview, OpenText’s Naomi Skinner spoke about how easy it can be to seamlessly integrate EDI with NetSuite to improve data visibility and streamline operations.

2 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.