Line of Business
-
Be cyber resilient and prepare for an attack
Ransomware is a type of malicious software that gains access to files or systems to block user access. All files,…
Read more -
Achieve resilient operations with flawless visibility across the enterprise ecosystem
About a decade ago, most consumers had to scramble through a pile of DVDs for the ‘perfect’ movie, or repeatedly…
Read more -
What’s new in OpenText EnCase Forensic and Endpoint Investigator Cloud Edition (CE) 20.2
When Apple introduced the T2 Security Chip in 2018, it set the computer forensics community back for years. Since then,…
Read more -
What’s new in OpenText EnCase eDiscovery Cloud Edition (CE) 20.2
The endpoints that organizations need to access and manage for eDiscovery, regulatory compliance and investigations have increased quickly, adding complexity…
Read more -
How the ethically minded consumer is impacting your bottom line
“We can’t eat there”, my wife says, as I ask where we should grab some lunch. When I ask why,…
Read more -
How to build a cyber resilience framework
In times of global crisis, some people always seem to show just how bad humans can be. Many hackers have…
Read more -
Announcing OpenText Cloud Editions (CE) 20.2 for Legal Tech
Today, the traditional modes of business communication have literally shut down. Yet litigation, investigations and regulatory compliance haven’t let up.…
Read more -
Announcing OpenText Business Network 20.2
OpenText™ Business Network 20.2 introduces many exciting features and innovations that improve productivity, business performance, and company resilience. Resilience refers…
Read more -
Announcing OpenText Security Cloud Edition (CE) 20.2
In today’s cloud-focused market, it’s essential that security and forensic solutions facilitate cyber resilience with a focus on total endpoint…
Read more -
Clinical labs rise to a health crisis
You’ve seen the videos – people in Madrid, Rome, New York, Atlanta and cities all around the world step onto…
Read more -
How to adapt to supply chain disruptions caused by the Coronavirus
All the major examples of supply chain disruptions over the previous 20 years – from the SARS epidemic to the…
Read more -
How an eDiscovery consulting firm keeps AI in their toolkit
As a recognized eDiscovery expert and founder of Anger & Associates, Carolyn Anger is enthusiastic about technology. Self-described as ‘MacGyvers’…
Read more -
Achieving a successful CCM implementation and adoption
When a customer chooses to invest in any kind of Customer Communications Management (CCM) platform, there are two things that…
Read more -
What is Cyber Resilience?
In 2015, former Cisco CEO John Chambers famously wrote: “There are two types of companies: Those that have been hacked, and…
Read more -
How to select an Identity and Access Management system in 2021
In a previous blog, I took a look at ‘what are Identity and Access Management solutions?’. As businesses focus on…
Read more -
How COVID-19 will change how we work FOREVER
Global supply chains, especially in the manufacturing sector have experienced many different forms of disruption over the years – from…
Read more -
3 ways to extend Salesforce for a true omnichannel customer experience
Customers are empowered by voices, choices, and devices. They want what they want, where they want it and when they…
Read more -
6 questions to ask about EDI readiness in 2020
When Novell’s star as a networking giant was beginning to wane, a salesperson visited a customer to ask why they…
Read more -
What is Customer Identity and Access Management (CIAM)?
Providing digital services to customers is a balancing act. You need to deliver outstanding customer experience at the same time…
Read more -
What are Identity and Access Management (IAM) solutions?
Cybercrime will cost more than $6 trillion in 2021 and continually tops the CIO priority list. When it comes to…
Read more