Security
-
What OpenText Cybersecurity is bringing to the table at OpenText World 2023
With less than six weeks to go until OpenText World, the excitement for everything Cybersecurity is soaring. During the packed…
Read more -
What’s new in OpenText Identity and Access Management
August 2023: OpenText Identity and Access Management CE 23.3 The 23.3 release of the OpenTextTM Identity and Access Management platform…
Read more -
5 steps to strengthen critical information protection
In our discussions with customers and countless surveys, cybersecurity and sensitive data protection are always top-ranking issues. IT now has…
Read more -
What’s new in Application Modernization & Connectivity
The latest OpenText™ Cloud Editions includes updates to AMC’s COBOL, Enterprise Suite and Host Connectivity offerings – designed to support…
Read more -
Obtaining a bearer token to enable API interaction
OpenText™ Network Detection & Response (NDR), previously known as Bricata Network Detection & Response, provides real-time network visibility, metadata generation…
Read more -
To upgrade, or not to upgrade…that is the question for enterprise software users
Upgrading a major software application can be challenging. Many factors come into play, including budget issues, downtime, upskilling the staff,…
Read more -
OpenText Cybersecurity 2023 Global Managed Security Survey: Tool Consolidation is More Than a Trend, it’s a Demand
The impacts of a down economy are far reaching. Budget cuts, hiring freezes, and staff reductions are taking their toll…
Read more -
Recover your systems and data from disaster with confidence
Having a disaster recovery plan is critical to your organizations’ success. When a critical system goes down, whether from ransomware…
Read more -
Dissecting IcedID behavior on an infected endpoint
IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial…
Read more -
The EnCase Evidence Viewer
OpenText™ EnCase™ Forensic software is one of the longest established digital forensic platforms on the market. It has been the…
Read more -
Digital forensic device duplication – the next step
Digital forensic imaging is defined as the processes and tools used in copying a physical storage device for conducting investigations and…
Read more -
Simplify security through a scalable platform for MSPs and SMBs
Our Managed Service Provider (MSP) partners are important to us, and at OpenText Cybersecurity, we’re proud to provide you with…
Read more -
Protect your “anywhere” workforce from web-based threats
The internet is part of everyday work life. Employees need to use the internet for countless work-related purposes, but without…
Read more -
Introducing the OpenText Tableau Forensic TD4 Duplicator
In today’s technology-centric world, more than 80% of the evidence collected in a criminal investigation includes the digital evidence contained…
Read more -
Ride the digital ecosystem wave, securely
Connected digital ecosystems are forecast to generate one-quarter of all global revenue by 2030 – 80 trillion USD1, and businesses…
Read more -
Strengthen information protection with a Zero Trust Information Governance program
“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” – Sun…
Read more -
Smart PCAP: A time machine for the SOC
Anyone familiar with packet forensics or packet recording knows you can spend hours poring over bulk information and waiting for…
Read more -
What we can learn from the ACC 2022 State of Cybersecurity Report
Recently, the Association of Corporate Counsel (ACC) Foundation, in collaboration with Ernst & Young, LLP, released the 2022 State of…
Read more -
A good foundation is key to digital forensic investigations
I was recently reading an article in Forbes Magazine about the importance of a good foundation when building a home. When…
Read more