Security
-
When good B2B Managed Services turns bad
The promise of B2B Managed Services is great. According to Ovum, good B2B Managed Services can cut operating costs by at least…
Read more -
Decide the future of your enterprise with OT2
At OpenText™ Enterprise World 2018, we announced the availability of OpenText OT2, the next-generation hybrid-cloud platform that brings together intelligent…
Read more -
The importance of knowing ‘where’ in digital forensic analysis
With so many devices, file systems, operating systems, user artifacts, application artifacts, and more, keeping-up with relevant knowledge is a…
Read more -
How Identity and Access Management helps meet the data protection requirements of GDPR
In my previous blog, I looked at how Identity and Access Management (IAM) can help with GDPR compliance. This time…
Read more -
Identity and Access Management is pivotal for GDPR compliance
GDPR is finally with us, and within just hours of it becoming law Google and Facebook were hit with privacy complaints…
Read more -
Bring your own identity (BYOI)
In March, Grand View Research suggested that the Identity and Access Management (IAM) market will be worth over $24 billion…
Read more -
The benefits of site-to-site VPNs when moving to the cloud
The Virtual Private Network (VPN) has been an important part of enterprise computing for many years. For many companies, it…
Read more -
From identity provisioning to managing IoT ecosystems
More and more enterprises have begun their journey towards digital transformation. They are creating entirely new types of digital ecosystems…
Read more -
On-premises or in the cloud? Which is best for my EDI capabilities?
EDI (electronic data interchange) is increasingly important today for businesses large and small. You need to be able to trade…
Read more -
7 key things forensic investigators need to do
Law enforcement, government agencies and corporate enterprises alike count on their digital forensic technology to keep evolving alongside their growing…
Read more -
Announcing OpenText Content Services 16 EP4
The adoption and consumption of content services are fueling advances in automation and integration. Together, they’re changing the way we…
Read more -
Integration and automation let cybersecurity teams do more with less
OpenText™ EnCase™ Endpoint Security 6.04 is the newest release of our leading endpoint detection and response (EDR) solution. With the…
Read more -
5 Critical Questions You Need to Ask About Your Sensitive Data
Data privacy regulations, interconnectivity (virtual machines, cloud, IoT, BYOD), and cyber threats are changing the global digital landscape. With this…
Read more -
Traditional records management isn’t working for government – or anybody else
Government agencies at all levels are realizing traditional records management practices are insufficient and ineffective in a digital world. Why?…
Read more -
Turn regulatory compliance into competitive advantage
For many, the new year is a time for new beginnings, new habits, and new ways of thinking. When the…
Read more