Security

OpenText Threat Intelligence™ (BrightCloud): Empowering proactive cyber defense 

In today’s rapidly evolving, AI-driven cybersecurity landscape, threats are growing more sophisticated by the day. To stay ahead of the curve—whether you are a networking,…

October 2, 2024 5 minute read
Security is Job 1

Security is Job 1

Businesses are operating in a zero-trust environment. Every year, the World Economic Forum releases its Global Risks Report to identify and analyze the most pressing…

4 minute read

Information is at the heart of your business

Information is at the heart of your business

Even though digital information is evolving at a rapid pace, the world is still document-centric. Documents, whether created by a human or generated by a…

4 minute read

Delivering the Intelligent and Connected Enterprise

Delivering the Intelligent and Connected Enterprise

It is a new world. The Latin term for this is Mundus Novus. In the new world, industries are facing a series of challenging macro-trends…

4 minute read

Identity and Access Management is pivotal for GDPR compliance

Identity and Access Management is pivotal for GDPR compliance

GDPR is finally with us, and within just hours of it becoming law Google and Facebook were hit with privacy complaints that could lead to fines…

7 minute read

Bring your own identity (BYOI)

Bring your own identity (BYOI)

In March, Grand View Research suggested that the Identity and Access Management (IAM) market will be worth over $24 billion by 2020. This healthy growth…

7 minute read

The benefits of site-to-site VPNs when moving to the cloud

The benefits of site-to-site VPNs when moving to the cloud

The Virtual Private Network (VPN) has been an important part of enterprise computing for many years. For many companies, it remains a key method to…

7 minute read

From identity provisioning to managing IoT ecosystems

From identity provisioning to managing IoT ecosystems

More and more enterprises have begun their journey towards digital transformation. They are creating entirely new types of digital ecosystems that include people, applications, systems…

6 minute read

On-premises or in the cloud? Which is best for my EDI capabilities?

On-premises or in the cloud? Which is best for my EDI capabilities?

EDI (electronic data interchange) is increasingly important today for businesses large and small. You need to be able to trade quickly and efficiently with your…

8 minute read

What are Separation of Duties and Least Privilege?

What are Separation of Duties and Least Privilege?

When you see this term, SoD, with a little O, what does it mean? It can mean two things — Separation of Duties or Segregation…

6 minute read

7 key things forensic investigators need to do

7 key things forensic investigators need to do

Law enforcement, government agencies and corporate enterprises alike count on their digital forensic technology to keep evolving alongside their growing needs. In 2017, OpenText™ acquired…

3 minute read

Announcing OpenText Content Services 16 EP4

Announcing OpenText Content Services 16 EP4

The adoption and consumption of content services are fueling advances in automation and integration. Together, they’re changing the way we work, the way we design…

8 minute read

Integration and automation let cybersecurity teams do more with less

Integration and automation let cybersecurity teams do more with less

OpenText™ EnCase™ Endpoint Security 6.04 is the newest release of our leading endpoint detection and response (EDR) solution. With the increasing sophistication of cyber-attacks, incident…

3 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.

Sign up