Services

Catching threats in minutes, not days with OpenText MDR – Part 2

Catching threats in minutes, not days with OpenText MDR – Part 2

We continue the conversation with Fabian Franco, Senior Manager of Digital Forensic Incident Response (DFIR), Threat Hunting and Security Operations, OpenText, and Kevin Golas, Director…

5 minute read

Extend Magellan with transformers

Extend Magellan with transformers

Under the umbrella that is Artificial Intelligence (AI), Natural Language Processing (NLP) has come a long way from symbolic AI emerging in the mid-1950’s, through…

5 minute read

7 steps to faster value realization

7 steps to faster value realization

According to Harvard Business Review, although 95% of businesses rank digital transformation as a priority, only 1 in 5 leaders rate their efforts as effective.[i]…

4 minute read

Unlock insights from dark data with semantic search

Unlock insights from dark data with semantic search

“Data is the new oil – and that’s a good thing.” Today, organizations store vast amounts of institutional knowledge in dark data, locking it away…

3 minute read

De-risk your cybersecurity program

De-risk your cybersecurity program

Cyber resilience is no longer optional, it is an essential component of Information Management to protect the most valuable assets: data and business processes. Effective…

2 minute read

Machine learning in cybersecurity

Machine learning in cybersecurity

Today’s networked world makes every system an easy target for cyberattacks. Automated tools make it easier for attackers to execute successful attacks and a new…

5 minute read

Catching threats in minutes, not days with OpenText MDR – Part 1

Catching threats in minutes, not days with OpenText MDR – Part 1

Every 11 seconds there is a ransomware attack. Bad actors are targeting companies and critical infrastructure systems for their next opportunity. In many cases, they…

6 minute read

Decomposing the database for microservices

Decomposing the database for microservices

There are many ways to extract functionality into microservices. However, we need to address the elephant in the room—namely, what do we do about our…

5 minute read

Moving from monolith to microservices

Moving from monolith to microservices

We are on the cusp of a revolution in application architecture. According to IDC (International Data Corporation), by 2022, 90 percent of all new applications…

4 minute read

The benefits of viewing OpenText Documentum Groups, Roles & Users in a Tree

The benefits of viewing OpenText Documentum Groups, Roles & Users in a Tree

OpenText™ Documentum™ Web clients have ‘Content Trees’ to access Cabinets, Folders, and Documents. However, Documentum Groups, Roles, & Users are not shown in a Tree…

3 minute read

Three MDR strategies for government CISOs to quickly detect and respond to threats

Three MDR strategies for government CISOs to quickly detect and respond to threats

The US President’s Cybersecurity Executive Order, released in May 2021, outlines “the persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the…

4 minute read

Performance considerations for cloud services provisioning: Value-added services

Performance considerations for cloud services provisioning: Value-added services

In our first blog, I discussed performance parameters for cloud services that were specific to infrastructure. Apart from infrastructure services, though, cloud providers also provide…

3 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.