Professional Services
Enhancing Security Operations with OpenText Cybersecurity Services
In today’s hyper-connected digital landscape, the proliferation of devices and applications has expanded the attack surface for potential cybersecurity threats. Cyberattacks are on track to…
![How to implement a new software system](https://blogs.opentext.com/wp-content/uploads/2021/05/shutterstock_664284277-1000x667-1-341x192.jpg)
How to implement a new software system
The efficiency, productivity and innovation for an organization can stem from implementing the latest software applications in a timely and effective manner. This represents a…
• 8 minute read
![Remote Nunavik villagers connected by timely translation](https://blogs.opentext.com/wp-content/uploads/2021/05/@KRG_Salluit_02-scaled-1-341x192.jpg)
Remote Nunavik villagers connected by timely translation
Job opportunity. Offre d’emploi. ᐱᓇᓱᒐᑦᓴᖅ Job postings on the Kativik Regional Government (KRG) Facebook page are displayed in three languages: English, French and Inuktitut, the…
• 2 minute read
![Document access control](https://blogs.opentext.com/wp-content/uploads/2021/04/shutterstock_1285465510-1000x667-1-341x192.jpg)
Document access control
Access scenarios today are more complex than ever, thanks to the increased need for mobility, usability and flexibility. Think, for example, about all those millions…
• 3 minute read
![What is software implementation?](https://blogs.opentext.com/wp-content/uploads/2021/04/shutterstock_1400340125-1000x667-1-341x192.jpg)
What is software implementation?
Every year, organizations all over the world implement new software packages and systems. Every year, many of those organizations struggle to realize the benefits of that software implementation. Having…
• 8 minute read
![NIST Privacy Framework – Control](https://blogs.opentext.com/wp-content/uploads/2021/01/shutterstock_1343757083-1000x667-1-341x192.jpg)
NIST Privacy Framework – Control
In our first two blogs for the NIST Privacy Framework, we discussed the Identify and Govern functions. In this segment, our focus is on the Control function that defines the appropriate activities to enable…
• 5 minute read
![How intelligent forms automation can help replace legacy applications](https://blogs.opentext.com/wp-content/uploads/2021/01/shutterstock_178630322-1000x667-1-341x192.jpg)
How intelligent forms automation can help replace legacy applications
In 2020, organizations moved from mostly in-office employees to hybrid working models and full remote working. As part of this transition, some organizations are discovering…
• 2 minute read
![Avoiding four common pitfalls when moving to the cloud](https://blogs.opentext.com/wp-content/uploads/2020/11/shutterstock_1200216472-1000x667-1-341x192.jpg)
Avoiding four common pitfalls when moving to the cloud
As organizations increasingly move mission-critical workloads to the cloud, it’s important to recognize some of the common pitfalls and how best to mitigate their impact….
• 3 minute read
![Running a resilient EIM platform](https://blogs.opentext.com/wp-content/uploads/2020/10/shutterstock_1213752970-1000x667-1-341x192.jpg)
Running a resilient EIM platform
Information is key for businesses to operate and succeed, making it imperative that the Enterprise Informant Management platforms they rely on are robust, reliable, and…
• 4 minute read
![Maximize ROI by optimizing digital asset management productivity](https://blogs.opentext.com/wp-content/uploads/2020/09/shutterstock_1615159159-1000x667-1-341x192.jpg)
Maximize ROI by optimizing digital asset management productivity
Over the years, Digital Asset Management (DAM) has transformed from a digital media storage hub to a solution with the addition of improved collaboration, automation capabilities,…
• 3 minute read
![NIST Privacy Framework – Governance, risk management and compliance](https://blogs.opentext.com/wp-content/uploads/2020/09/shutterstock_1062285074-1000x667-1-341x192.jpg)
NIST Privacy Framework – Governance, risk management and compliance
In this blog, we will focus on the importance of Governance, Risk Management, and Compliance (GRC) programs within the NIST Privacy Framework. Having an organizational…
• 4 minute read
![Getting the best performance from your Digital Asset Management system](https://blogs.opentext.com/wp-content/uploads/2020/09/shutterstock_1334179889-1000x667-1-341x192.jpg)
Getting the best performance from your Digital Asset Management system
Performance is an essential component when implementing any solution and is critical for acceptance by the end users, administrators, consumers, upstream and downstream processes/components. When…
• 3 minute read
![4 key areas for successful information management transformation](https://blogs.opentext.com/wp-content/uploads/2020/07/shutterstock_687187642-1000x667-1-341x192.jpg)
4 key areas for successful information management transformation
Enterprise technology and digital transformation programs are notoriously challenging. A recent Harvard Business Review (HBR) article stated: “Success requires bringing together and coordinating (a) far greater…
• 4 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.