Professional Services

Enhancing Security Operations with OpenText Cybersecurity Services

In today’s hyper-connected digital landscape, the proliferation of devices and applications has expanded the attack surface for potential cybersecurity threats. Cyberattacks are on track to…

July 19, 2024 4 minute read
How to implement a new software system

How to implement a new software system

The efficiency, productivity and innovation for an organization can stem from implementing the latest software applications in a timely and effective manner. This represents a…

8 minute read

Remote Nunavik villagers connected by timely translation

Remote Nunavik villagers connected by timely translation

Job opportunity. Offre d’emploi. ᐱᓇᓱᒐᑦᓴᖅ Job postings on the Kativik Regional Government (KRG) Facebook page are displayed in three languages: English, French and Inuktitut, the…

2 minute read

Document access control

Document access control

Access scenarios today are more complex than ever, thanks to the increased need for mobility, usability and flexibility. Think, for example, about all those millions…

3 minute read

What is software implementation?

What is software implementation?

Every year, organizations all over the world implement new software packages and systems. Every year, many of those organizations struggle to realize the benefits of that software implementation.  Having…

8 minute read

NIST Privacy Framework – Control

NIST Privacy Framework – Control

In our first two blogs for the NIST Privacy Framework, we discussed the Identify and Govern functions. In this segment, our focus is on the Control function that defines the appropriate activities to enable…

5 minute read

How intelligent forms automation can help replace legacy applications

How intelligent forms automation can help replace legacy applications

In 2020, organizations moved from mostly in-office employees to hybrid working models and full remote working. As part of this transition, some organizations are discovering…

2 minute read

Avoiding four common pitfalls when moving to the cloud

Avoiding four common pitfalls when moving to the cloud

As organizations increasingly move mission-critical workloads to the cloud, it’s important to recognize some of the common pitfalls and how best to mitigate their impact….

3 minute read

Running a resilient EIM platform

Running a resilient EIM platform

Information is key for businesses to operate and succeed, making it imperative that the Enterprise Informant Management platforms they rely on are robust, reliable, and…

4 minute read

Maximize ROI by optimizing digital asset management productivity

Maximize ROI by optimizing digital asset management productivity

Over the years, Digital Asset Management (DAM) has transformed from a digital media storage hub to a solution with the addition of improved collaboration, automation capabilities,…

3 minute read

NIST Privacy Framework – Governance, risk management and compliance

NIST Privacy Framework – Governance, risk management and compliance

In this blog, we will focus on the importance of Governance, Risk Management, and Compliance (GRC) programs within the NIST Privacy Framework. Having an organizational…

4 minute read

Getting the best performance from your Digital Asset Management system

Getting the best performance from your Digital Asset Management system

Performance is an essential component when implementing any solution and is critical for acceptance by the end users, administrators, consumers, upstream and downstream processes/components. When…

3 minute read

4 key areas for successful information management transformation

4 key areas for successful information management transformation

Enterprise technology and digital transformation programs are notoriously challenging. A recent Harvard Business Review (HBR) article stated: “Success requires bringing together and coordinating (a) far greater…

4 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.