Technologies

Is your Contact Center as a Service PCI-DSS compliant?

Is your Contact Center as a Service PCI-DSS compliant?

Navigating the world of data security can sometimes feel overwhelming, however, understanding the Payment Card Industry (PCI) Data Security Standard it is crucial for anyone…

4 minute read

Embark on a journey to next-level personalization

Embark on a journey to next-level personalization

Unlock the power of personalization with 5 layers of maturity

4 minute read

What’s new in OpenText AppWorks

What’s new in OpenText AppWorks

OpenText™ AppWorks™ is a low-code development platform for building smart, engaging and easy-to-deploy process automation and dynamic case management applications. It empowers everyday users to quickly…

11 minute read

What’s new in OpenText Content Aviator

What’s new in OpenText Content Aviator

OpenText™ Content Aviator puts AI into the hands of business users to leverage conversational search, discover content, or even summarize a document or workspace, offering…

2 minute read

Self-service content and experience at your fingertips

Self-service content and experience at your fingertips

Serve up better DIY experiences for customers and employees across all touchpoints

4 minute read

What’s new in OpenText Aviator Search 

What’s new in OpenText Aviator Search 

OpenText™ Aviator Search allows customers to conversationally interrogate their data and discover answers easily and securely in order to gain critical business knowledge.

3 minute read

What’s new in OpenText Knowledge Discovery (IDOL)

What’s new in OpenText Knowledge Discovery (IDOL)

Customers trust OpenText™ Knowledge Discovery (IDOL) to help them ensure their high volume, critical business knowledge is discoverable, secure and easily accessible while adhering to privacy.

6 minute read

Three key aspects of being a threat hunter  

Three key aspects of being a threat hunter  

In today’s digital landscape, the role of a threat hunter has become indispensable. As cyber threats grow increasingly sophisticated, the need for professionals who can…

5 minute read

Enhancing Security Operations with OpenText Cybersecurity Services

Enhancing Security Operations with OpenText Cybersecurity Services

In today’s hyper-connected digital landscape, the proliferation of devices and applications has expanded the attack surface for potential cybersecurity threats. Cyberattacks are on track to…

4 minute read

Ensuring compliance with the NIS2 Directive 

Ensuring compliance with the NIS2 Directive 

In an increasingly digital world, the security of network and information systems is paramount. The European Union’s NIS2 Directive, a successor to the original NIS…

4 minute read

A study of threat hunters  

A study of threat hunters  

In today’s ever-evolving cybersecurity landscape, the role of threat hunters is becoming increasingly vital. These professionals are the frontline defenders against sophisticated cyber threats.

8 minute read

Ensuring AI-readiness with secure information management (SIM) 

Ensuring AI-readiness with secure information management (SIM) 

According to McKinsey, the enterprise use of Generative AI could generate an astounding $2.6 trillion to $4.4 trillion annually across more than 60 use cases….

5 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.