Security
-
Streamlining Data Collection for Investigations and eDiscovery
Organizations are practically drowning in data today, which makes using that data effectively more challenging than ever. Additionally, the risks…
Read more -
It’s time to modernize the public sector
With the increase in government directives related to digital technology, such as the NARA memorandum to transition federal agencies to…
Read more -
What OpenText Cybersecurity is bringing to the table at OpenText World 2023
With less than six weeks to go until OpenText World, the excitement for everything Cybersecurity is soaring. During the packed…
Read more -
What’s new in OpenText Identity and Access Management
August 2023: OpenText Identity and Access Management CE 23.3 The 23.3 release of the OpenTextTM Identity and Access Management platform…
Read more -
Connect with OpenText at Google Cloud Next 2023
Google Cloud Next 2023 is back in-person on August 29-31, in San Francisco. This is Google’s largest annual event with…
Read more -
What’s new in Application Modernization & Connectivity
The latest OpenText™ Cloud Editions includes updates to AMC’s COBOL, Enterprise Suite and Host Connectivity offerings – designed to support…
Read more -
OpenText innovations nurture talent to accelerate application modernization
Welcome to Visual COBOL 9.0 and Enterprise Suite 9.0, the latest releases delivered as part of our OpenText Cloud Editions…
Read more -
Obtaining a bearer token to enable API interaction
OpenText™ Network Detection & Response (NDR), previously known as Bricata Network Detection & Response, provides real-time network visibility, metadata generation…
Read more -
To upgrade, or not to upgrade…that is the question for enterprise software users
Upgrading a major software application can be challenging. Many factors come into play, including budget issues, downtime, upskilling the staff,…
Read more -
Government must view ESG in 3D
Citizens today are becoming increasingly aware of how their actions and the actions of the organizations they work with affect…
Read more -
One, two, three…steps to improve your eDiscovery review database security
There are many good reasons to be proactive when it comes to securing our data everywhere it lives. In legal…
Read more -
Recover your systems and data from disaster with confidence
Having a disaster recovery plan is critical to your organizations’ success. When a critical system goes down, whether from ransomware…
Read more -
Dissecting IcedID behavior on an infected endpoint
IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial…
Read more -
10 steps to combat the high cost of cyber insurance
As the frequency and scope of cyberattacks increases, so does the cost of cyber insurance. And the rise is dramatic.…
Read more -
The EnCase Evidence Viewer
OpenText™ EnCase™ Forensic software is one of the longest established digital forensic platforms on the market. It has been the…
Read more -
Digital forensic device duplication – the next step
Digital forensic imaging is defined as the processes and tools used in copying a physical storage device for conducting investigations and…
Read more -
Simplify security through a scalable platform for MSPs and SMBs
Our Managed Service Provider (MSP) partners are important to us, and at OpenText Cybersecurity, we’re proud to provide you with…
Read more -
Protect your “anywhere” workforce from web-based threats
The internet is part of everyday work life. Employees need to use the internet for countless work-related purposes, but without…
Read more -
Ride the digital ecosystem wave, securely
Connected digital ecosystems are forecast to generate one-quarter of all global revenue by 2030 – 80 trillion USD1, and businesses…
Read more -
Strengthen information protection with a Zero Trust Information Governance program
“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” – Sun…
Read more