Security
-
The importance of consumer IAM in the world of the ‘digital-savvy’ customer
Consumer Identity and Access Management (CIAM), also known as B2C IAM, is still relatively new but it is rapidly becoming…
Read more -
What is direct connection outsourcing and what can it offer you?
Direct connection sounds like a great way of exchanging EDI documents with your trading partners. A single point-to-point connection between…
Read more -
Continuous monitoring and advanced threat detection for the global enterprise
Information Security Continuous Monitoring (ISCM) projects can be expensive, data and network intensive implementations which often end in frustration for…
Read more -
GDPR puts focus on the security of your EIM solutions
In its report, The role of technology in your GDPR strategy, IDC identifies EIM technologies as central to achieving compliance with…
Read more -
Announcing OpenText EnCase Advanced Detection
Malware detection, while important, is a daily occurrence. As the cyber security industry shifts from legacy anti-virus to Endpoint Protection…
Read more -
Charting the future of Documentum with OT2
When OpenText™ acquired Documentum in 2017, we committed to protecting our customers’ existing investments in both Documentum and Content Server.…
Read more -
When good B2B Managed Services turns bad
The promise of B2B Managed Services is great. According to Ovum, good B2B Managed Services can cut operating costs by at least…
Read more -
Decide the future of your enterprise with OT2
At OpenText™ Enterprise World 2018, we announced the availability of OpenText OT2, the next-generation hybrid-cloud platform that brings together intelligent…
Read more -
The importance of knowing ‘where’ in digital forensic analysis
With so many devices, file systems, operating systems, user artifacts, application artifacts, and more, keeping-up with relevant knowledge is a…
Read more -
How Identity and Access Management helps meet the data protection requirements of GDPR
In my previous blog, I looked at how Identity and Access Management (IAM) can help with GDPR compliance. This time…
Read more -
Identity and Access Management is pivotal for GDPR compliance
GDPR is finally with us, and within just hours of it becoming law Google and Facebook were hit with privacy complaints…
Read more -
Bring your own identity (BYOI)
In March, Grand View Research suggested that the Identity and Access Management (IAM) market will be worth over $24 billion…
Read more -
The benefits of site-to-site VPNs when moving to the cloud
The Virtual Private Network (VPN) has been an important part of enterprise computing for many years. For many companies, it…
Read more -
From identity provisioning to managing IoT ecosystems
More and more enterprises have begun their journey towards digital transformation. They are creating entirely new types of digital ecosystems…
Read more -
On-premises or in the cloud? Which is best for my EDI capabilities?
EDI (electronic data interchange) is increasingly important today for businesses large and small. You need to be able to trade…
Read more -
7 key things forensic investigators need to do
Law enforcement, government agencies and corporate enterprises alike count on their digital forensic technology to keep evolving alongside their growing…
Read more