Security

Securing AI Deployments: Striking the Balance

The recent IT leaders CIO MarketPulse survey by Foundry underscores that data must be ready for AI. If it’s not accurate, accessible, and secure, organizations…

May 10, 2024 8 minute read
New logical imaging feature now available with OpenText Tableau TX1 2.0

New logical imaging feature now available with OpenText Tableau TX1 2.0

OpenText™ is excited to announce the release of the new Logical Imaging feature for the Tableau Forensic Imager TX1 2.0. This major release is available…

3 minute read

Learn digital forensic skills to advance your career

Learn digital forensic skills to advance your career

The landscape of digital forensic investigations is continually evolving. Skilled investigators are in high demand and organizations need to ensure their investigative staff are properly trained…

3 minute read

What makes a great CIAM platform?

What makes a great CIAM platform?

The growth of Consumer Identity and Access Management (CIAM) has been phenomenal. The first CIAM systems only started to appear around 2014, but today almost…

6 minute read

Security begins with consistency, reliability and predictability

Security begins with consistency, reliability and predictability

In today’s digital landscape, security has to be a top priority for organizations. With cyberattacks and information breaches happening every day, it’s important to have…

1 minute read

Treating digital risk at Banner Health

Treating digital risk at Banner Health

As high-profile data breaches make headlines around the world, cybersecurity has quickly become a C-level priority. To keep pace with rapidly evolving technologies, many organizations…

2 minute read

The importance of consumer IAM in the world of the ‘digital-savvy’ customer

The importance of consumer IAM in the world of the ‘digital-savvy’ customer

Consumer Identity and Access Management (CIAM), also known as B2C IAM, is still relatively new but it is rapidly becoming a ‘must have’ for any…

7 minute read

What is direct connection outsourcing and what can it offer you?

What is direct connection outsourcing and what can it offer you?

Direct connection sounds like a great way of exchanging EDI documents with your trading partners. A single point-to-point connection between you and your partner provides…

7 minute read

Continuous monitoring and advanced threat detection for the global enterprise

Continuous monitoring and advanced threat detection for the global enterprise

Information Security Continuous Monitoring (ISCM) projects can be expensive, data and network intensive implementations which often end in frustration for global organizations. Common approaches to…

3 minute read

GDPR puts focus on the security of your EIM solutions

GDPR puts focus on the security of your EIM solutions

In its report, The role of technology in your GDPR strategy, IDC identifies EIM technologies as central to achieving compliance with the EU’s General Data Protection…

6 minute read

Announcing OpenText EnCase Advanced Detection

Announcing OpenText EnCase Advanced Detection

Malware detection, while important, is a daily occurrence. As the cyber security industry shifts from legacy anti-virus to Endpoint Protection Platforms (EPPs), we’re in danger…

4 minute read

Charting the future of Documentum with OT2

Charting the future of Documentum with OT2

When OpenText™ acquired Documentum in 2017, we committed to protecting our customers’ existing investments in both Documentum and Content Server. With OpenText™ OT2, announced at…

1 minute read

When good B2B Managed Services turns bad

When good B2B Managed Services turns bad

The promise of B2B Managed Services is great. According to Ovum, good B2B Managed Services can cut operating costs by at least 40% over doing it yourself,…

7 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.