Security
Securing AI Deployments: Striking the Balance
The recent IT leaders CIO MarketPulse survey by Foundry underscores that data must be ready for AI. If it’s not accurate, accessible, and secure, organizations…
New logical imaging feature now available with OpenText Tableau TX1 2.0
OpenText™ is excited to announce the release of the new Logical Imaging feature for the Tableau Forensic Imager TX1 2.0. This major release is available…
• 3 minute read
Learn digital forensic skills to advance your career
The landscape of digital forensic investigations is continually evolving. Skilled investigators are in high demand and organizations need to ensure their investigative staff are properly trained…
• 3 minute read
What makes a great CIAM platform?
The growth of Consumer Identity and Access Management (CIAM) has been phenomenal. The first CIAM systems only started to appear around 2014, but today almost…
• 6 minute read
Security begins with consistency, reliability and predictability
In today’s digital landscape, security has to be a top priority for organizations. With cyberattacks and information breaches happening every day, it’s important to have…
• 1 minute read
Treating digital risk at Banner Health
As high-profile data breaches make headlines around the world, cybersecurity has quickly become a C-level priority. To keep pace with rapidly evolving technologies, many organizations…
• 2 minute read
The importance of consumer IAM in the world of the ‘digital-savvy’ customer
Consumer Identity and Access Management (CIAM), also known as B2C IAM, is still relatively new but it is rapidly becoming a ‘must have’ for any…
• 7 minute read
What is direct connection outsourcing and what can it offer you?
Direct connection sounds like a great way of exchanging EDI documents with your trading partners. A single point-to-point connection between you and your partner provides…
• 7 minute read
Continuous monitoring and advanced threat detection for the global enterprise
Information Security Continuous Monitoring (ISCM) projects can be expensive, data and network intensive implementations which often end in frustration for global organizations. Common approaches to…
• 3 minute read
GDPR puts focus on the security of your EIM solutions
In its report, The role of technology in your GDPR strategy, IDC identifies EIM technologies as central to achieving compliance with the EU’s General Data Protection…
• 6 minute read
Announcing OpenText EnCase Advanced Detection
Malware detection, while important, is a daily occurrence. As the cyber security industry shifts from legacy anti-virus to Endpoint Protection Platforms (EPPs), we’re in danger…
• 4 minute read
Charting the future of Documentum with OT2
When OpenText™ acquired Documentum in 2017, we committed to protecting our customers’ existing investments in both Documentum and Content Server. With OpenText™ OT2, announced at…
• 1 minute read
When good B2B Managed Services turns bad
The promise of B2B Managed Services is great. According to Ovum, good B2B Managed Services can cut operating costs by at least 40% over doing it yourself,…
• 7 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.