Security

Unlocking AI potential for CISOs: A framework for safe adoption

Many organizations are in the exploratory phases of using Artificial Intelligence (AI). Some of these AIs include machine learning (ML), and natural language processing (NLP)…

May 6, 2024 7 minutes read
Decide the future of your enterprise with OT2

Decide the future of your enterprise with OT2

At OpenText™ Enterprise World 2018, we announced the availability of OpenText OT2, the next-generation hybrid-cloud platform that brings together intelligent automation, security, and EIM applications…

October 9, 2018 1 minute read
The importance of knowing ‘where’ in digital forensic analysis

The importance of knowing ‘where’ in digital forensic analysis

With so many devices, file systems, operating systems, user artifacts, application artifacts, and more, keeping-up with relevant knowledge is a real struggle. As examiners, we…

October 2, 2018 7 minutes read
How Identity and Access Management helps meet the data protection requirements of GDPR

How Identity and Access Management helps meet the data protection requirements of GDPR

In my previous blog, I looked at how Identity and Access Management (IAM) can help with GDPR compliance. This time around, I’d like to go…

September 20, 2018 5 minutes read
Epic endpoints

Epic endpoints

By 2025, there will be 80 billion devices worldwide connecting to the Internet of Things (IoT). That’s the equivalent of 152,000 devices connecting every minute….

September 19, 2018 4 minutes read
Security is Job 1

Security is Job 1

Businesses are operating in a zero-trust environment. Every year, the World Economic Forum releases its Global Risks Report to identify and analyze the most pressing…

September 12, 2018 4 minutes read
Information is at the heart of your business

Information is at the heart of your business

Even though digital information is evolving at a rapid pace, the world is still document-centric. Documents, whether created by a human or generated by a…

September 5, 2018 4 minutes read
Delivering the Intelligent and Connected Enterprise

Delivering the Intelligent and Connected Enterprise

It is a new world. The Latin term for this is Mundus Novus. In the new world, industries are facing a series of challenging macro-trends…

August 16, 2018 4 minutes read
Identity and Access Management is pivotal for GDPR compliance

Identity and Access Management is pivotal for GDPR compliance

GDPR is finally with us, and within just hours of it becoming law Google and Facebook were hit with privacy complaints that could lead to fines…

August 15, 2018 7 minutes read
Bring your own identity (BYOI)

Bring your own identity (BYOI)

In March, Grand View Research suggested that the Identity and Access Management (IAM) market will be worth over $24 billion by 2020. This healthy growth…

July 3, 2018 7 minutes read
The benefits of site-to-site VPNs when moving to the cloud

The benefits of site-to-site VPNs when moving to the cloud

The Virtual Private Network (VPN) has been an important part of enterprise computing for many years. For many companies, it remains a key method to…

July 2, 2018 7 minutes read
From identity provisioning to managing IoT ecosystems

From identity provisioning to managing IoT ecosystems

More and more enterprises have begun their journey towards digital transformation. They are creating entirely new types of digital ecosystems that include people, applications, systems…

June 18, 2018 6 minutes read
On-premises or in the cloud? Which is best for my EDI capabilities?

On-premises or in the cloud? Which is best for my EDI capabilities?

EDI (electronic data interchange) is increasingly important today for businesses large and small. You need to be able to trade quickly and efficiently with your…

June 2, 2018 8 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.