Security

Securing AI Deployments: Striking the Balance

The recent IT leaders CIO MarketPulse survey by Foundry underscores that data must be ready for AI. If it’s not accurate, accessible, and secure, organizations…

May 10, 2024 8 minute read
Decide the future of your enterprise with OT2

Decide the future of your enterprise with OT2

At OpenText™ Enterprise World 2018, we announced the availability of OpenText OT2, the next-generation hybrid-cloud platform that brings together intelligent automation, security, and EIM applications…

1 minute read

The importance of knowing ‘where’ in digital forensic analysis

The importance of knowing ‘where’ in digital forensic analysis

With so many devices, file systems, operating systems, user artifacts, application artifacts, and more, keeping-up with relevant knowledge is a real struggle. As examiners, we…

7 minute read

How Identity and Access Management helps meet the data protection requirements of GDPR

How Identity and Access Management helps meet the data protection requirements of GDPR

In my previous blog, I looked at how Identity and Access Management (IAM) can help with GDPR compliance. This time around, I’d like to go…

5 minute read

Epic endpoints

Epic endpoints

By 2025, there will be 80 billion devices worldwide connecting to the Internet of Things (IoT). That’s the equivalent of 152,000 devices connecting every minute….

4 minute read

Security is Job 1

Security is Job 1

Businesses are operating in a zero-trust environment. Every year, the World Economic Forum releases its Global Risks Report to identify and analyze the most pressing…

4 minute read

Information is at the heart of your business

Information is at the heart of your business

Even though digital information is evolving at a rapid pace, the world is still document-centric. Documents, whether created by a human or generated by a…

4 minute read

Delivering the Intelligent and Connected Enterprise

Delivering the Intelligent and Connected Enterprise

It is a new world. The Latin term for this is Mundus Novus. In the new world, industries are facing a series of challenging macro-trends…

4 minute read

Identity and Access Management is pivotal for GDPR compliance

Identity and Access Management is pivotal for GDPR compliance

GDPR is finally with us, and within just hours of it becoming law Google and Facebook were hit with privacy complaints that could lead to fines…

7 minute read

Bring your own identity (BYOI)

Bring your own identity (BYOI)

In March, Grand View Research suggested that the Identity and Access Management (IAM) market will be worth over $24 billion by 2020. This healthy growth…

7 minute read

The benefits of site-to-site VPNs when moving to the cloud

The benefits of site-to-site VPNs when moving to the cloud

The Virtual Private Network (VPN) has been an important part of enterprise computing for many years. For many companies, it remains a key method to…

7 minute read

From identity provisioning to managing IoT ecosystems

From identity provisioning to managing IoT ecosystems

More and more enterprises have begun their journey towards digital transformation. They are creating entirely new types of digital ecosystems that include people, applications, systems…

6 minute read

On-premises or in the cloud? Which is best for my EDI capabilities?

On-premises or in the cloud? Which is best for my EDI capabilities?

EDI (electronic data interchange) is increasingly important today for businesses large and small. You need to be able to trade quickly and efficiently with your…

8 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.