Security

Equipping threat hunters: Advanced analytics and AI part 1

As cyber threats grow more sophisticated through AI-powered malware, zero-day exploits, and state-sponsored attacks, organizations face an increasing challenge in safeguarding their digital assets. The…

September 17, 2024 6 minute read
Security begins with consistency, reliability and predictability

Security begins with consistency, reliability and predictability

In today’s digital landscape, security has to be a top priority for organizations. With cyberattacks and information breaches happening every day, it’s important to have…

1 minute read

Treating digital risk at Banner Health

Treating digital risk at Banner Health

As high-profile data breaches make headlines around the world, cybersecurity has quickly become a C-level priority. To keep pace with rapidly evolving technologies, many organizations…

2 minute read

The importance of consumer IAM in the world of the ‘digital-savvy’ customer

The importance of consumer IAM in the world of the ‘digital-savvy’ customer

Consumer Identity and Access Management (CIAM), also known as B2C IAM, is still relatively new but it is rapidly becoming a ‘must have’ for any…

7 minute read

What is direct connection outsourcing and what can it offer you?

What is direct connection outsourcing and what can it offer you?

Direct connection sounds like a great way of exchanging EDI documents with your trading partners. A single point-to-point connection between you and your partner provides…

7 minute read

Continuous monitoring and advanced threat detection for the global enterprise

Continuous monitoring and advanced threat detection for the global enterprise

Information Security Continuous Monitoring (ISCM) projects can be expensive, data and network intensive implementations which often end in frustration for global organizations. Common approaches to…

3 minute read

GDPR puts focus on the security of your EIM solutions

GDPR puts focus on the security of your EIM solutions

In its report, The role of technology in your GDPR strategy, IDC identifies EIM technologies as central to achieving compliance with the EU’s General Data Protection…

6 minute read

Announcing OpenText EnCase Advanced Detection

Announcing OpenText EnCase Advanced Detection

Malware detection, while important, is a daily occurrence. As the cyber security industry shifts from legacy anti-virus to Endpoint Protection Platforms (EPPs), we’re in danger…

4 minute read

Charting the future of Documentum with OT2

Charting the future of Documentum with OT2

When OpenText™ acquired Documentum in 2017, we committed to protecting our customers’ existing investments in both Documentum and Content Server. With OpenText™ OT2, announced at…

1 minute read

When good B2B Managed Services turns bad

When good B2B Managed Services turns bad

The promise of B2B Managed Services is great. According to Ovum, good B2B Managed Services can cut operating costs by at least 40% over doing it yourself,…

7 minute read

Decide the future of your enterprise with OT2

Decide the future of your enterprise with OT2

At OpenText™ Enterprise World 2018, we announced the availability of OpenText OT2, the next-generation hybrid-cloud platform that brings together intelligent automation, security, and EIM applications…

1 minute read

The importance of knowing ‘where’ in digital forensic analysis

The importance of knowing ‘where’ in digital forensic analysis

With so many devices, file systems, operating systems, user artifacts, application artifacts, and more, keeping-up with relevant knowledge is a real struggle. As examiners, we…

7 minute read

How Identity and Access Management helps meet the data protection requirements of GDPR

How Identity and Access Management helps meet the data protection requirements of GDPR

In my previous blog, I looked at how Identity and Access Management (IAM) can help with GDPR compliance. This time around, I’d like to go…

5 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.

Sign up