Security

Equipping threat hunters: Advanced analytics and AI part 1

As cyber threats grow more sophisticated through AI-powered malware, zero-day exploits, and state-sponsored attacks, organizations face an increasing challenge in safeguarding their digital assets. The…

September 17, 2024 6 minute read

Epic endpoints

By 2025, there will be 80 billion devices worldwide connecting to the Internet of Things (IoT). That’s the equivalent of 152,000 devices connecting every minute….

4 minute read

Security is Job 1

Businesses are operating in a zero-trust environment. Every year, the World Economic Forum releases its Global Risks Report to identify and analyze the most pressing…

4 minute read

Information is at the heart of your business

Even though digital information is evolving at a rapid pace, the world is still document-centric. Documents, whether created by a human or generated by a…

4 minute read

Delivering the Intelligent and Connected Enterprise

It is a new world. The Latin term for this is Mundus Novus. In the new world, industries are facing a series of challenging macro-trends…

4 minute read

Identity and Access Management is pivotal for GDPR compliance

GDPR is finally with us, and within just hours of it becoming law Google and Facebook were hit with privacy complaints that could lead to fines…

7 minute read

Bring your own identity (BYOI)

In March, Grand View Research suggested that the Identity and Access Management (IAM) market will be worth over $24 billion by 2020. This healthy growth…

7 minute read

The benefits of site-to-site VPNs when moving to the cloud

The Virtual Private Network (VPN) has been an important part of enterprise computing for many years. For many companies, it remains a key method to…

7 minute read

From identity provisioning to managing IoT ecosystems

More and more enterprises have begun their journey towards digital transformation. They are creating entirely new types of digital ecosystems that include people, applications, systems…

6 minute read

On-premises or in the cloud? Which is best for my EDI capabilities?

EDI (electronic data interchange) is increasingly important today for businesses large and small. You need to be able to trade quickly and efficiently with your…

8 minute read

7 key things forensic investigators need to do

Law enforcement, government agencies and corporate enterprises alike count on their digital forensic technology to keep evolving alongside their growing needs. In 2017, OpenText™ acquired…

3 minute read

Announcing OpenText Content Services 16 EP4

The adoption and consumption of content services are fueling advances in automation and integration. Together, they’re changing the way we work, the way we design…

8 minute read

Integration and automation let cybersecurity teams do more with less

OpenText™ EnCase™ Endpoint Security 6.04 is the newest release of our leading endpoint detection and response (EDR) solution. With the increasing sophistication of cyber-attacks, incident…

3 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.

Sign up