Elevating digital forensics for enterprise cybersecurity

Unveiling OpenText Endpoint Investigator CE25.1

Peri Storey  profile picture
Peri Storey

March 28, 20254 min read

As we launch the latest version of OpenText™ Endpoint Investigator, CE25.1, I’ve been reflecting on the organizations that rely on our platform for their digital forensic investigations. Time and again, I’m impressed by the caliber of enterprise customers across industries. Fortune 500 companies in banking, insurance, healthcare, retail, manufacturing, and more who trust OpenText to meet their investigative needs.

For those unfamiliar with OpenText Endpoint Investigator, it provides organizations with the ability to conduct discreet, thorough internal investigation. It helps prevent financial loss, reputational damage, and legal exposure. Designed for modern enterprises, OpenText Endpoint Investigator seamlessly operates across laptops, desktops, servers, and mobile devices, regardless of whether employees are on-site or remote. Most importantly, it does all of this without disrupting workforce productivity.

The evolving role of digital forensics in cybersecurity

Not long ago, digital forensics was primarily associated with law enforcement or internal employee investigations. However, the role of cybersecurity in enterprise organizations has evolved significantly over the past five years. This is an evolution driven by increasing cyber threats, regulatory changes, and digital transformation. Today, digital forensics plays a critical role in helping organizations investigate, analyze, and respond to security incidents. Key areas include:

  1. Incident response & investigation – Identifying the source, method, and extent of a cyberattack enables organizations to respond swiftly and mitigate threats.
  2. Cybercrime detection & evidence collection – Recovering deleted or hidden files, logs, and traces of malicious activity ensures evidence is properly handled for legal proceedings.
  3. Malware analysis & threat intelligence – Investigating malware infections to understand their spread enhances cybersecurity defenses and provides insights into emerging attack techniques.
  4. Insider threat investigations – Detecting unauthorized access or data exfiltration helps organizations track internal security violations and enforce compliance policies.
  5. Fraud prevention & compliance – Supporting financial institutions in fraud detection ensures adherence to cybersecurity regulations (e.g., GDPR, HIPAA) and aids in audits and regulatory investigations.
  6. Network & system security enhancement – Identifying exploited vulnerabilities strengthens security protocols based on forensic findings.

What’s new in OpenText Endpoint Investigator CE25.1?

With these growing cybersecurity demands, OpenText Endpoint Investigator CE25.1 delivers powerful new capabilities to enhance digital forensic investigations and strengthen organizational cyber resilience. Here’s what’s new:

  • Enhanced web-based user interface – New rapid-response menus, seamless transitions between preview, collection, and response functions, and collaborative case capabilities streamline investigations.
  • Automated large-scale collections – Scale to more than 1,000,000 endpoints with concurrent collections across the enterprise. Specify the data you need collected from each endpoint. We seamlessly handle the rest by automatically identifying and deploying the appropriate collection method, whether it’s on-VPN or off-VPN.
  • Single enhanced universal agent – Benefit from uniform capabilities across Windows and macOS for simplified deployment and faster data collection.
  • Collection APIs – Automate evidence collection with API-driven snapshots, file collections, memory capture, and timeline generation to reduce manual effort and boost efficiency.
  • Integrated threat intelligence – Leverage a global network of sensors to detect emerging threats, allowing investigators to prioritize malicious items and prioritize them for immediate action.
  • Artifact-based workflows – Enhance investigative efficiency by quickly identifying relevant forensic artifacts alongside deep-dive forensic capabilities.
  • Automated agent deployment – Ensure a frictionless approach to data collection with agents that automatically push out, delivering endpoint check-ins every five minutes
  • Enterprise Endpoints Dashboard – Gain a comprehensive view of enterprise endpoints, offering visibility into agent deployment status and communication readiness.
  • Zero-Trust Compliance – Ensure reliable data collection and analysis while aligning with zero-trust security models.

Collect anything. Anywhere. Anytime. Any size.

At OpenText, we’re reimagining cybersecurity by enabling organizations to uncover the truth faster with forensic investigation results they can trust. Want to learn more? Visit Corporate Digital Forensic Investigation Software | OpenText to see how CE25.1 can elevate your digital forensic investigation capabilities.

Share this post

Share this post to x. Share to linkedin. Mail to
Peri Storey avatar image

Peri Storey

Peri Storey is a Senior Product Marketing Manager for OpenText Cybersecurity. Having spent her marketing career in the technology sector, Peri has focused on delivering brand recognition, go-to-market plans and lead-generation programs on a global scale. With a voice-of-the-customer approach, Peri is focused on solving the challenges associated with explosive data growth in a digital world.

See all posts

More from the author

Transforming digital forensic investigations

Transforming digital forensic investigations

In the modern landscape of digital forensics, investigators must navigate many challenges stemming from the exponential growth of digital data.

April 15, 2024

4 min read

Streamlining Data Collection for Investigations and eDiscovery

Streamlining Data Collection for Investigations and eDiscovery

Organizations are practically drowning in data today, which makes using that data effectively more challenging than ever. Additionally, the risks associated with protecting that data…

September 22, 2023

2 min read

Digital forensic device duplication – the next step

Digital forensic device duplication – the next step

Digital forensic imaging is defined as the processes and tools used in copying a physical storage device for conducting investigations and gathering evidence. This copy doesn’t…

February 17, 2023

3 min read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.