New interactive demo: Broad Spectrum DAG in action

Last November at OpenText World, we introduced attendees to new OpenText product integrations for identifying and securing sensitive unstructured data. In what we termed “Broad-Spectrum…

Buck Ted Gashler  profile picture
Buck Ted Gashler

February 02, 20262 min read

Last November at OpenText World, we introduced attendees to new OpenText product integrations for identifying and securing sensitive unstructured data. In what we termed “Broad-Spectrum Data Access Governance,” the solution not only meets the requirements for data assessment, management, and monitoring in data access governance (DAG) as defined by Gartner1, but also expands those requirements to include data discovery and certification and attestation through access reviews.

The Broad-Spectrum DAG introduction included a blog post detailing the product integration work between OpenText Core Data Discovery & Risk Insights, OpenText Data Access Governance, with its comprising products – OpenText File Reporter and OpenText File Dynamics, and OpenText Identity Governance.

Since the announcement, people have been eager to see how Broad-Spectrum DAG works. We’ve demonstrated it to a few customers and even made a video. Still, we’re really excited about an interactive demo that you can run yourself.

The scenario in the demo is as follows:

A security analyst needs to:

  1. Identify sensitive files located in the Finance folder. Also, to classify and tag these files based on their associated risk (using OpenText Core Data Discovery & Risk Insights).
  2. Identify who has access to these files and determine how these users are gaining that access (using an integration with File Reporter).

A security data owner then needs to:

  1. Monitor and protect the Finance folder data so that only authorized users have access to these sensitive files (using OpenText File Reporter and OpenText File Dynamics – components of OpenText Data Access Governance).

A line-of-business manager then needs to:

  1. Provide multiple line-of-business managers with the ability to perform access reviews and provide attestation that only authorized users have access to these sensitive files (using an integration between OpenText File Reporter and OpenText Identity Governance).

When you run this interactive demo, you play the role of each of these individuals through the interface of each product.

This is an image of the home page screen of the Broad-Spectrum DAG Demo.
A menu lets you choose which area of the demo you want to focus on. You can return to the menu at any time by clicking the menu button in the bottom-right corner.
This is a second screenshot showing which files contain credit card information.
Using OpenText Core Data Discovery & Risk Insights to determine whether files contain credit card information.
This is a screenshot from Data Discovery & Risk Insights showing that shows that an engineer in the IT department has access to highly sensitive finance files including credit card information.
Determining who has access to the sensitive files containing credit card information through OpenText File Reporter.
This is a screenshot from OpenText File Reporter showing that a Finance Manager will get noticifed and will be able to  view the audit logs related to finance data.
Establishing a security policy in OpenText File Dynamics to notify a specified data owner of any changes to permissions on the Finance folder or any subfolders within the Finance folder.
This is a screen shot from OpenText Identity Governance performing an access review to correct improper access permissions for both unstructured data and applications.
Using OpenText Identity Governance during an access review to correct improper access permissions for both unstructured data and applications. Once corrected, OpenText Identity Governance will be the means of attesting to compliance with the organization’s policies and applicable regulations.

1See Gartner, Hype Cycle for Data Security Technologies, 2025, Andrew Bales, 10 July 2025 – ID G00828131

Share this post

Share this post to x. Share to linkedin. Mail to
Buck Ted Gashler avatar image

Buck Ted Gashler

See all posts

More from the author

What is Broad-Spectrum Data Access Governance?

What is Broad-Spectrum Data Access Governance?

OpenText is uniquely equipped to address its requirements and here is why.

November 12, 2025

5 min read

Data owners and their role in data management and security 

Data owners and their role in data management and security 

The exponential growth, regulations, and vulnerability of an organization’s stored data require an administrative approach to data management, with assigned roles and responsibilities over specific…

July 17, 2025

3 min read

Identifying risks for an internal data breach within unstructured data

Identifying risks for an internal data breach within unstructured data

Know the risk of your organization’s largest data set.

June 03, 2025

3 min read

Stay in the loop!

Receive regular insights, updates, and resources—right in your inbox.