Cyber-attacks dominate headlines, but the October 20, 2025, AWS service disruption is a stark reminder that all forms of IT and cloud service outages can have an outsized impact, and as a result need to be prepared for.
Dependency demands preparedness
Cloud infrastructures offer unprecedented agility, scalability, and speed, but they are not immune to failure. Especially as modern enterprises grow deeply intertwined with hyperscale cloud providers, the potential ripple effects of an outage or breach are massive. This dependency results in vulnerability. Applications stall, services halt, and digital operations across industries, from banking to healthcare, experience disruption. A single service interruption can cascade into multi-layered disruptions affecting business continuity, customer trust, and regulatory compliance.
Resilience requires more than redundant infrastructure. It demands visibility, governance, and preparedness across data, applications, and identities. At OpenText, we view events like this as catalysts for organizations to re-examine their cyber resilience strategies, ensuring that when outages, breaches, or disruptions occur, operations continue, and data remains secure.
Cyber resilience is built on data security and speed
As outlined in OpenText’s Cyber Risk Primer for 2025, at its core, resilience is the organization’s ability to minimize the likelihood of disruptions, reduce their impact, and recover swiftly. It is the ability to optimize business continuity.
This begins with strong data discovery and classification capabilities, to uncover where the most sensitive and mission-critical data exists. Once identified, organizations must protect their data with critical functionalities such as end-to-end encryption, across its lifecycle and across multi-cloud and hybrid environments. They need a unified data security platform that provides visibility and control to ensure that data remains protected, compliant, and available, even when cloud environments falter.
Cyber resilience also necessitates the ability to detect, investigate, and recover from incidents as quickly as possible. Digital forensics and security operations capabilities that leverage AI and automation for real-time threat detection and response help enterprises to maintain control and mitigate disruption to the business, even amid chaos.
The way forward: build resilience by design
The AWS outage underscores a fundamental truth: no cloud provider, no system, and no organization is immune to disruption. Resilient enterprises prepare for the inevitable by embedding resilience across every layer of their digital ecosystem.
To future-proof your operations:
Adopt a data-centric security strategy – Protect the data itself, not just the perimeter.
Implement continuous monitoring and threat detection – Gain visibility into vulnerabilities before they become incidents.
Automate incident response – Reduce human latency in decision-making during crises.
Prioritize recovery and business continuity – Align cybersecurity investments with operational resilience goals.
Closing thought
Resilience is not built in the cloud. It’s built into the organization. At OpenText, we help enterprises strengthen that foundation. From data discovery and protection to automated incident response and forensic recovery, we empower organizations to withstand disruption, safeguard trust, and keep business moving—no matter where the next outage strikes.
The 25.4 release of OpenText™ Fax Private Cloud is one I’ve really been looking forward to. This release introduces Fax Aviator AI, a brand-new set of intelligent assistants that change how you handle faxes. They take on the heavy lifting so you can focus on the real work. And that’s not all. There are plenty of updates across the platform that make everyday tasks smoother, faster, and more secure. Let me walk you through the highlights and give you some real-world examples of how they make a difference.
Fax Aviator AI
With this release, we’re introducing four assistants: Assist, Route, Summary, and Extract.
Fax Aviator Assist helps guide you through tasks so you are never unsure about what to do next.
Fax Aviator Route gets faxes into the right hands without manual intervention.
Fax Aviator Summary condenses long faxes into a short overview.
Fax Aviator Extract pulls out key details you can use right away in other systems.
Think about a healthcare provider faced with a 20-page referral fax. Instead of reading the whole thing, they get a clear summary highlighting the patient’s condition and treatment recommendations. In insurance, Extract can grab claim IDs and policy numbers, so adjusters spend time resolving cases rather than retyping data. In wealth management, Route ensures sensitive client forms always find their way to the right back-office team. And in government, Assist supports staff who might not use faxing every day but need to complete the process quickly and correctly. The benefit here is time saved, fewer errors, and less manual work. And if you are running OpenText Fax in the cloud, you’ll unlock the full power of Aviator AI because that’s where these assistants truly shine.
Web applications
We refreshed the web apps with a cleaner design and added the option to reveal password fields when needed. The advantage is simplicity. A modern look makes training new staff easier and even small touches like password visibility remove everyday frustrations.
Cloud Connect options
You can now choose a Europe-based server for OpenText™ Fax Cloud Connect. This is important for organizations that need to comply with local data residency rules. A bank operating across the EU can stay compliant without adding more complexity to its processes.
Enterprise Fax Manager and Web Admin
We extended field lengths, added debugging options, and gave admins the ability to create or modify destination tables right in Web Admin. We also made user management easier with linked accounts and user pickers. The real benefit is flexibility. For a government department handling many different routing rules and user types, these tools reduce frustration and give admins the freedom to manage environments the way they need to.
FaxUtil and FaxUtil Web
Fax history now captures more detail such as who resent a fax. We made scrolling smoother, added access to archived faxes via Web Delivery URL, and built in safeguards to prevent duplicates. FaxUtil Web now also lets you search for other users when routing or forwarding. The impact is greater visibility and trust. In healthcare, you can confirm which staff member forwarded a referral. In finance, compliance officers can easily see the trail of who handled a document. Transparency reduces errors and strengthens accountability.
New integrations
The Outlook Add-in now works with Microsoft 365 and on-prem Exchange. There is also a brand-new Salesforce integration so users can send and receive faxes directly in Salesforce. This is a real productivity boost. A financial advisor manager can send client documents directly from Outlook while staying in their email workflow. An insurance agent can process claims within Salesforce without ever leaving the customer record. Less context switching means more time for customers.
Post fax processing
We added support for EU time formats and introduced an option to skip errored faxes. This is especially useful for global teams. A European hospital network benefits because logs and reports now follow local time standards. Skipping erroneous faxes also keeps workflows moving without unnecessary delays.
MFP connector and managed services
We added sentinel files that make sure attachments are complete before sending, HTTPS transfers for security, VPN-free connectors for SAP and AWS, and longer timeouts for registering MFP connectors. The Email Gateway can also now use file drop or POP3 for outbound faxing. The result is reliability. A government office scanning records at a multifunction device no longer has to worry about missing attachments or failed transfers. The system checks itself before sending, which prevents mistakes before they happen.
Security enhancements
We strengthened the platform with updated TLS defaults, AWS Secrets Manager for private cloud secrets, 12-character minimum passwords, and support for AS-SIP. The importance here is clear. For banks and insurance companies, strong security is non-negotiable. These changes give you a secure foundation right out of the box and make it easier to stay compliant without extra effort from staff.
Deprecated features
We removed older runtimes and components, eliminated the option to disable strong passwords, and announced that this is the last release to include the Notes Module. SMTP Gateway is the path forward. The benefit is a leaner and more secure platform. By moving away from legacy components, the system is easier to maintain and less vulnerable.
OpenText Fax CE 25.4 is more than an update. It introduces AI-powered assistants that transform how you handle faxes and delivers improvements across the board to make the platform easier, faster, and more secure. If you are in healthcare, finance, insurance, government, or any other sector where faxes are still mission-critical, this release will make a noticeable difference. And if you are running OpenText Fax in the cloud, you’ll see the full potential of Fax Aviator AI helping you work smarter every day.
OpenText™ Fax (RightFax™) 24.4 introduces a suite of enhancements and new features designed to streamline digital fax communications, simplify administration, and improve system integration. For existing OpenText Fax customers looking to transition their fax software and telephony to the cloud, this release is particularly significant. It offers robust cloud connectivity options and advanced authentication features that facilitate a smooth migration, ensuring minimal disruption while enhancing overall performance and security.
Streamlined installation process
The installation process in OpenText Fax 24.4 has been significantly refined. The typical client installation no longer relies on Microsoft Outlook, simplifying the deployment process. Moreover, the updated Print-to-Fax Web application can be either pushed directly to users or installed by them, providing added flexibility for IT departments.
Enhanced database and connectivity options
Administrators will appreciate the new features in database management. The SQL connection interface now includes options to select specific drivers and enable multi-subnet failover, ensuring a more resilient connection in complex network setups. Additionally, improvements in the maintenance process contribute to a more efficient and scalable system performance.
Advanced routing and additional EMR integration capabilities
OpenText Fax 24.4 introduces robust enhancements in routing and integration:
Session Initiation Protocol (SIP) routing: The system now supports SIP routing by utilizing the Request-URI or To fields of incoming SIP messages, offering more precise control over routing configurations.
Meditech EMR integration: Healthcare providers benefit from the ability to send patient documents directly from the Meditech interface, thereby streamlining clinical workflows.
Improved user experience and flexibility
Several user-focused improvements enhance the overall experience by enabling users to receive faxes via multiple inbound routing methods that offer a customized approach beyond the traditional fax mailbox, while support for tenant hosting in Shared Services environments ensures the platform scales effectively for multi-tenant operations. Additionally, the Identity and Access Manager now supports the MFP App in Managed Services environments without requiring a VPN connection, allowing users to easily view and print recently received faxes directly from their devices. Now confirmation page menu option is available for failed faxes.
Strengthened authentication and cloud connectivity
The release brings significant upgrades to both authentication and cloud connectivity. Administrators now have the flexibility to rename authentication providers thanks to enhancements in the OpenID Connect configuration interface, which simplifies identity management. Additionally, the update introduces NTLM authentication for proxy connections and offers new connection options, including an Australian connection and a PC.
Advanced administrative tools and reporting
This latest version also focuses on enhancing administrative capabilities. With improvements to EFM and Web Admin, new hyperlinks now enable administrators to quickly access services showing recent errors or warnings, while enhanced dialing rule management simplifies system oversight through options to duplicate and toggle rules. Meanwhile, the FaxUtil and FaxUtil Web modules have been refined with a confirmation page for failed faxes, expanded display options for cover sheet notes, an extended inactivity timeout of up to 480 minutes, and the ability to print directly from the browser. Reporting has also been upgraded where the Server Usage report now supports summarization by server, group, or user, and custom reports can be added easily to provide deeper insights into system performance. In addition, the Worker Host and Integration Modules now allow administrators to suspend Worker Host processes directly from the Status window and configure retry settings for Post-Fax Processing, adding both resilience and flexibility to system management.
OpenText Fax 24.4 marks a significant step forward in enhancing fax communications. With modernized platform support, streamlined installation, robust routing options, and advanced administrative tools, the update delivers a more efficient, secure, and user-friendly experience. Organizations, whether small or large, will find that these improvements help to simplify daily tasks and optimize overall system performance. For more information about our digital fax server software, visit our OpenText Fax website.
OpenText™ Knowledge Discovery (IDOL) provides a data analytics platform for enterprises who need to extract maximum value from all their text, audio, video, and image data, from any repository in any file format. Providing data extraction, data enrichment, precise search and knowledge discovery, Knowledge Discovery helps organizations discover valuable information they did not know they had, whilst also identifying compliance risk associated with document contents such as personally identifiable information (PII) using entity grammars.
With an unparalleled history in artificial intelligence and machine learning, Knowledge Discovery provides a unique set of optimized models to fit any application, accelerating time to value. Connecting and gathering information from diverse locations with over 160 connector types, including Public and Private Cloud and On-Premise, Salesforce, Microsoft® 365, Google Workspace and OpenText Content Solutions and can access and retrieve information and knowledge from over 2000 file types.
October 2025: What’s new in OpenText Knowledge Discovery CE 25.4
OpenText Knowledge Discovery CE 25.4 further enhances capabilities for AI content management, improving connector capabilities, named entity recognition, as well as multimedia recognition, search, and review.
Analyze, enrich, and protect content by collections in OpenText Content Management
OpenText™ Knowledge Discovery now connects out of the box with OpenText™ Content Management collections. Administrators can now mark collections for automated ingestion. This enables enrichment such as generating summaries, transcribing audio and video, redacting sensitive data, and auto-tagging metadata – all without manual setup. The result: faster content preparation, stronger compliance, and better findability.
Filter video clips
The Discover application now gives users the ability to focus on relevant moments with additional clipping and filtering tools, simplifying video review.
New video clipping tool in the Discover application of OpenText Knowledge Discovery CE 25.4 .
Improvements to content and metadata enrichment
Speech-to-text now supports multi-channel audio, separating agent and client voices for clearer transcription – ideal for contact center analytics and compliance.
Named Entity Recognition (NER) adds grammar support for Oman and UAE, improving sensitive data detection and governance for customers managing content from these countries.
Smarter Document processing
The updated universal redaction flow processes long documents page by page and outputs searchable PDFs. This makes redaction faster, more accurate, and easier to review.
The enhanced ExecuteDocumentPython processor simplifies customization. Developers can now build and modify workflows faster with persistent module support and improved guidance.
Connector updates
The updated Atlassian Confluence connector simplifies deployment and improves security. Customers can now connect to cloud or on-premises Confluence instances without installing plug-ins—reducing maintenance effort and keeping mapped security consistent across environments.
July 2025: What’s new in OpenText Knowledge Discovery CE 25.3
OpenText™ Knowledge Discovery CE 25.3 enhances AI search, improves performance, reduces compute costs, broadens global coverage, and helps investigators connect insights across complex data.
Aviator Search is fully integrated into OpenText Knowledge Discovery
Aviator Search is now built into OpenText™ Knowledge Discovery. Users can perform GenAI-driven, natural-language searches across multiple content repositories from a single, integrated platform.
Performance and efficiency improvements
Speech-to-text and facial recognition are now faster and more efficient, reducing overall compute and power consumption.
Added OCR language
OCR now supports the Hong Kong Supplementary Character Set, expanding language support.
Connection & LLM integrations
The Discover application embedded video player adds preprocessing for review and snapshot generation, helping investigators capture relevant frames and move from visual evidence to analysis faster.
To see everything that’s new in CE 25.3, check out the full release notes.
May 2025: What’s new in OpenText Knowledge Discovery CE 25.2
This OpenText Knowledge Discovery (IDOL) CE 25.2 release includes various functional and performance improvements, new connectors, file format support, and many other additions.
New connectors
Improved OpenText Information Archive connector – An updated bidirectional connector for the Information Archive repository allows it to archive data as well as search and understand previously archived data.
New Guidewire connector – A searching connector enables the ingestion of contract and policy content into the OpenText Knowledge Discovery index.
Named Entity Recognition – Landmarks exposed to pre-process
Defined improvements in Named Entity Recognition – Added elements for Turkish Address, more city names in NZ Addressand the NZ Social Welfare number.
Defined improvements inPCI – Added extra delimiters for card details, in names and medical details, as well as expanded landmarks for Telephone context matching.
PII Japanese names accuracy improved – Increased accuracy of Named Entity Recognition detecting Japanese names, and improved ability to correctly identify Japanese names within a document.
Opentext File Content Extraction updates and other improvements
File formats – New Design Web Format (DWF) filter support, metadata now available from password-protected iWork files and additional formats detected.
Performance improvements – A reduction in the iWork reader disk footprint as well as a reduction of the footprint of the common third-party libraries.
Easier access to HTML Export from Filter – Improved ability to select XMP metadata elements and subfile extraction arguments added to C++ API
OEM platform – OEM Easier fault diagnosis with library-wide logging, improved security of inter-process mechanisms and better HTML Export fidelity for DWG Docs.
January 2025: What’s new in OpenText Knowledge Discovery CE 25.1
Organizations are looking to access all their Enterprise Data; but in a world where 90% of existing corporate knowledge is in Unstructured formats, over 50% of organizations are not tapping into this aspect of their knowledge with any form of discovery. Customers can use OpenText Knowledge Discovery with new interfaces, including using Natural language questioning to reach their information securely across all users.
This OpenText Knowledge Discovery (IDOL) CE 25.1 release includes various functional and performance improvements, new connectors, file format support, and many other additions.
New APIs added
PII named entity resolution REST API – created a published REST API to access OpenTex Named Entity Recognition for PII functionality. Simplifies the adoption of Knowledge Discovery Al technology by internal and external OEMs
Rich-Media analysis REST API – created a published REST API to access all Rich Media analytics functionality. Simplifies the adoption of Knowledge Discovery Al technology by internal and external OEMs
Ingest and connectors
New OpenText DAM connector
A highly functional connector to the OpenText DAM product. This allows OpenText Knowledge Discovery to ingest and enrich content from the DAM repository and keep the data synchronized between the two systems to provide DAM content filtering using the Search Abstractor API
Improved security in OpenText Content Management (Extended ECM) Connector
Increased alignment of document security policies between OpenText Content Management and OpenText Knowledge Discovery
OpenText Content Management has numerous document security models above and beyond document folder based, where possible these have now been mapped to OpenText Knowledge Discovery’s understanding of access rights
OpenText Named Entity Recognition – Landmarks exposed to pre-process
Defined grammar landmarks are now visible at the pre-process stage of OpenText Named Entity Recognition
Pre-processing can significantly help in reducing latency and workload, landmarks can be used to help make selection decisions at this early stage. DLP OEM vendors will benefit from this.
PII Thailand names accuracy improved
Increased accuracy of OpenText Named Entity Recognition detecting Thai names – the new grammar has an improved ability to correctly identify Thai names within a document
Deployment and other improvements
Automatic scaling OpenText Knowledge Discovery platform for Kubernetes
Published Helm charts to deploy OpenText Knowledge Discovery with the ability to automatically scale resource – deployment size flexibility along with simplified expansion as and when required
Vault integration with OpenText Knowledge Discovery components
OpenText Knowledge Discovery microservices can securely store passwords and keys in the Vault repository (or equivalent)
Customers will benefit from cloud deployment best practice of secure central storage of passwords and keys etc.
December 2024: What’s new in OpenText Knowledge Discovery CE 24.4
Organizations are looking to access all their enterprise data; but in a world where 90% of existing corporate knowledge is in unstructured formats, over 50% of organizations are not tapping into this aspect of their knowledge with any form of discovery. Customers can use Knowledge Discovery with new interfaces, including using natural language questioning to reach their information securely across all users.
This OpenText Knowledge Discovery (IDOL) 24.4 release includes various functional and performance improvements, new connectors, file format support, and many other additions.
New API added
Search Abstractor Rest API – created to support conversational question and answering with better context for AI generated responses. Conversation server, working with FAQ answers through Answer bank, Fact bank and now LLM’s remembers the context of questions within the conversations service in Knowledge Discovery. Adding to the great governance provided by curated answers.
Filtering support in the Search Abstractor adds parametric fields for pre-filtering of documents. The search results can provide microscopic view of either single or multiple documents through criteria for fine grain filtering. The searching can now utilise prior knowledge to allow focus on RAG document retrieval, by using parametric fields to build a subset of entities for RAG.
Working across text documents and images simultaneously in the search abstractor. Searching can now take criteria of both text and images as search criteria, and the results will also include similar images making Multi Modal search available.
Ingest & connectors
Salesforce – Updating the connector to stay up to date with the changes in Salesforce.
Additional Pre filtering for focused selection added to OpenText Core Content Management & OpenText Content Management.
IBM FileNet P8 Each document in FileNet can have multiple binary files which we now interrogate.
Text analytics
Analytics: LLM based image matching – Image based transformers can be used to generate vectors for the Knowledge Discovery (IDOL) Index. Customers can now search for similar images based on not just the textual description but also the actual image content.
Media Server
The Media Server as a NiFi Processor is now available with full functionality. This allow NiFi workflows and the ability to scale and manage the Media Server app though Nifi clustering.
Demo application with abilities to process and analyze images and other functionalities is now available in the Media Server for ease of use.
File content extraction
Filtering of Source Code comments
Support added for Metadata output for .mht files & QuickTime (.mov) files.
Extended format detection, with support for 93 additional file formats.
In HTML Export the pdf2sr reader to extract images from pages in a PDF file, you can now configure the size of the images to produce.
Deployment & other improvements
HELM charts for Kubernetes provide a comprehensive set of options to assist complex deployments. With the 24.4 release we bring further enhancements to our HELM charts.
Named Entity Recognition SDK: You can load multiple grammars and then dynamically turn off what it is not needed for a particular document, allowing the flexibility of swapping grammars with less degradation of performance in comparison to the loading unloading cycle of grammars. The new thing is a reducing of the overall impact of this process.
July 2024: What’s new in OpenText Knowledge Discovery (IDOL) CE 24.3
OpenText Knowledge Discovery CE 24.3 is a significant release for the third quarter of CY24. There is an increasing need for companies to reach a greater variety of data, which adds to the complexity of their search types. We allow all customers to achieve a suitable response in their enterprise-wide search across all levels of an organization.
Now part of Content Services, the combination of best of breed products will help organizations who are looking to access all their corporate knowledge through enterprise search. Bringing additional abilities to derive deeper insights, reach actionable conclusions quicker, and gaining a new level of investigative analytics, across content, teams, and projects. Document level security is also enhanced, with extra features to report and export securely and track data delivery end to end.
The Knowledge Discovery CE 24.3 release includes various functional and performance improvements, new connectors, file format support, and many other additions.
The main improvements in version CE 24.3 are listed below:
Ingest
Microsoft Teams, Zoom, Cisco Webex and Google Chat connectors – New connectors allow customers to collect collaborative video meetings for retrospective analysis and/or content retrieval as part of aviator search.
Text Analytics
Search abstractor – Customers will have better context provided by the RAG to pass on to the GenAI, therefore experiencing a higher likelihood of a correct answer being produced.
Specific document retrieval – Customer can ask the system to find and return a specific document that matches their unique specification.
Rich Media Analytics
OCR improvement – Improved OCR for better support of scrolling text. Customers will experience a higher accuracy of extracted text from video imagery.
Speaker ID improvement – Customers will experience a higher accuracy of Speaker ID from video or audio files.
KeyView
Added Audio and Video to the Export SDK.
Added 30 new formats to File detection.
Metadata API Improved to limit duplicated data.
New .NET API.
Added support for Python 3.12.
Solutions
Knowledge Discovery Discover – Discover provides investigative analytics and advanced UI for searching and analyzing relations between objects, with project and team collaboration along with full oversight on the analytics process.
Knowledge Discovery for Microsoft Exchange – Knowledge Discovery can be added as a BOT in MS Exchange allowing customers to directly access the functionality via simple natural language prompts emailed to a BOT email address in MS Exchange.
Deployment & Licensing changes
All components are now published to the Public Docker Hub repository to allow easier installation, maintenance and upgrades.
Eduction Python EDK – Customers who prefer to program using the popular Python language can now use it to control our Eduction engine, simplifying their integration experience.
Eduction for Windows ARM – OEM users of Eduction EDK can now deploy on Windows ARM systems.
Additional license feature
From CE 23.2, we are introducing an additional license feature – a “version.key”
The file is available in the SLD portal for customers with an active support contract and is required for all Knowledge Discovery installations running CE 23.2.
New key will be issued with every future Knowledge Discovery release.
April 2024: What’s new in OpenText Knowledge Discovery (IDOL) CE 24.2
Organizations are looking for conversational access to enterprise data; in a world where 90% of existing corporate knowledge is in unstructured data, over 50% of organizations are not tapping into this aspect of their knowledge with any form of discovery. Customers can use the new interfaces with Q&A using natural language questioning to deliver their information with data securely to all users.
This OpenText IDOL 24.2 release includes various functional and performance improvements, new connectors, file format support, and many other additions.
New solution added: Teams client
Customers can access functionality using simple natural language prompts directly via the Teams interface.
Ingest & connectors
Drupal Connector – Updated to support the latest API changes and allow data extraction from old and new Drupal versions.
Google Workspace Connectors – Content extraction is now accessible from the major Google Workspace apps including Mail, Calendar and Chat using dedicated connectors.
Web Connector 2FA – Updated to allow 2Factor Authentication.
Additional new connectors – Stack Exchange; Moodle and OpenText eDocs.
IDOL Media Server – Can now run within NiFi, allowing processing of media streams & sources.
Text analytics
Analytics: Search abstraction – IDOL can now automatically decide which index type to use to achieve the best response. The functionality abstracts the complexity of search types, democratizing Enterprise search, and allowing all users to achieve a suitable response, across all levels of an organization.
Multi-document summarization – Generative summary compiled from answers sourced from multi documents. The functionality provides richer answer to any question asked as it can be the combination of multiple parts sourced from different documents.
Dynamic clustering of vector results to identify grouping – Customers can use the grouping of results to select a variation in documents returned rather than returning very similar documents with no added information.
Analytics: LLM based image matching – Image based transformers can be used to generate vectors for the IDOL Index. Customers can now search for similar images based on not just the textual description but also the actual image content.
Media Server
The Media Server as a NiFi processor is now available with full functionality. This allow for NiFi workflows and the ability to scale and manage the Media Server app though Kubernetes.
Demo application with abilities to process and analyze images and other functionalities is now available in the Media Server for ease of use.
KeyView
Tabular data detection for One Note & pipe separated text.
OCR is now available on MacOS through the KeyView SDKs.
Header & Footer are now configurable through Python APIs.
Significant Performance improvements through Shared Memory Streaming.
HELM charts for Kubernetes provide a comprehensive set of options to assist complex deployments. CE 24.2 brings further enhancements to our HELM charts.
Eduction SDK Post-processing access to match context.
As outlined in the TechStrong article, a CMDB serves as a single source of truth for an organization’s software and hardware. IT discovery automatically collects hybrid IT asset data across multi-cloud containers and on-premises IT and stores it in the CMDB. OpenText Universal Discovery and CMDB excels in this role by providing comprehensive visibility across your entire IT infrastructure.
The article identifies that when organizations experience unplanned downtime, the goal should be to return to normal operations quickly. This requires an accurate record of the IT infrastructure. This is exactly what OpenText Universal Discovery and CMDB delivers through automated, real-time discovery and relationship mapping.
The TechStrong piece emphasizes a critical challenge: many companies use software and hardware from multiple vendors, often requiring more than one IT discovery tool. This is where our IT discovery provides significant value. Unlike tools that only work with certain systems, our IT discovery tool integrates with a wide range of systems from multiple vendors.
Our IT discovery automatically identifies, collects, and organizes information about all components in your IT environment—from hybrid cloud platforms to on-premises infrastructure. This comprehensive approach enhances efficiency. It also reduces costs by minimizing the resources required for data collection, while ensuring that recent changes are captured through frequent iterations.
Our CMDB stores the detailed attribute information that the article identifies as crucial. These include configuration item history, location, owner, function, and relationships to other assets. This comprehensive catalog provides a clear picture necessary during disaster recovery planning, offering a complete view of systems and applications required to restore normal operations.
The article’s example of server “naqa-c01-vm11” demonstrates the type of comprehensive discovery data that OpenText delivers automatically. We provide server inventory, network connections, running software, associated ports, business applications, and load balancing configurations. Our IT discovery captures all this information through a single tool. This provides the complete picture necessary to rebuild systems should they become unavailable.
As the TechStrong analysis emphasizes, the CMDB itself must be included in your backup and recovery strategy. OpenText Universal Discovery and CMDB addresses this requirement through our flexible deployment options. We offer SaaS, cloud, or on-premises deployment. With our SaaS offering, OpenText replicates your configuration data, so it remains protected and recoverable.
The article also draws attention to the need to support both pre-disaster planning and post-disaster recovery activities. A comprehensive catalog of IT assets enables clear disaster recovery planning by identifying systems necessary to restore normal operations. We provide detailed checklists for rehearsals and plan activation.
When disasters occur, OpenText Universal Discovery and CMDB provides an accurate and timely view of IT infrastructure. This enables teams to focus their recovery efforts, determine priorities, and identify the components needed to restore normal operations.
How can a CMDB build confidence in my recovery strategy?
The TechStrong piece says that incorporating a CMDB gives IT professionals a confidence boost when responsible for restoring business continuity after a disaster. OpenText Universal Discovery and CMDB changes this confidence from hope into conviction through comprehensive, accurate, and automatically maintained infrastructure intelligence.
CISOs and application security leaders today are under pressure from all directions. Attack surfaces continue to expand with APIs, mobile apps, and AI-enabled development multiplying the number of potential entry points Gartner CISO Guide. Regulatory expectations are mounting, with new mandates requiring organizations to prove not just that they fix vulnerabilities, but that they do so quickly and consistently.
And then there’s the backlog. Every AppSec leader knows it: thousands of issues sitting unresolved, piling up release after release, undermining risk management goals and creating friction between security and development.
The reality is that traditional, late-stage security testing is no longer sustainable. By the time vulnerabilities surface, fixing them costs more, slows delivery, and leaves the business exposed. What’s needed is a shift in mindset, from managing backlogs to preventing them in the first place.
That’s where build-phase security comes in.
The true cost of late fixes
For years, the software industry has known that the cost of fixing vulnerabilities increases dramatically the later they are discovered in the SDLC. Estimates vary, but a commonly cited figure is that post-production fixes cost 10x more than fixes during coding or build.
This cost manifests in multiple ways:
Developer inefficiency: Developers pulled away from current work to revisit old code lose productivity and velocity.
Operational overhead: Emergency patching cycles consume precious IT resources and often create downtime risks.
Customer trust and brand damage: Vulnerabilities discovered in production aren’t just technical issues, they’re reputational liabilities.
By shifting vulnerability discovery and remediation into the build phase, organizations address these costs head-on. Developers fix issues while the context is fresh. Security becomes part of the development rhythm, not an afterthought. And CISOs can demonstrate to the board that security investments are directly reducing operating costs and business risk.
From reactive to proactive risk reduction
Backlogs are more than a resource problem, they are a risk problem. Every unresolved critical or high-severity vulnerability represents a potential breach, compliance failure, or reputational crisis.
Build-phase security flips the equation. Instead of chasing down issues after code has shipped, organizations can stop entire classes of vulnerabilities before they ever reach production. With modern tools like OpenText™ SAST, OpenText DAST, and OpenText SCA integrated into CI/CD pipelines, teams can catch:
Injection flaws in custom code
Insecure open-source dependencies
API misconfigurations
Secrets and IaC weaknesses
All before the application ever leaves development.
The business impact is significant: fewer exploitable issues in production, reduced attack surface, and measurable progress toward enterprise risk reduction goals. For boards and regulators asking, “How do we know we’re safer this quarter than last?”—this is the answer.
The compliance imperative
Compliance is no longer a box-ticking exercise. Frameworks such as GDPR, PCI DSS, and sector-specific mandates now expect demonstrable secure development practices and continuous risk management.
Build-phase security provides a compliance advantage in three ways:
Continuous proof: Integrated testing creates an audit trail showing that vulnerabilities were identified and remediated before release.
Policy-driven governance: Automated rules in the pipeline enforce compliance standards, such as blocking releases with unresolved critical issues, removing subjectivity.
Scalability: Instead of scrambling before audits, organizations maintain a state of continuous compliance, reducing fire drills and audit fatigue.
For CISOs, this is a chance to transform compliance from a burden into a competitive differentiator.
The role of AI in accelerating results
One of the historic challenges of shifting left has been the burden on developers. False positives, noisy scans, and unintuitive tools create resistance. But modern advances—particularly AI-powered auditing and remediation—are changing the equation.
Filter out false positives with human-level accuracy.
Provide contextual explanations in plain language for why an issue matters.
Offer copy-paste remediation guidance for true positives.
This means developers spend less time wading through noise and more time fixing real issues. For AppSec leaders, it’s a direct productivity and ROI gain: the same teams can handle more vulnerabilities, faster, without burnout.
Breaking through the backlog
How do organizations actually move from backlog to breakthrough? Successful programs share a few common steps:
Bake security into the pipeline: Integrate OpenText SAST, DAST, and SCA directly into CI/CD workflows so vulnerabilities are identified automatically at build time.
Set clear “stop the build” policies: Define thresholds (e.g., no release with critical vulns) and enforce them consistently.
Empower developers: Equip dev teams with contextual remediation advice and secure coding training to build resilience against future vulnerabilities.
Measure and report: Track not just vulnerability counts, but mean time-to-remediate, percentage of issues fixed pre-release, and compliance pass rates.
Continuously improve: Use OpenText ASPM dashboards and risk analytics to refine policies, prioritize investments, and demonstrate ongoing ROI.
The leadership mandate
For CISOs and security executives, the mandate is clear: application security can no longer be an afterthought or a siloed program. It must be an enabler of innovation and a measurable driver of risk reduction .
Shifting vulnerability remediation into the build phase achieves all three objectives:
Financial: Lower remediation costs and faster ROI on security investments.
Risk-based: Fewer vulnerabilities in production, reducing the likelihood of breaches and compliance failures.
Regulatory: Continuous compliance with an auditable trail that satisfies regulators and customers alike.
From backlog to breakthrough: A call to action
The old approach, letting vulnerabilities pile up and hoping security teams can catch up, no longer works. The backlog is not just a technical problem; it’s a business risk.
CISOs who embrace build-phase security can move their organizations from firefighting mode to proactive resilience. They can turn AppSec from a cost center into a value driver, demonstrating clear returns to executives and boards.
It’s time to stop thinking in terms of vulnerability backlog. The breakthrough is here: fix it in build and stop vulnerabilities before they ever become a business problem.
With that, let’s focus on OpenText Identity Manager. This feature is available in the most recent versions. So, if you are on an older version, here is a gentle nudge to upgrade to the latest. (Check out the OpenText™ Identity Manager version chart.)
5 Reasons to consider an upgrade
Upgrading an identity management platform is never just a routine exercise — it’s a strategic enabler. Here are key motivations:
Stronger security posture: Newer releases bring updated cryptographic libraries, patched CVEs, and support for modern TLS/SSL standards.
Better observability & governance: Tools like ACDI, now more deeply integrated. They provide built-in analytics, audit trails, and dashboards reducing dependence on external or homegrown tooling.
Feature velocity and usability: Upgrades deliver enhancements to installers, consoles, workflows, and user experience. These improve productivity and lower operational friction.
Support and lifecycle alignment: Staying current keeps you in the vendor’s active maintenance and support window. This delivers continued access to fixes, patches, and expert assistance.
Reduced future upgrade risk: By keeping your deployment relatively close to the cutting edge, you avoid large “jump” upgrades later that might introduce more migration pain.
One of the most compelling reasons in recent releases is the maturation of ACDI (Audit, Compliance & Data Intelligence) as a first-class module in IDM. It makes observability, auditability, and compliance more of a baked-in capability than a bolt-on.
Spotlight on ACDI (Audit, Compliance & Data Intelligence)
ACDI is the analytics, audit, and monitoring module embedded into modern OpenText Identity Manager (NetIQ) releases. Its value lies in giving identity teams a unified view into system health, change events, historical snapshots, and compliance workflows. And all of this happens from within the IDM ecosystem.
Key ACDI capabilities
Event capture & logging: ACDI can monitor identity events (attribute changes, driver syncs, workflow steps) across IDM components.
Historical snapshots / temporal data views: You can compare vault state over time, identify trends, and investigate past deviations.
Dashboards and reports: Prebuilt dashboards for system health, driver performance, errors, and audit metrics help administrators detect anomalies.
Drill-down forensic capabilities: From a high-level report you can navigate into specific changes, which user made them, when, and what the consequences were.
Compliance & audit readiness: ACDI’s built-in logs and reporting help satisfy audit regimes (SOX, GDPR, internal policies) without stitching together external log aggregators.
ACDI resides inside IDM and uses its drivers and event feeds. So, it reduces latency, architectural complexity, and the need for custom logging reflections.
When you upgrade to versions that support or require enhanced ACDI integration (e.g. 24.4+), you gain immediate access to better observability and governance.
Ships with OpenSSL 3.0.15 and support for TLS 1.3 in intra-component communication.
For upgrades from earlier versions (4.7.5, 4.8, 4.9), TLS 1.2 is still permitted unless TLS 1.3 is explicitly enabled.
Platform / OS support updates
Adds official support for Red Hat Enterprise Linux (RHEL) 9.4.
Installer & configuration improvements
The installer now prompts for the master keystore password during setup.
Identity Console setup (for UI components) gets more intelligent defaults.
The SAP HANA driver is packaged within the deliverables, simplifying deployment.
Identity Applications / UX enhancements
The new Task History view lets users see their past tasks (requests, approvals, etc.), and authorized admins can see others’ history.
Overall, 24.4 is a robust base that modernizes the cryptographic stack, strengthens installation flows, and ushers in incremental user experience improvements.
Continuity & cumulative updates 25.2 furthers the evolution of IDM by building on prior fixes, tightening edge cases, and preserving backward compatibility where possible.
Analyzer compatibility update If you already have Analyzer deployed, it must be upgraded to version 4.8.5 to maintain compatibility with IDM 25.2.
Given that 25.2 doesn’t reinvent the wheel but tightens and stabilizes, the biggest leap is from earlier legacy versions up into 24.4 (for TLS, usability, and base modernization). From there, moving to 25.2 is lower risk but still beneficial for stability and cumulative fixes.
Upgrade strategy & tips (with ACDI in mind)
Audit your current environment Map all connectors, custom drivers, workflows, external integrations, and certificate/keystore usage.
Check versions of related components Make sure your Designer, Analyzer, Identity Console, etc., are all updated to versions compatible with target IDM. (E.g. Analyzer must move to 4.8.5 for 25.2.)
Stage environment & smoke test Deploy 24.4 in a test environment first, validate all connectors, workflows, event flows, and certificate changes (TLS). Then later upgrade that environment to 25.2 and test again.
Deploy ACDI early Once you’re on 24.4, enable ACDI and begin collecting event data so that when you arrive at 25.2 you have historical context and visibility.
Backup & rollback planning Always snapshot databases, keystores, identity vaults, and configuration before each upgrade stage.
Monitor via ACDI dashboards Use ACDI to track component health, driver latency/failures, resource consumption, and anomalous event activity.
Phased rollout Start with lower-risk systems or less critical connectors, then expand to the full production footprint after validation.
Engage vendor documentation and support Read the full release notes (beyond the “What’s New” or summary pages), watch for known issues, hotfixes, or patches that are only available via support.
Conclusion
Upgrading to IDM 24.4 (v4.10), and subsequently to 25.2 (4.10.1), is a strategic move to future-proof your identity infrastructure. The 24.4 baseline brings modern cryptography, smarter installers, and improved user workflows, while 25.2 continues the evolutionary polishing, stabilization, and compatibility hardening. Most importantly, ACDI’s closer integration in these releases turns identity audit, compliance, and observability from a burdensome add-on into a native capability — helping your team detect issues faster, prepare for audits, and manage your IDM deployment proactively.
If you’ve ever worked in healthcare, banking, or government, you know the stakes are high when it comes to moving information. Patients can’t wait for records to arrive. A financial transaction can’t be delayed because a document sat in someone’s fax queue. Agencies can’t risk a leak of sensitive data. For all the talk about email and messaging apps, faxing continues to be the trusted way to send documents when compliance, legal recognition, and reliability matter most.
The problem is that the old way of doing fax with racks of servers, expensive telecom lines, and constant maintenance just doesn’t fit the way modern organizations operate. It slows teams down and piles on costs. That’s where cloud faxing changes the game. By shifting this critical function to a secure cloud model, organizations keep the trust and compliance that fax has always delivered, while gaining the flexibility and efficiency of the cloud.
Where OpenText Core Fax really shines
OpenText™ Core Fax was designed with real-world challenges in mind. It gives IT teams peace of mind because they no longer need to worry about managing hardware or troubleshooting outages. It gives compliance officers confidence because the platform meets strict industry regulations across the globe. And it gives everyday users, clinicians, claim processors adjudicators, administrators, and government clerks a communication tool that simply works without getting in the way of their job.
What makes OpenText Core Fax powerful is how easily it fits into existing workflows. Whether through APIs, mobile apps, or integrations with popular storage and productivity platforms, faxing becomes just another seamless step in the digital process. You don’t think about “faxing” anymore, you think about getting work done, securely and reliably.
A rollup release
The latest release of OpenText Core Fax consolidates updates from versions 25.3 and 25.2, incorporating their cumulative enhancements into a single, unified build. Along with these rollup improvements, this release includes targeted security reinforcements and foundational framework updates designed to support forthcoming FedRAMP-related compliance efforts. Collectively, these advancements represent a meaningful step forward in platform stability, security, and regulatory readiness.
Speaking your language
Many organizations operate across borders. Now, the Core Fax web client, management portal, and admin tools support Spanish, making it easier for teams in diverse regions to work comfortably in their own language.
Stronger identity and access management
Customers asked for more modern authentication options, and Core Fax now supports OpenID Connect for single sign-on. This makes it easier for IT teams to align faxing with the same secure identity standards used across the enterprise.
A better mobile experience
The updated XM SendSecure Android app has a refreshed design, including dark mode. That’s not just about looks, it’s about making the app easier on the eyes and more consistent with how employees expect apps to feel today.
Certifications that build trust
With new SOC 2 and HITRUST certifications, Core Fax continues to raise the bar on compliance. Customers in healthcare and finance in particular gain added assurance that their data is protected according to the toughest standards.
Real-time transparency
Core Fax service status is now published on the OpenText Status Dashboard. Customers can subscribe to updates, so they’re never left guessing about availability.
Building toward the future
This release also lays the groundwork for something bigger: FedRAMP certification. When deployed within the OpenText Google Cloud environment, Core Fax is preparing for FedRAMP compliance by focusing on security and audit capabilities.
The platform is now FIPS compliant, which means it adheres to the Federal Information Processing Standards. These standards aim to protect sensitive data with controls on secure encryption, authentication, and data integrity. For U.S. federal agencies, FIPS compliance is often mandatory. For customers, it ensures that Core Fax uses robust, federally recognized encryption to reduce the risk of data breaches and meet rigorous government standards.
The truth is, no one gets excited about “faxing”
Nobody wakes up excited about faxing. However, what excites our customers is staying focused on their daily workflows and finding ways to be more effective in serving their clients. OpenText Core Fax takes the burden off their shoulders by ensuring information moves securely and quickly, without them ever having to think about it. For a doctor, that means life-saving records arrive exactly when needed. For a financial institution, it means loan approvals flow without delay. For a government agency, it means citizen data stays protected while essential services continue without interruption.
OpenText Core Fax is built for those real-world moments. With every release, it becomes smarter, more secure, and more adaptable to the way organizations actually work. That’s why it’s more than a cloud fax service. It’s peace of mind that the information you depend on will get where it needs to go, every time.
Cybersecurity Awareness Month is winding down and so is our White Hat Hacking campaign. All month, we invited you to play along: Meme Monday, Puzzle Tuesday, White Hat Wednesdays, Education Thursday, Fun Friday. The aim was simple: make security accessible while sharpening real skills that help teams spot trouble sooner. Games and puzzles aren’t fluff; they train the pattern-recognition muscles analysts rely on every day.
Our theme for our Puzzle Tuesday finale is direct: Catch Threats Faster. Identify advanced threats before the damage is done. That’s not a slogan. It’s the operating mandate for every modern SOC. The adversary is getting faster, smarter and more elusive. We need to be outpace, outsmart and outmaneuver them.
What we learned from Puzzle Tuesday
Each Tuesday riddle mirrored a real detection challenge: noisy signal, hidden intent, limited time. You told us the best puzzles were the ones with a “click”, that moment when scattered clues resolve into a single story. That’s exactly what analysts need in production: less noise, more context. It’s why we continue investing in OpenText™ Core Threat Detection & Response. It’s designed to help SOC teams cut through the noise, focus on high-risk behavior, and effortlessly adapt to evolving threats while reducing manual overhead. The product premise is clear: proactively surface insider, novel and advanced attacks with AI-driven, automated and contextually relevant anomaly detection, then streamline the path to action with behavioral indicators enriched with threat intelligence and MITRE ATT&CK mapping.
The speed problem (and how we solve it)
CISOs face an operational paradox: more threats, more alerts, more expectations—but not more people. Boards and regulators expect faster and more effective detection and preemptive intervention to mitigate compliance, operation and reputation risks . Throwing tools at the problem creates fragmentation. The fix is better and faster signal, not more signal.
This is where AI, done right, moves the needle. In our CISO’s guide to an AI-enhanced SOC, we outline how large language models and enhanced RAG pipelines convert high-volume telemetry into explainable insight. Not black-box guesses but auditable reasoning tied to the MITRE ATT&CK framework, with intelligent automation to enable an analyst to make the right decision faster without getting bogged down with irrelevant data. The result: faster understanding and higher confidence, without extra headcount.
Catch threats faster: four moves that work
1) Start with behavior, not signatures. Insider, novel and advanced persistent threats don’t announce themselves. Behavioral analytics establish a baseline for every user and device, then highlight subtle drift that rules miss, including credential misuse, unusual access paths, or suspicious process chains. This approach reduces alert fatigue by elevating only the events that matter without the noise of false positives.
2) Turn anomalies into narratives. Detection is step one. Decision is the goal. Mapping alerts to MITRE ATT&CK with context and sequence gives analysts “you are here” clarity across the kill chain. Contextual narratives link precursor activity to follow-on actions, shortening triage and speeding containment. That’s the difference between a queue of alerts and a case you can close.
3) Automate the drudgery, not the judgment. Automate threat hunting with enrichment, clustering, and correlation while keeping human decision-making in the loop for actions. Our design principle: threat hunting automation that is explainable, so teams can scale without risking blind, irreversible moves.
4) Make speed sustainable. Platform changes, org changes, and travel patterns constantly shift “normal.” Our unsupervised machine learning keeps baselines current without rules rewrites and near constant tuning, preserving precision week after week.
Puzzle Tuesday → SOC Tuesday: turn patterns into action
Here’s how to translate the weekly puzzle habit into everyday SOC practice:
#1 Get the true picture – Find the missing pieces to complete the puzzle. Remove blind spots and unmask hidden threats so analysts don’t miss a beat in stopping some of the hardest to find threats.
#2 Beat the clock – Time is of the essence. Intelligent automation from self-learning analytics to built-in correlation and threat intelligence enrichment enables analysts to accelerate decisive actions with confidence
#3 Level up the skills – Imagine junior puzzlers turning into puzzle prodigies. Analysts at all levels can outmaneuver some of the most advanced bad actors.
What’s under the hood (in plain English)
Behind the scenes, Core Threat Detection & Response uses behavioral analytics powered by unsupervised machine learning to baseline entities and spot (and quantify) changes in behavior, then correlate, enrich with threat intelligence, and map behaviors against the MITRE ATT&CK framework to detect threats score them based on real risk. You get higher-value alerts and guided responses without the noise of false positives. The platform onboards fast using native cloud integrations, which means your team starts seeing results which might take too long or might not be achievable at all previously.
Thank you for playing—now let’s keep winning
White Hat Hacking was designed to celebrate defenders who think like adversaries and act like teammates. The community showed up by solving puzzles, sharing memes, and swapping techniques. The takeaway is durable: practice pattern recognition, demand context, and keep the secure path the fastest path.
If you missed an episode, start here: our Cybersecurity AwarenessHub lists the campaign format (including Puzzle Tuesday) and ongoing resources you can reuse with your teams. Then take a closer look at how OpenText Core Threat Detection & Response helps SOCs catch advanced threats before damage is done. For a deeper dive on the AI that makes it work—and how to use it safely—grab the CISO’s guide to an AI-enhanced SOC.
Cybersecurity Month happens once a year. Catching threats faster is an everyday discipline. Let’s keep the momentum, and the muscle memory, going.
The COVID-19 pandemic exposed critical gaps in government supply chain visibility.
Billions were spent on medical supplies while lacking real-time tracking of deliveries, quality, or fraud prevention. When the estimated need for N95 respirators hit 3.5 billion units, the actual US stockpile contained just 30 million. That’s less than 1% of what was needed.
We all saw the consequences play out in real time: healthcare workers reusing masks, states competing for supplies, and billions flowing to vendors with little accountability. The pandemic didn’t create these vulnerabilities; it simply revealed what was already broken.
Today, as agencies work to strengthen their supply chains, they face new pressures: geopolitical tensions, more frequent climate-related disasters, and complex global procurement networks. The question isn’t whether another crisis will test government supply chains. It’s whether your agency will be ready when it does.
The multi-billion-dollar wake-up call: why traditional procurement fails under pressure
Here’s the uncomfortable truth: Traditional government procurement processes, built over decades in departmental silos, break down during emergencies. As recent analysis shows, agencies struggled with supply chain coordination during COVID-19 because data are often stored in silos, which prevents interoperability.
Consider the complexity facing the Department of Defense (DOD). The DOD alone works with over 200,000 suppliers involved in manufacturing everything from advanced weapons to non-combat goods. Yet, a 2025 GAO report found that efforts to improve supply chain transparency remain uncoordinated across the department.
This lack of coordination is a significant issue because subcontracting, material costs, and transfers between companies account for more than 80% of total direct costs. Without visibility into these deeper tiers, agencies are operating with a critical blind spot that is both financially inefficient and a national security risk.
The Real-World Pain Points:
Procurement officers lost visibility into vendor performance during critical periods.
Emergency managers couldn’t track essential supplies in real-time or across agency lines.
Audit directors faced incomplete records for billions in emergency spending, making post-crisis verification nearly impossible.
Traditional procurement processes—built on periodic reporting, manual tracking, and phone calls—simply buckle when demand surges or when documentation requirements multiply.
How modern track & trace creates end-to-end supply chain visibility
The private sector knows the value of visibility. The track and trace solutions market surpassed
$6.82 billion in 2023 and is projected to grow at 17.2% annually through 2032. Modern track and trace technology creates end-to-end visibility that government systems desperately need.
Key Capabilities of Advanced Track & Trace:
Real-time Tracking: See exactly where supplies are, from order placement to delivery. This is essential for coordinating disaster response across multiple federal, state, and local agencies.
Predictive Analytics: Get an early warning system for potential disruptions. Know when a supplier faces delays or when weather threatens a route before it becomes a crisis.
Multi-modal Visibility: Integrate tracking seamlessly across all transport methods: road, rail, sea, and air.
Automated Compliance: Built-in audit trails and regulatory reporting (like FAR and DFARS) are generated automatically, transforming compliance from a manual burden to an automated process.
The Benefits to Government:
Stronger National Security: Gain clarity of supply chain components and sub-contractor sourcing
Supply Chain Resilience: Insights into when your supply chain may be at risk based on the health of the suppliers or channel overcapacity, with recommendations for alternatives.
Real-Time Inventory Insights: Ensure you are ordering from a supplier who has what you need with the capability of delivering where you need it.
Faster Delivery: Reduce order cycle times
Improved Reliability: Advanced systems achieve 95% fill rates compared to the industry average of 85%
Cost Savings: Centralized platforms deliver savings through better rate optimization, asset utilization, and route planning
Building a unified government supply chain command
The challenge for government isn’t just adopting new technology but integrating it across decades-old systems and multiple agencies. A unified digital supply chain management platform is essential to overcome this without initiating a costly and time-consuming “rip-and-replace” strategy.
For a government-grade solution, the platform must do more than just connect. It must provide:
Rapid Scaling and Integration: Connect with vast, pre-verified supplier and logistics provider networks such as the trusted vendor lists maintained at Defense, Treasury, and GSA.; critical for quickly onboarding new partners during crises.
Content Governance and Compliance: Ensure automated audit trails and document management are captured in a format ready to quickly resolve differences between government and suppliers and/or support Freedom of Information Act (FOIA) requests.
Data Sharing for Coordination: Enable secure, multi-agency data sharing to ensure everyone is working from the same real-time information, a critical need during emergencies where minutes matter.
From logistics gaps to fleet readiness: a defense agency success story
Agencies that have implemented advanced track and trace solutions are moving from theoretical improvements to measurable, mission-aligned outcomes.
A major military command, challenged by inconsistent quality reporting (PQDR), limited real-time asset visibility, and a reliance on reactive maintenance, sought a solution to modernize its vehicle readiness and supply chain operations.
By deploying OpenText’s unified platform for Internet of Things (IoT) data and component traceability, the command achieved the following transformation:
Real-time Fleet Readiness: Gained real-time visibility and predictive insights using IoT to reduce vehicle downtime and improve overall fleet readiness.
Maintenance Efficiency: Digitized repair workflows via QR-enabled kiosks, which improved accuracy, speed, and communication across maintenance depots. This replaced manual repair processes and feedback loops.
Component Compliance: Established end-to-end traceability of critical vehicle components, enhancing compliance and improving the speed of recall responsiveness.
Operational Agility: Consolidated asset tracking and quality reporting onto a single platform, which reduced manual effort and increased overall operational efficiency.
This success story demonstrates the power of a clear vision for modernization, aligning predictive maintenance and component traceability with mission-critical needs for readiness and digital transformation.
Moving forward: assess your supply chain maturity
The vulnerabilities COVID exposed haven’t disappeared, and the complexity of modern supply chains continues to grow. If your agency is still relying on periodic reports and manual tracking, or if compliance documentation is a scramble rather than a click, it’s time to intentionally assess where you are and develop a modernization roadmap.
The next crisis won’t wait. But with the right visibility, the right integration, and the right approach to supply chain management, your agency doesn’t have to just react to it. You can be ready for it.
Ready to build a resilient, transparent, and proactive government supply chain?
Learn more about how modern digital supply chain solutions are helping government agencies build resilience and improve operations with OpenText.
Delivering great customer experiences isn’t just about staying competitive—it’s about staying relevant. That’s why OpenText™ World 2025 is the place to be for innovators, creators, and problem-solvers who want to push the boundaries of what’s possible.
This year, the Experience Cloud track takes the stage in Nashville—where creativity, collaboration, and conversations flow together in perfect harmony. Join us to see how OpenText™ Experience Cloud helps organizations connect every moment, message, and piece of content into a smarter, more scalable customer journey.
1. See the future of AI-powered CX in action
I’m thrilled to be co-delivering the Experience keynote, “Powering smart, scalable CX in uncertain times,” alongside our Heads of Product and Software Engineering. Together, we’ll show how Experience Cloud is redefining customer engagement through AI, content, and conversation.
You’ll see how leading brands like Citizens Bank and The Standard are unifying content, communications, and media to accelerate time to value and build agility into every experience. From AI-driven automation and GenAI-assisted content creation to cloud-native orchestration, we’ll explore what’s next for customer experience—and how you can turn every interaction into a meaningful conversation.
2. Dive deeper and get hands-on
Beyond the keynote, explore how Experience Cloud turns ideas into impact:
Then step into the Aviator Playground our hands-on AI lab, to experiment with Experience Aviator innovations, talk to our engineers, and see what’s next for Experience Cloud.
3. Connect, collaborate, and be inspired
From executive roundtables to industry forums, OpenText World is built for collaboration. Swap insights with peers in financial services, healthcare, utilities, manufacturing, and the public sector – and catch our fast-paced Turbo Talks in the Expo for bite-sized demos that show Experience Cloud in action.
Don’t miss your chance to lead what’s next
The pace of CX innovation is accelerating. Join us in Nashville to see how Experience Cloud is transforming the way organizations connect with customers, employees, and partners through intelligent, AI-driven engagement.
👉 Register today and be part of the conversation that defines the future of CX.