Visionary keynotes, innovative demos, certification opportunities, educational breakouts—what more could you want from a technology conference? How about a bustling expo, a lively panel discussion with a well-known industry group, and one heck of a bash, Nashville style? We’ve got all this and more in store for you at OpenText World 2025.
OpenText World 2025: Elevate together
Join us in Nashville November 17-20 for 3 days of AI innovation, bold ideas, visionary speakers, and great music, of course. C’mon, let’s go!
Join us for three unforgettable days on the OpenText World show floor—a reimagined carnival of technology, insights, and connection. Don’t miss these highlights:
Aviator playground The centerpiece of the Expo is where enterprise-ready AI comes alive. Dive into interactive demos, build your own AI agents, and discover how Aviator transforms business outcomes.
Product and Innovation labs Get hands-on with the latest tech. Experiment, explore, and engage with OpenText’s cutting-edge solutions. Discover more about each lab here.
Theaters Hear from thought leaders, innovators, and customers in dynamic sessions that spark ideas and inspire action. Check out the theater sessions here.
Peer to peer: Customer connects Join casual, peer-led conversations where customers share real-world success stories and solutions to business challenges.
Topical meetups Join informal meetups with like-minded attendees. Share ideas, stories, and strategies. Check out the details here.
OpenText solutions Stop by our booths to engage with product specialists and explore how OpenText can help your organization work smarter and faster.
Sponsor conversations Talk with tech experts at our sponsors’ booths and discover products that help extend the OpenText ecosystem.
Games, fun, and good eats Refuel and recharge with delicious treats, interactive games, and surprise moments you won’t want to miss.
Women in Tech reception
Join us on Tuesday at 5:30 pm for the Women in Tech (WIT) reception, sponsored by EY. The event will take place in the Grand Ballroom at the nearby Four Seasons Hotel Nashville and is open to all OpenText World attendees. At the event, OpenText CDO and CIO Shannon Bell will moderate a discussion with a panel of women who inspire, educate, mentor, and advocate for other women.
The reception is designed to provide space for collaboration between leaders of today and tomorrow. In addition to the panel discussion, you’ll have a chance to learn more about WIT and mentorship options, and take some time to network with other professionals.
OpenText World party
On Wednesday, unwind with an event to remember—enjoy live music, line dancing, and the Country Music Awards broadcast at a rooftop party that captures the heart and soul of Music City.
LoadRunner hasn’t disappeared, it’s called OpenText Performance Engineering, and it’s leading the next chapter of performance engineering (again). For more than 30 years, LoadRunner has set the standard for testing application scalability and reliability. It’s a name recognized across industries and a solution trusted by performance engineers worldwide. Now, as part of OpenText, LoadRunner solutions continue to build on their modern, future ready foundation, adding new capabilities and integrations to help organizations meet the evolving demands of today’s digital enterprises.
From LoadRunner to OpenText performance engineering
The LoadRunner family has always been about helping teams test performance at scale, reduce risk, and deliver high quality digital experiences. That hasn’t changed. What has changed are the product names, reflecting how they now fit into OpenText’s broader portfolio of enterprise software:
Each solution continues to offer the strengths customers have come to depend on: comprehensive protocol coverage, real world load simulation, and enterprise class scalability. Customers can choose to keep using these solutions individually, or connect them to the OpenText™ Core Software Delivery Platform, where performance engineering becomes part of a modular, platform-wide system for planning, testing, release, and security.
The LoadRunner strengths you can always count on
Customers sometimes worry that a new name means a different product. That’s not the case here. The LoadRunner tools remain the same solutions performance engineers know and trust. They still:
Deliver distributed, large-scale testing across cloud and on prem environments
Provide advanced analytics, dashboards, and trend reporting
Support a wide range of applications, protocols, and use cases
Integrate with CI/CD pipelines and DevOps workflows
If your team has invested in LoadRunner over the years, that investment continues to pay off. Your scripts, scenarios, and processes remain fully supported.
Powerful new features
While the foundation remains solid, the LoadRunner products are far from standing still. OpenText is investing heavily in new features that make performance engineering faster, smarter, and easier to scale. Recent releases include:
TruClient 2.0 for browser-based testing breaks down barriers for testers of all skill levels, allowing experts and beginners alike to create and run tests with no code while supporting modern web technologies
AI powered scriptingto create, update, and troubleshoot scripts using plain words, providing clear guidance, error explanations, and suggested fixes
Enhanced protocol support to maintain the widest range of protocols in the industry, including web, mobile, API, ERP, and custom enterprise applications
LLM protocol for performance engineeringwas built from the ground up to simulate, measure, and analyze real‑world load on applications with an embedded large language models
These AI capabilities aren’t standalone. They’re part of DevOps Aviator, the intelligence layer of the OpenText DevOps Cloud solutions. Aviator copilots extend insight and automation across the lifecycle, and performance engineering is one of the clearest examples: helping teams not only run tests faster but anticipate risks earlier and make more confident release decisions.
Proof in practice
The impact is already clear in the market. DATEV accelerated performance testing adoption across its teams, running 17x more tests per week with OpenText Core Performance Engineering. Cencora reported a 98% improvement in application performance, translating directly into smoother digital experiences for its customers.
And OpenText itself relies on these same solutions. Through the OpenText trusts OpenText program, more than 7,000 engineers use the DevOps Core Software Delivery platform—including Performance Engineering—to validate scale, speed, and quality across the entire software delivery lifecycle. This internal deployment standardizes pipelines, secures development with embedded testing, and continuously feeds improvements back into the products.
Q&A: common questions about LoadRunner
Question
Answer
Is LoadRunner gone?
No. The tools are still actively supported and developed. What has changed are the names.
What if I’m upgrading from an older LoadRunner version?
You can upgrade directly into the new OpenText branded versions. Backward compatibility for assets and scripts is maintained so your existing investments remain intact.
Are there new features I should be aware of?
Yes. Recent releases introduced TruClient 2.0 for browser-based testing, AI assisted analysis, AI-powered scripting, enhanced protocol support, and much more.
How often are new releases available?
OpenText continues to follow a regular cadence of updates for all performance engineering products, delivering new features, optimizations, and protocol support several times per year.
Can I still use LoadRunner terminology when talking with OpenText?
Absolutely. The LoadRunner name is widely recognized in the industry. OpenText teams and communities understand both the legacy and the current product names.
Where can I find a list of all OpenText product names?
OpenText maintains a comprehensive product name decoder on its website that includes all LoadRunner names, all DevOps Cloud (ADM) product names, and other OpenText products across the company. It’s a helpful reference for understanding legacy names and their current OpenText equivalents.
Leading the next era of performance engineering
So what happened to LoadRunner? It hasn’t disappeared. It has evolved. Under OpenText performance engineering, the LoadRunner family continues to deliver world-class performance engineering with expanded functionality, deeper integrations, and AI-driven insights powered by DevOps Aviator.
The power is in your hands. You can keep running the tools individually, exactly as before, or expand into the OpenText Core Software Delivery Platform, where performance engineering integrates with modules for planning, functional testing, security, insights, and more.
For customers who know and trust LoadRunner, the foundation you rely on is still here. What’s different is the pace of innovation and the breadth of capability, strengthened by OpenText investment and product vision. This continued leadership is recognized in analyst reports such as GigaOm for Cloud Performance Testing, where OpenText performance engineering solutions consistently outperforms competitors.
These solutions remain the gold standard for performance engineering. With OpenText, it is shaping the future of quality at scale.
See it in action
Request an OpenText Core Performance Engineering free trial
Request an OpenText Professional Performance Engineering free trial
Request an OpenText Enterprise Performance Engineering demo
Customer data platforms, CRMs, and campaign tools all promise better customer engagement. Yet most organizations still run them in silos. Data lives in one system, messages are sent from another, and journeys are stitched together manually. The result? Slow, fragmented, and frustrating experiences.
Customer expectations are higher than ever. A late message, a duplicate update, or a generic email is all it takes to lose trust. What’s broken isn’t communication itself, it’s the way organizations orchestrate it. Disjointed tools force marketing, service, and IT teams to work in silos. The result? Slower responses, missed opportunities, and frustrated customers.
The future isn’t more point solutions. It’s frictionless engagement where every channel, journey, and piece of content works together seamlessly.
That’s why OpenText Core Journey now with engagements is different. It unifies messaging, communications, and journeys in one platform. You don’t need to rip and replace systems. You simply design once and orchestrate everywhere with your Customer Communications Management (CCM) solution. From an abandoned cart in retail, to a policy renewal in insurance, to a patient reminder in healthcare, Engagements within OpenText Core Journey, makes each moment personal, timely, and connected.
2. Real-time notification triggers From an insurance claim update to a retail cart reminder, Core Journey with engagements activates journeys instantly. Data flows across SMS, and email in real time, across the tools you already use. This will be followed by other digital channels in subsequent upgrades.
3. Consent and preference management built-in Unlike lightweight campaign tools, it is designed with enterprise security that OpenText brings to all business users. Privacy, consent, and preference management are part of the platform, not an afterthought.
The competitive edge
OpenText Core Journey doesn’t compete with CRMs, CDPs, or marketing automation platforms, it fills the gaps they can’t cover. OpenText is the only vendor unifying CCM governance, CX agility, and journey orchestration in a single solution.
See it in action
Core Journey with engagements makes orchestration tangible. In a demo, you can see:
How a weather update instantly triggers a multi-channel alert across SMS and email.
How compliance rules ensure every message aligns with customer preferences.
How the dashboard creates a personalized notifications workflow across the customer journey with analytics tracking.
The experience bar keeps rising, and fragmented tools can’t keep up. With Core Journey, you can unify communications, journeys, and content into frictionless experiences without starting from scratch.
December 2024
Customer expectations are evolving at an unprecedented pace. They demand seamless, personalized, and flexible experiences at every touchpoint. To meet these growing demands, OpenText™ Core Journey 24.4 empowers businesses to elevate their customer journeys while unlocking new revenue opportunities. By combining modernized reporting tools, intelligent orchestration capabilities, and enhanced flexibility, this release sets a new standard for customer engagement.
One of the standout features of Core Journey 24.4 is the Split Path, which revolutionizes how customers navigate their journeys by enabling parallel paths. Modern customers value choice, and this feature eliminates the need for rigid, conditional dependencies in journey workflows. For example, during a subscription service onboarding, customers can choose between verifying their information via a support call or simply clicking an email link.
Both options function independently, yet seamlessly, within the same journey design. This approach not only provides customers with greater control but also reduces frustration and enhances satisfaction. By offering reusable journey designs with optional routes, businesses can save time while ensuring flexibility across multiple scenarios.
The release also brings smarter follow-up mechanisms to the table, ensuring reminders are context-aware and relevant. Gone are the days of generic reminders that risk alienating customers. Now, Core Journey can send reminders based on specific customer actions or inactions.
For instance, in the case of overdue payments, the system checks if a customer has already acted before escalating reminders to more effective channels like phone or SMS. This precision ensures every communication is meaningful, reducing annoyance and boosting conversion rates. By respecting customer behavior and preferences, businesses can build stronger relationships and improve engagement rates across preferred channels.
To complement these capabilities, Core Journey 24.4 has modernized reporting tools that make analyzing journey data more intuitive and actionable. A cleaner, streamlined interface replaces outdated elements, allowing users to navigate reports effortlessly. Enhanced analytics, including tools like List Analysis, Drill Down Analysis, Lookup Analysis, and Average Duration Analysis, empower journey managers to uncover actionable insights.
For example, managers can easily track the time customers spend at each stage, identify where drop-offs occur, and pinpoint the most engaging touchpoints. These insights enable teams to refine journeys, address weaknesses, and amplify successful strategies, ultimately driving better outcomes.
Integration has also been simplified with orchestration credentials, reducing complexity in communication workflows. Now, journey actions can be sent directly to OpenText Communications without requiring additional orchestration tools. Administrators can download credentials for individual actions, streamlining configuration and execution. For instance, when sending a reminder email for an incomplete form, Core Journey directly triggers the action, ensuring timeliness and eliminating unnecessary delays. This seamless integration not only improves the customer experience but also reduces the risk of errors while saving time for administrators.
Core Journey leverages advanced data insights for continuous optimization. The expanded analysis capabilities now support journey-specific metrics, such as the duration customers spend at different stages and follow-up effectiveness. Dedicated functionality for follow-up analysis is integrated directly into the new Journey UI, offering a clearer picture of how customers interact post-campaign. Imagine being able to see exactly how many customers engaged with specific actions, how long they stayed engaged, and which channels drove the most impactful results. These insights enable businesses to refine future campaigns, better align with customer needs, and optimize overall performance.
Core Journey 24.4 is not just an update—it’s a transformative leap forward in how businesses design, execute, and analyze customer journeys. By empowering customers with choice, enhancing workflows with intelligent integrations, and providing actionable data insights, this release enables organizations to deliver personalized, timely, and meaningful experiences. Whether it’s improving engagement, building stronger customer relationships, or streamlining operations, Core Journey 24.4 is designed to help businesses stay ahead in an increasingly competitive landscape.
Ready to elevate your customer engagement strategy? Discover the game-changing potential of OpenText Core Journey 24.4 and transform the way you connect with your customers.
The concept of “cloud-first” has long dominated enterprise IT strategy. However, recent, high-impact events have delivered a stark wake-up call, forcing executive teams to rethink where their most critical data resides.
The recent AWS outage and the massive 2024 Snowflake data breach have reignited a vital discussion about cloud repatriation—the strategic shift of critical workloads from the public cloud back to private or on-premises infrastructure.
If data is an organization’s most valuable asset, the simple underlying question is whether it can afford to entrust its operational continuity and sovereignty entirely to a third party.
Recent incidents highlight systemic fragility
These two incidents expose the inherent, systemic risks of excessive reliance on hyperscale public cloud providers, striking at both availability and security.
1. Availability and business continuity risk
On October 20, 2025, a major AWS outage, originating in the US-East-1 data center, disrupted countless global services for over nine hours, affecting major digital platforms, banks, and airlines. The root cause was a failed domain name system (DNS) update to DynamoDB, which cascaded into 113 affected services.
This incident highlights the broader implications of relying too heavily on a single provider. Even the most robust cloud platforms can encounter disruptions that ripple across dependent services.
2. Security and data sovereignty risk
The 2024 Snowflake data breach saw sensitive records compromised from over 160 organizations, including high-profile corporations like Santander, Ticketmaster, and AT&T. Attackers exploited weak authentication and stolen credentials to infiltrate customer environments.
This incident proves that even trusted, enterprise-grade cloud providers are not immune to compromise. When organizations entrust their sensitive data to a multi-tenant public environment, they are exposed to the aggregate security posture of the vendor and all its other clients.
The ability for a single-platform compromise to yield massive data breaches for global corporations demonstrates that consolidating critical assets creates a highly attractive target for sophisticated threat actors.
The strategic shift: Data backs the repatriation trend
In light of these mounting risks, cloud repatriation is no longer a niche trend but a significant movement reshaping IT infrastructure strategies. Data collected in partnership with Foundry confirms this accelerating shift:
67% of enterprises have already repatriated some workloads from a public cloud to an on-premise, private cloud, or hybrid environment.
A significant majority, 87% of enterprises, plan to repatriate workloads in the next 12 to 24 months.
While full withdrawal is rare, the hybrid model is the dominant architecture today, employed by 63% of organizations.
Top drivers: Security and control leading the charge
The shift is driven by the very concerns exposed by recent incidents. Concern regarding data security and privacy (51%) is the top driver for repatriating public cloud workloads.
While cost efficiency remains critical (cited by 39% as a driver), organizations also seek:
Customization and control (35%): Repatriation enables tailored architectures, security policies, and access rules that are not possible with shared infrastructure.
Data recovery/Business continuity (34%): This directly addresses the single-point-of-failure risk seen in the AWS outage.
Performance: On-prem workloads frequently outperform cloud-hosted ones for data-intensive or low-latency applications.
Furthermore, AI/ML workloads (57%) are the top priority for repatriation in the next two years. These are data-intensive, costly to run at scale in the cloud, and demand tighter control over performance and governance.
The measurable benefits of strategic sovereignty
Repatriation is defined not as a rollback, but as a strategic upgrade in cost, security, and agility. Organizations that have successfully moved workloads report meaningful gains:
Benefit
Repatriation Outcome
Supporting Data
Security posture
Improved security posture
92% of organizations reported an improved overall security posture.
Data control
Enhanced visibility and privacy
62% reported improved visibility, and 60% reported improved data privacy.
Cost efficiency
Reduced overall costs
41% reported a decrease in overall costs.
ROI
Significant cost savings
Organizations reported an average cost savings of 31% across those repatriated workloads.
Performance
Faster performance
More than 50% experienced faster performance.
Rethinking cloud strategy: An enterprise advantage
Cloud repatriation is a strategic realignment that moves beyond the simple “cloud-first” mandate to an “asset-centric” strategy. True digital resilience means owning both the data and its operational foundation. By repatriating critical assets, the business’s “Crown Jewels”—organizations achieve full sovereignty and dedicated security postures tailored to their unique regulatory needs.
The AWS outage exposed the fragility of dependency, while the Snowflake breach revealed the liabilities of consolidation. If data is indeed the organization’s most critical asset, delegating its operation to another entity is akin to outsourcing the company’s nervous system.
To understand the full scope of this movement and how to strategically identify workloads for swift repatriation, explore the resources that detail these findings:
As organizations race to deliver digital experiences faster and more frequently, DevOps has become the gold standard for software delivery. But speed alone isn’t enough—especially as security threats grow more sophisticated and regulators tighten compliance demands. Enter DevSecOps: a natural evolution of DevOps that shifts security left and embeds it throughout the software delivery lifecycle.
DevSecOps isn’t just a trendy term anymore, it’s essential. With faster release cycles, open-source dependencies, and AI-generated code, security needs to move as fast as development.
Emerging technology adoption, from containers and APIs to serverless and GenAI, is reshaping how teams build software. Yet adopting DevSecOps isn’t as simple as adding a security tool or two. It’s a cultural and technical transformation.
DevSecOps best practices
Here are seven DevSecOps best practices that can help your organization strengthen its security posture while maintaining the agility of DevOps.
1. Shift left: Integrate security early in the SDLC
DevSecOps isn’t about making developers security experts—it’s about equipping them with the right guardrails and feedback loops early in the process. “Shift Left” refers to integrating security practices earlier in the development lifecycle, ideally during the design and coding phases. By addressing security concerns upfront, teams can identify potential vulnerabilities before they even make it into the codebase.
Threat modeling: Engage in threat modeling during the design phase to identify security risks and potential attack vectors early.
Dependency scanning: Regularly scan open-source libraries and dependencies for known vulnerabilities.
Triage findings: Use automated tools and contextual analysis to triage findings based on exploitability, severity, and business impact. For example: OpenText ASPM supports risk-based prioritization by combining threat intelligence, exploitability data, and business metadata to help teams focus on what matters most.
But don’t stop at “left.” Security should also be part of runtime operations—monitoring, alerting, and post-deployment risk assessments are just as critical. Check out our OpenText™ Cybersecurity solutions enable faster, safer, and more reliable software delivery.
2. Automate Security Testing in CI/CD Pipelines
Manual security checks don’t scale. Automation does. To keep things moving fast and consistently, security tests need to be automated right into the CI/CD pipeline. When you bake security into the development workflow, teams can catch and fix issues as they go — without slowing things down.
Interactive Application Security Testing (IAST): Use IAST tools during testing to find vulnerabilities in real-time by monitoring app behavior during functional tests.
Infrastructure as Code (IaC) Security: Analyze infrastructure code for misconfigurations and potential security flaws before deployment.
Container scanning: Ensure containers don’t contain outdated packages or known CVEs.
Secrets detection: Identify and quarantine API keys or credentials checked into code.
Integrating security steps into your CI/CD pipeline ensures security happens by default, not as an afterthought.
3. Continuous monitoring, logging, and improvement
Monitoring, observability, and logging are your early warning system when it comes to security. With the right setup, teams can spot anything unusual — like a potential breach — as it happens. Catching issues early means you can respond faster and keep the impact to a minimum.
Centralized logging: Implement centralized logging solutions like ELK (Elasticsearch, Logstash, and Kibana) or Splunk to aggregate logs from various systems.
Security Information and Event Management (SIEM): Use SIEM platforms to correlate and analyze security events across your infrastructure and applications, providing actionable insights.
Real-time threat intelligence: Leverage intrusion detection systems (IDS) and intrusion prevention systems (IPS) to identify potential threats and attack patterns.
Threats evolve—so should your DevSecOps practices. DevSecOps isn’t a one-time effort—it’s a continuous commitment.
4. Automate compliance and policy enforcement
Compliance requirements are an inevitable part of modern software development. The good news is you can automate a lot of it. By establishing governance frameworks and track key metrics with real-time dashboards, building in automated checks and enforcing policies as you go, you make it easier to stay on track — and avoid the headaches (and fines) that come with falling out of compliance.
Automated compliance audits: Implement tools to automatically enforce security and compliance policies during the CI/CD pipeline.
Continuous configuration compliance: Regularly assess system configurations against industry standards (e.g., CIS Benchmarks, NIST) to ensure that the environment remains secure over time.
Version control for policies: Keep security and compliance policies under version control to ensure changes can be tracked and reviewed in an auditable manner.
Use policy-as-code to enforce governance: Governance can’t rely on manual checklists in a high-velocity delivery environment. With policy-as-code, you can codify your organization’s rules (e.g., no open S3 buckets, no use of deprecated APIs) and enforce them automatically across development and deployment stages.
Tools like OpenText™ Core Application Security (Fortify) can be integrated to make policy enforcement auditable and scalable. OpenText ASPM supports enterprise-wide AppSec posture management by integrating scan results, policy compliance, and developer engagement data into a single view.
5. Minimize risk with AI
Human error is often the weakest link in security. AI is transforming the way organizations manage security — not by replacing people, but by amplifying their ability to detect, respond to, and prevent threats across the DevSecOps pipeline.
Secure coding practices: Provide ongoing training on secure coding techniques, such as proper input validation, authentication, and authorization mechanisms.
Embrace AI: AI-powered DevOps tools can analyze code, configurations, and runtime behavior to flag anomalies and potential vulnerabilities much faster than manual review ever could. This means threats are caught early — often before they reach production. AI systems improve over time, learning from historical data and real-world incidents to fine-tune detection and recommendation engines.
Proactive risk insights: Security alerts can be overwhelming. AI helps cut through the noise by automatically triaging findings, reducing false positives, and highlighting the risks that actually matter. By learning from past vulnerabilities and attack patterns, AI can offer predictive insights — helping teams identify and address risks before they become active threats. OpenText Application Security Aviator is a great example of this.
6. Collaborate and communicate across teams
DevSecOps is not just a set of tools; it’s a cultural shift. Successful DevSecOps adoption requires a collaborative mindset, where development, security, and operations teams work closely together to identify and address security risks.
Cross-functional collaboration: Foster communication and collaboration between development, security, and operations teams to ensure that security concerns are raised and addressed throughout the lifecycle.
Security champions: Designate security champions within development teams who can act as liaisons between security experts and developers, helping to identify and address security concerns early.
Feedback loops: Establish continuous feedback loops so that security issues are discussed and addressed in real-time, preventing bottlenecks or delayed responses.
These days, most teams rely on third-party libraries and components to build software faster — but that also means opening the door to potential risks. That’s why securing your entire software supply chain is so important. Your DevSecOps solutions needs to cover everything from what you bring in to how you build and deploy, making sure nothing risky or malicious sneaks into your pipeline.
Verify third-party code: Regularly verify the integrity of third-party code by scanning dependencies and using trusted sources.
Use Software Composition Analysis (SCA): SCA tools can help identify known vulnerabilities in third-party libraries, ensuring that they are updated and patched as necessary. For example: OpenText Core SCA (formerly Debricked) and Open Source Select help teams manage open-source risk and support secure component selection.
Monitor supply chain for threats: Continuously monitor the software supply chain, for emerging threats and vulnerabilities that could impact your organization.
DevSecOps best practices to business impact
DevSecOps is about balancing speed and safety. The best practices above aren’t just technical—they’re strategic. By making security an integral part of DevOps workflows, you’re ensuring that your applications are secure by design, from development to production.
Security can’t be bolted on—it must be built in. With the right mindset, automation, and collaboration, DevSecOps isn’t just achievable—it’s a competitive advantage.
Security doesn’t have to slow you down. With the right tools and processes, it becomes part of how you build. OpenText gives teams the visibility and automation they need to move fast and stay secure.
By putting these best practices into place, your team can ship software that’s not only high quality, but secure from the start.
Check out how OpenText delivers DevSecOps solutions with an intelligent end-to-end development-, security-, and operations-driven solutions so you can accelerate innovation and reducing risk.
Modern apps are complex, spread across multiple cloud environments, and always changing. This complexity goes beyond what traditional monitoring tools can manage, as they were only meant to find errors, not to explain their causes. To address these challenges, the concept of observability has emerged as a critical advancement in IT operations. Constellation Research notes observability gives a clear, real-time look into systems using full data from logs, metrics, traces, and events.
Constellation Research, a Silicon Valley advice firm, notes that observability is now key for resilient operations, fast incident response, and continuous improvement. It enables IT operations, engineering, and site reliability engineering (SRE) teams to answer major questions: “What went wrong?”, “Where did it happen?”, and “Why did it happen?“. As firms adopt DevOps, SRE, and platform engineering methods, observability is a core capability. It’s vital not just for troubleshooting, but also for ensuring uptime, speeding up releases, and managing user experience at scale. Top observability systems, as noted by Constellation Research, do more than just collect data; they correlate data across the IT environment, show dependencies, and use AI and machine learning to surface anomalies, predict failures, and automate remediation.
Understanding the Constellation ShortList™
Constellation Research, a Silicon Valley-based strategic advisory firm, regularly evaluates technology solutions. The Constellation ShortList™ for Observability identifies top vendors in this category.
Constellation Research evaluates technology products and their Constellation ShortList™ names the best vendors in various market types. For the Observability group, Constellation Research rates products based on key criteria. This includes main features like using all data types (logs, metrics, traces, events), easy linking with OpenTelemetry and cloud tools like Kubernetes and microservices, real-time dashboards and warnings, robust infrastructure and application dependency mapping, and high scale data ingestion and retention capabilities.
Plus, Constellation Research points out key differences, AI-assisted root cause analysis and alert suppression, the use of generative AI for incident summarization and remediation suggestions, proactive anomaly prediction, automated incident response, and multi-domain observability across infrastructure, application, network, and security layers. For the Observability group, Constellation Research rates products based on key criteria. This includes main features like using all data types (logs, metrics, traces, events), easy linking with OpenTelemetryand cloud tools like Kubernetes and microservices, real-time dashboards and warnings, robust infrastructure and application dependency mapping, and high-scale data ingestion and retention capabilities. Plus, Constellation Research points out key differences, AI-assisted root cause analysis and alert suppression, the use of generative AI for incident summarization and remediation suggestions, proactive anomaly prediction, automated incident response, and multi-domain observability across infrastructure, application, network, and security layers.
How does OpenText full-stack observability help my team?
Using the OpenText™ AI Operations Management platform, you can merge IT operations data from siloed tools to manage performance and configurations, gain developer-level insights, and see into cloud and on-premises environments in one place.
We are proud to share that OpenText has been included on the Constellation ShortList™ for Observability for Q3 2025 recognizing that our approach which goes beyond standard application performance tools. OpenText delivers full-stack IT observability, giving visibility across applications, infrastructure, networks, and cross-cloud environments with monitoring for change and faster, more reliable services throughout clouds and data centers. Beyond observing, AI is used to perform automated event correlation with an associated explanation for transparency and understanding of how the decision was made.
By giving a clear, accurate, real-time view of on-premises and cloud workloads, our full-stack observability platform enables you to speed up IT services with actionable insights, leading to better digital safety, efficient operations, and continuous innovation.
In today’s digital landscape, small and mid-sized businesses (SMBs) are under siege. Cyberattacks are no longer reserved for large enterprises with deep pockets and expansive IT teams. Ransomware, phishing, business email compromise, and supply chain attacks are increasingly targeting SMBs—often because they lack the layered defenses and visibility needed to detect and respond effectively.
The SMB cybersecurity challenge
SMBs face a unique set of cybersecurity challenges. They often operate with limited budgets, minimal in-house expertise, and a patchwork of security tools that don’t communicate with each other. This fragmented approach creates blind spots—gaps that attackers are all too eager to exploit.
Endpoint protection alone isn’t enough. Neither is a firewall. And while Microsoft 365 offers built-in security features, they require careful configuration and ongoing monitoring to be truly effective. What SMBs need is a unified solution that brings these elements together under one roof.
Recognizing this growing threat, Calyptix® Security and OpenText™ Cybersecurity have partnered to deliver a powerful new offering: Community Shield® Plus. This integrated solution combines Calyptix’s trusted firewall technology with endpoint and Microsoft 365 monitoring, enhanced by OpenText’s enterprise-grade cybersecurity services. The result? A streamlined, scalable, and affordable path to cyber resilience for SMBs.
Introducing Community Shield Plus
Community Shield Plus is built on the foundation of Calyptix’s AccessEnforcer® firewall powered by its Community Shield collective threat intelligence, Community Shield Plus extends protection to endpoints and cloud services, offering:
Network monitoring: real-time visibility into traffic and threats at the perimeter.
Endpoint monitoring: detection of suspicious activity on devices, including malware, unauthorized access, and lateral movement.
Microsoft 365 monitoring: oversight of email, identity, and collaboration tools to catch phishing, account compromise, and data exfiltration.
This triad of protection ensures that SMBs are covered across the most critical attack surfaces—without the complexity of managing multiple vendors or platforms.
Powered by OpenText Cybersecurity
What sets Community Shield Plus apart is its integration with OpenText Cybersecurity, a global leader in managed security services. Through this partnership, Calyptix customers gain access to:
Governance, Risk & Compliance (GRC) Services: Support for regulatory requirements, risk assessments, and policy development—enhanced by offerings like the OpenText Security Health Check Service, which helps organizations assess their current security posture, identify gaps, and align with best practices for cyber resilience.
Digital Forensics & Incident Response (DFIR): Expert-led investigations and recovery support in the event of a breach—bolstered by services like the OpenText DFIR Service, which provides rapid containment, forensic analysis, and post-incident reporting to help organizations understand the root cause, mitigate impact, and strengthen defenses against future attacks.
Managed Security Services: Continuous monitoring, alert triage, and remediation guidance—grounded in the principles outlined in OpenText’s blog on Managed Security Services, which emphasizes the importance of proactive threat management, visibility across hybrid environments, and the strategic role MSSPs play in helping organizations navigate today’s complex cyber landscape.
At the heart of Community Shield Plus is Managed Extended Detection and Response (MxDR): A proactive, 24/7 threat detection and response service that correlates data across endpoints, networks, and cloud environments.
OpenText MxDR and these services are delivered by seasoned cybersecurity professionals, giving SMBs access to the same level of protection as large enterprises—without the overhead.
Designed for simplicity and scale
One of the most compelling aspects of Community Shield Plus is its simplicity. Calyptix has spent over two decades serving SMBs, and it shows in the design of this solution:
Predictable pricing: No hidden fees, no bloated platforms. The base plan includes 10 endpoints, Microsoft 365 domain monitoring, and AccessEnforcer® network monitoring.
Scalability: As businesses grow, Community Shield Plus grows with them—adding endpoints, users, and services as needed.
Ease of deployment: Whether managed in-house or through a Managed Service Provider (MSP), setup is straightforward and support is always available.
This makes Community Shield Plus ideal for SMBs that want robust security without the headaches of enterprise-grade complexity.
One vendor, one relationship
In a market crowded with point solutions and overlapping platforms, Calyptix offers something refreshingly different: a single-vendor experience. With Community Shield Plus, SMBs get firewall, endpoint, and cloud protection—all managed through one relationship, one support team, and one billing process.
This not only simplifies procurement and operations but also ensures that alerts and data are correlated across layers. When a suspicious login attempt on Microsoft 365 coincides with unusual network traffic and endpoint behavior, Community Shield Plus connects the dots—enabling faster, more accurate response.
Built for MSPs and SMBs alike
Calyptix has long been a trusted partner to MSPs across North America. Community Shield Plus continues that tradition, offering: MSP-Ready Support: US-based experts who understand the realities of SMB environments.
Multi-tenant management: Tools that make it easy for MSPs to manage multiple clients from a single dashboard.
Regular updates and innovation: Continuous R&D ensures that the platform evolves with the threat landscape.
Whether you’re an MSP looking to expand your security offerings or an SMB seeking a reliable partner, Community Shield Plus delivers.
The step to true protection
Cybersecurity is no longer optional for SMBs. The risks are real, the stakes are high, and the attackers are relentless. But with the right tools and partners, resilience is within reach. Community Shield Plus, powered by Calyptix and OpenText, offers a compelling solution: comprehensive protection, expert support, and enterprise-grade capabilities—tailored for the needs and budgets of SMBs.
If you’re ready to simplify your security strategy and strengthen your defenses, it’s time to explore Community Shield Plus. Contact us.
Data is the fuel. AI is the engine. But only organizations that can move with speed, intelligence, and precision will stay ahead.
This November, the OpenText Analytics Advantage Tour 2025 is bringing together senior technology leaders in New York, London, and Munich who want to accelerate their analytics and AI transformation.
These exclusive executive breakfast briefings are designed to explore how the right analytics strategy—not just tools—can unlock new levels of performance and decision-making agility.
What you’ll gain: A strategic edge over the competition
The Analytics Advantage Tour 2025 brings together the conversations that matter most right now. Here’s why this event is tailor-made for decision-makers:
1. Unpack the analytics imperative
From the realities of AI adoption to the growing momentum of cloud repatriation and data modernization, discover what’s driving the next wave of analytics transformation—and how leading enterprises are responding.
Today, October 20, 2025, AWS experienced a global outage that disrupted major apps and core services for banks, airlines, exchanges, etc. This underscores the importance of hybrid, or repatriated, strategies to maintain performance, availability, and control over mission-critical analytics workloads.
2. Learn from industry experts
Join executives from OpenText and HPE as they share how organizations are balancing flexibility, cost, and control while building analytics strategies that scale.
3. Get a strategic overview of the platforms
Learn how the OpenText Analytics platform, powered by OpenText Analytics Database (Vertica), and HPE next-gen infrastructure support modern data strategies, enabling faster insight, flexible deployment, and smarter, AI-driven decision-making—all through high-level platform overviews, not demos.
4. Tell us what you need
These are not one-size-fits-all events. You’ll have opportunities to push your toughest analytics questions into the “Ask the Experts” panel.
5. Build real-world connections
Exchange ideas with CIOs, CTOs, CDOs, and analytics executives tackling similar modernization challenges—all in an intimate setting over a curated breakfast experience.
What you’ll walk away with
Executive-level conversations — Forward-looking, strategic insights on where analytics is headed.
Global trends with local relevance — Analytics priorities shaped by region and industry.
Trusted collaboration — Powered by OpenText and HPE, leaders in analytics and data infrastructure innovation.
Take the Analytics Advantage
Join the Analytics Advantage Tour 2025 and gain the clarity, connections, and perspective you need to turn data into your next competitive edge.
We have limited seats per city, so secure your seat now!
At the Microsoft Community Summit in Orlando, one challenge dominates every conversation: how to make supply chains smarter, faster, and more connected. For Dynamics 365 users, the answer is modernizing B2B integration.
The Dynamics integration reality check
As you scale your Dynamics implementation, the same challenges emerge across all modules:
Business Central users face growing partner complexity. Each new supplier, distributor, or customer brings unique EDI requirements and compliance demands that can overwhelm internal IT resources.
Finance and Operations teams need sophisticated connectivity beyond basic file exchanges—real-time financial synchronization, automated three-way matching, and global compliance reporting.
Supply Chain Management users discover that advanced planning is only as good as the data feeding it. When partner information arrives in batches or through manual processes, even sophisticated demand planning becomes reactive, not predictive.
What Dynamics users really want
Questions within Dynamics user groups aren’t always technical, but strategic, such as how do you prevent “quick EDI connection” projects from becoming months-long implementations that fail to deliver promised visibility and automation?
The most common questions we hear:
How do we onboard partners without six-month projects?
Can we get real-time supply chain visibility within Dynamics?
How do other organizations handle global compliance?
What’s the best practice for automated exception handling?
Strategic partnerships amplify ROI
The most successful Dynamics implementations go beyond operational efficiency. They integrate strategic B2B capabilities that transform entire ecosystems. OpenText enables this by digitizing B2B integrations, improving EDI accuracy, and preparing supply chains for AI-driven innovation.
For System Integrators: Combine deep Dynamics expertise with enterprise-grade B2B integration to accelerate implementations, deliver strategic value, and unlock recurring revenue through managed services.
For Dynamics Users: Enhance your existing investment ROI through expanded functionality, streamlined partner processes, reduced operational costs, and real-time supply chain visibility that improves decision-making and accelerates time-to-market.
Let’s build smarter supply chains together
OpenText Business Network Cloud proudly sponsors Community Summit as part of the Microsoft Dynamics community. Our solutions can help you improve EDI accuracy, digitize supply chain partner interactions, or unlock AI-driven insights.
Integrating seamlessly with Microsoft Dynamics Business Central and Finance and Supply Chain using our pre-built, flexible EDI-to-API adapters
Automating order to cash and procure to pay
Reducing transaction errors through intelligent validation
Automating partner onboarding and document exchange
Stop by Booth #940 to chat with the OpenText team. Also, join us at our session – Modernizing B2B Integration: EDI Meets API on Wednesday, October 22 from 11 a.m. to 12 p.m. EST to learn how a connected EDI and API strategy can improve your supply chain. Or reach out today to learn more.
Customer journeys have grown more complex — spanning dozens of channels, touchpoints, and teams. Yet most organizations still manage them in fragments: marketing runs campaigns, IT handles delivery, and operations manage the data. The result? Customers feel the disconnect.
With OpenText™ Core Journey with Engagements, we’re changing that. This new capability extends Core Journey beyond orchestration to become a unified workspace where teams can design, launch, and optimize every engagement — all in one place.
Core Journey bridges the gap between data, content, and communications. It brings together Core Journey, Core Messaging, and Core Communications so business users can move from idea to impact faster — without waiting on IT.
Design the engagement: Map customer touchpoints, triggers, and actions in a visual, low-code canvas.
Connect the data: Leverage real-time insights from OpenText Customer Data or any connected system.
Activate the communication: Launch contextual messages through the preferred channel — email, SMS, WhatsApp, print, or portal.
Measure and optimize: Track open rates, engagement, and outcomes across every journey in real time.
It’s customer engagement made simple — secure, compliant, and omnichannel by design.
Turning interactions into intelligent moments
Where most systems focus on marketing campaigns, Core Journey now powers the operational moments that matter — onboarding, renewals, claims, billing, service notifications, and beyond. These are the everyday interactions that define brand trust and retention.
By connecting orchestration with communications and data, organizations can:
Deliver proactive experiences: Respond to real-time triggers instead of static campaigns.
Empower non-technical teams: Create and activate engagement journeys without IT bottlenecks.
Unify insights: See every customer interaction across channels, products, and systems.
Drive measurable outcomes: Reduce churn, improve compliance, and accelerate time-to-value.
Built for CXaaS: Engagement without complexity
Core Journey with Engagements is a cornerstone of Customer Experience as a Service (CXaaS) — our vision for simplifying how organizations design, deliver, and optimize digital experiences. It connects seamlessly with OpenText Experience Cloud solutions — Core Communications, Core Messaging, and Web CMS — to make every engagement more intelligent, integrated, and immediate. In upcoming iterations, it aims to connect to more OpenText solution suites for a comprehensive customer experience.
Because true experience transformation doesn’t come from adding more tools — it comes from connecting the ones you already trust.
Experience in motion
When every customer moment is connected, every customer feels seen. OpenText Core Journey with Engagements is now available within OpenText Core Journey CE 25.4. Discover how to simplify complexity and amplify connection with the next evolution of journey orchestration.