security
- Technologies
Practical guidance on implementing an effective legal hold program
In December 2018, the second edition of The Sedona Conference Commentary on Legal Holds was published with new guidelines for…
Read more » - Technologies
Data privacy is changing the relationship between you and your customers
The capture and collection of personal data is an important requirement in order to provide the individual, customized and tailored…
Read more » - Technologies
OpenText at RSA: EnCase wins top forensic award from SC Magazine
On March 5 at RSA 2019, SC Magazine named OpenText™ EnCase™ Endpoint Investigator, OpenText™ EnCase™ Forensic, and OpenText™ EnCase™ Mobile…
Read more » - Technologies
OpenText at RSA: Detection and response from the bottom up
It’s 2019, yet the fact still remains: attackers can compromise a network in a matter of minutes, but only a…
Read more » - Products
The three problems OpenText Security will be talking about at RSA
RSA 2019 is right around the corner. The most exciting security conference of the year – apart from OpenText™ Enfuse of…
Read more » - Technologies
Top 3 takeaways from Legalweek New York 2019
Legaltech 2019 is like the super bowl of legal technology, it brings together the best teams in the industry (on…
Read more » - Products
Work faster and save money
Most people rely on traditional methods of viewing and annotating different types of documents – for example, using Adobe® Acrobat® to…
Read more » - Products
Powerful digital forensics with OpenText EnCase Forensic 8.08
As technology evolves, so do the challenges of digital forensic investigation. Whether in the field or the lab, digital forensic…
Read more » - Products
New logical imaging feature now available with OpenText Tableau TX1 2.0
OpenText™ is excited to announce the release of the new Logical Imaging feature for the Tableau Forensic Imager TX1 2.0.…
Read more » - Products
Learn digital forensic skills to advance your career
The landscape of digital forensic investigations is continually evolving. Skilled investigators are in high demand and organizations need to ensure their…
Read more » - OpenText World
Shining a light inside the firewall
Security has always been a priority for organizations. Thirty years ago, organizations managed documents by paper and locked them up…
Read more » - Technologies
What makes a great CIAM platform?
The growth of Consumer Identity and Access Management (CIAM) has been phenomenal. The first CIAM systems only started to appear…
Read more » - Technologies
Security begins with consistency, reliability and predictability
In today’s digital landscape, security has to be a top priority for organizations. With cyberattacks and information breaches happening every…
Read more » - Products
Treating digital risk at Banner Health
As high-profile data breaches make headlines around the world, cybersecurity has quickly become a C-level priority. To keep pace with…
Read more » - Technologies
The importance of consumer IAM in the world of the ‘digital-savvy’ customer
Consumer Identity and Access Management (CIAM), also known as B2C IAM, is still relatively new but it is rapidly becoming…
Read more » - Technologies
What is direct connection outsourcing and what can it offer you?
Direct connection sounds like a great way of exchanging EDI documents with your trading partners. A single point-to-point connection between…
Read more » - Products
Axcelerate leverages document relationships for more effective review in Release 16 EP5
Enterprises are creating and storing more unstructured content than ever before, so when a litigation, compliance, or investigation event hits,…
Read more » - Products
Legal Center leads matter and document management capabilities in the Cloud
Firms continue to follow manual steps that lead to errors setting up new clients and performing tasks in a timely…
Read more » - Products
Continuous monitoring and advanced threat detection for the global enterprise
Information Security Continuous Monitoring (ISCM) projects can be expensive, data and network intensive implementations which often end in frustration for…
Read more »