Cybersecurity
Integrated cybersecurity solutions for enterprise protection
Guided Tours, Success Stories, Videos
Cybersecurity
Automating DSAR Compliance – Guided Tour
Explore how to utilize Core Data Discovery & Risk Insights to streamline the Data Subject Access Request (DSAR) process.
Cybersecurity
Core Threat Detection and Response – Insider Threats Detection focuses on Data theft – Guided Tour
A privileged user in a tech company starts accessing confidential data during non-working hours and uploads files to a personal cloud/external storage.
Cybersecurity
Data Minimization with Core Data Discovery & Risk Insights
Discover how to leverage OpenText Core Data Discovery & Risk Insights to manage your organization's vast data landscape, addressing challenges caused by duplicate, redundant, obsolete, and trivial files.
Cybersecurity
Data Security for Compliance – Banking – Guided Tour
This Guided Tour assists financial institutions in efficiently identifying and addressing sensitive data stored in structured formats. It also supports compliance with regulatory requirements and data protection standards.
Cybersecurity
Data Security for Compliance – Guided Tour
This Guided Tour illustrates how OpenText Structured Data Manager is used to identify & remediate sensitive data that is stored in structured format and fulfil compliance.
Cybersecurity
OpenText Core Application Security (Fortify): From Risk to Resilience – Securing MediMart Online Shop
To demonstrate how OpenText Core Application Security (Fortify) helps identify and mitigate application vulnerabilities early in the development lifecycle, using the MediMart Online Shop as a case study.
Cybersecurity
OpenText Core Behavioural Signals – Guided Tour
Uncover hidden threats with machine-driven analysis
Cybersecurity
OpenText Fortify Aviator on Fortify on Demand – Guided Tour
This Guided Tour provides an overview of Innovate Inc.'s integration of Fortify on Demand into their software development process, specifically focusing on the use of Fortify Aviator, an AI-powered tool.
Cybersecurity
OpenText™ Static Application Security Testing (Fortify SAST) for ABAP (SAP)
Follow Developer, Mike Anderson, as he uses Fortify Static Code Analyzer to identify and fix security vulnerabilities.
Cybersecurity
OpenText™ Core Open Source Select – Guided Tour
Safely choose open-source software that meets cybersecurity rules
Cybersecurity
OpenText™ Endpoint Forensics & Response – Insider Threat Detection – Guided Tour
A Fortune 100 firm faced repeated data leaks of trading algorithms and M&A docs. OpenText™ Endpoint Forensics replaced ineffective EDR tools, enabling real-time endpoint visibility, forensic analysis, remote artifact collection, and automated threat containment via YARA scanning and isolation.
Cybersecurity
Risk & Sensitive Data Discovery with Sampling using Core Data Discovery & Risk Insights
Uncover sensitive risks and insights with OpenText Core Data Discovery & Risk Insights
Cybersecurity
Security Incident Management with OpenText Enterprise Security Manager
Managing Security Incidents End-to-End
Cybersecurity
Novelis – Customer Story
Novelis Corporation delivers upon complex cases by bringing e-discovery in-house with OpenText™ EnCase™. Novelis is the global leader in aluminum rolled products and aluminum can recycling. The company operates in 11 countries, has approximately 11,000 employees and reported revenue of $9.6 billion in fiscal year 2017. Novelis supplies premium aluminum sheet and foil products to automotive, transportation, packaging, construction, industrial, electronics and printing markets throughout North America, South America, Europe and Asia. With mounting eDiscovery fees and cases in the news, the Novelis Corporation General Counsel decided to bring the eDiscovery process in-house.
Cybersecurity
Voltage File Analysis Suite – Video
Voltage enables organizations to discover insights quickly about their data risk, apply data-centric protection and policies to secure sensitive data, monitor data usage, and minimize data. Protecting data is streamlined for regulatory compliance with privacy by design. Organizations can use data to drive innovations while keeping personal information private, and crown jewels secure wherever they are, on-premises, in the cloud or both.
Cybersecurity
Fortify on Demand – Video
Watch this short video for an introduction to Fortify on Demand
Cybersecurity
Fortify on Demand Aviator – Video
Watch this short video for an introduction to Fortify on Demand Aviator
Cybersecurity
EnCase EndPoint Investigator – Video
EnCase Endpoint Investigator 8.08 takes the digital investigations to the next level by introducing new evidence decryption capabilities from Symantec endpoint encryption, Dell full disk encryption and Apple File System encryption. You can now acquire evidence from online and on premises services for Microsoft Office 365, Microsoft Exchange and Microsoft SharePoint, efficiently and precisely. Adding to that are support for Microsoft Edge Internet artifacts, ability to perform physical memory acquisitions on Mac OS X, as well as mobile acquisition enhancements providing you with the best possible user experience.
Cybersecurity
Data Discovery Powers Protection – Video
Organizations rely on their data to grow. But, with the explosion of data, data brings risks and costs. Whether your organization is seeking to comply with privacy regulations, have a greener IT, or reduce the financial risk of data, you must know what data you hold. Privacy compliance, Green-IT, and risk mitigation begin with Data Discovery.
Cybersecurity
Adaptive Identity Governance with Micro Focus NetIQ
Learn more about how an adaptive Identity Goverce and Administration solution from Micro Focus can bring your goverce policies into perfect alignment with the needs of your business???no matter how large or diverse your world of identities becomes.