All Research Sponsored By:OpenText

Voltage Powers Data Privacy CCPA/CPRA
PRODUCT OVERVIEW: New compliance laws demand more data privacy than ever before. Voltage Fusion by OpenText delivers advanced privacy-enhancing and privacy preserving technologies to help customers deliver on compliance while ensuring that the data can be securely and ethically shared across the business. Read on to learn more.
Posted: 08 Feb 2024 | Published: 08 Feb 2024

TOPICS:  .NET

Multinational Retail Organization
CASE STUDY: To evolve their siloed approach to data-centric security, this retailer sought out Voltage SecureData, encrypting 6 million daily transactions and 7 million customer records for risk management and GDPR compliance. Read the study to ascertain 6 SecureData successes from the retailer.
Posted: 07 Feb 2024 | Published: 07 Feb 2024

TOPICS:  .NET

Voltage Powers Data Privacy (GDPR)
PRODUCT OVERVIEW: Grab a copy of this product overview to gain a firm understanding of how Voltage Fusion by OpenText delivers advanced privacy-enabling and privacy-preserving technologies to augment GDPR, ISO 27701, and other compliance programs.
Posted: 07 Feb 2024 | Published: 07 Feb 2024

TOPICS:  .NET

Belbim
CASE STUDY: When this financial government institution began to struggle with information protection, they sought out a way that they could ensure data privacy regulatory compliance while also improving their data structure visibility to streamline data management. Browse this case study to learn more.
Posted: 06 Feb 2024 | Published: 06 Feb 2024

TOPICS:  .NET

The State of Passwordless Authentication: Security and Convenience Drive the Change
ANALYST REPORT: Recent findings show that 80% of all breaches use compromised identities and can take up to 250 days to identify. This white paper presents the findings of a new survey commissioned by OpenText and conducted by Dark Reading, aiming to shed insight into the state of passwordless security. Read on to learn more.
Posted: 03 Feb 2024 | Published: 03 Feb 2024

TOPICS:  .NET

Queensland Museum
CASE STUDY: Queensland Museum was looking to discover “lost” and sensitive data sitting in a wide range of repositories. Using the Voltage Fusion data platform from OpenText, the Museum was able to: Discover 11% duplicated and 38% obsolete filesAchieve $60,000 annual storage cost savingsLearn more about Voltage Fusion here.
Posted: 31 Oct 2023 | Published: 31 Oct 2023

TOPICS:  .NET

Privacy Compliance in North America: Status and Progress in 2023
ANALYST REPORT: Year over year, more organizations are experiencing a high number of breach types.75% of organizations dealt with two or more types of breaches in 2023, up from 28% in 2022. This white paper reports on how organizations in the United States and Canada are meeting the requirements of current and emerging privacy regulations. Dive into the report.
Posted: 31 Oct 2023 | Published: 31 Oct 2023

TOPICS:  .NET

CISO and CIO Investment Priorities for Cybersecurity in 2023
ANALYST REPORT: The top investment priorities in cybersecurity for CISOs and CIOs focused on cloud security, ransomware protections, and improving underlying data disciplines such as discovery and classification. Dive into this CISO and CIO Investment Priorities for Cybersecurity in 2023-24 report to learn more about the state of cybersecurity heading into 2024.
Posted: 27 Oct 2023 | Published: 28 Oct 2023

TOPICS:  .NET

NetIQ Advanced Authentication for Your Business
PRODUCT OVERVIEW: As cyber threats continue to get more advanced and harder to catch, many organizations are turning to authentication strategies to combat attacks and more. However, most companies don’t know where to begin when it comes to building an authentication framework. Dig into this white paper to learn more.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET

Voltage Fusion Overview and Introduction
PRODUCT DEMO: This video provides an overview of a data discovery solution designed to equip data protection and risk management professionals with the tools they need to quickly find, secure, and protect sensitive and high-value data. Tune in to learn how you can leverage the service to unlock complete visibility across structured and unstructured data silos.
Posted: 25 Oct 2023 | Premiered: 25 Oct 2023

TOPICS:  .NET

Mitigating Risk with Voltage Fusion Data Security Platform
WHITE PAPER: High-value and sensitive data are what drive your business, but they increase your risk of a breach as well. You need a holistic view of risk across both your unstructured and structured data repositories to address how best to protect your crown jewels. Access this white paper to learn about how your data security can benefit from the platform.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET

Hub - Voltage Fusion Data Security Platform
LANDING PAGE: Data and application sprawl is the norm today. Depending on the survey source, enterprise data volumes are growing by 60% or more per month! Access this article to learn about Voltage Fusion Data Security Platform, which helps you identify your sensitive data across your file shares, databases, and cloud data warehouses – wherever it is.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET

NetIQ Identity Governance and Administration
PRODUCT OVERVIEW: Discover in this product overview how NetIQ identity governance and administration (IGA) solutions can help your organization seamlessly manage the lifecycle of accounts and access rights to information resources.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET

NetIQ Identity Governance for Your Business
WHITE PAPER: As business owners drive digital transformation to increase efficiency and establish new business models, they also inherit shared responsibility for new challenges and security. Read on to learn about a solution designed to provide businesses with the tools they need to successfully govern entitlements to their information and minimize risk.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET

The Ant and the Grasshopper Tackle Cyberland's Sensitive Data
VIDEO: For modern digital businesses data is the most important resource. This narrative video uses a story about ants and grasshoppers, and their different strategies when preparing for winter, to introduce and demonstrate the fundamental principles and importance of securing sensitive data. Tune in for a fun way to learn more about data protection.
Posted: 21 Oct 2023 | Premiered: 21 Oct 2023

TOPICS:  .NET

The Forrester Wave™: Data Security Platforms, Q1 2023
FORRESTER RESEARCH REPORT: Explore in this analyst report the 14 data security providers that matter most, and how they stand up to the test.
Posted: 21 Oct 2023 | Published: 21 Oct 2023

TOPICS:  .NET

Voice of the Customer for Data Masking
GARTNER RESEARCH REPORT: Data masking enables organizations to transform sensitive data elements to ensure the original values are not identifiable when used in app testing environments. This Gartner “Voice of the Customer” report compares the top data masking vendors on the market, including OpenText, Microsoft, Oracle, and Broadcom. Dive into the Gartner report here.
Posted: 21 Oct 2023 | Published: 21 Oct 2023

TOPICS:  .NET

Brochure - Voltage Fusion Data Security Platform
PRODUCT OVERVIEW: As the value of data continues to increase, and new compliance for data regulation come into effect, organizations need systems and tools to secure their resource. The voltage Fusion Data Security Platform provides a single solution that enables a unified approach to data security, privacy, and governance. Read on to learn more.
Posted: 20 Oct 2023 | Published: 20 Oct 2023

TOPICS:  .NET

Creating Personalized Experiences with Real-Time Insights for CEM
EGUIDE: Creating an engaging and unified multichannel customer experience is a top priority, but many companies find themselves scrambling to adapt. In this expert e-guide, discover how to generate key customer insights in real-time and learn about 4 ways to create personalized experiences.
Posted: 28 Mar 2017 | Published: 21 Mar 2017


Secure Information Exchange in the Digital Age
WHITE PAPER: Forrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.
Posted: 27 Feb 2017 | Published: 31 Jan 2017


The Many Faces of Predictive Analytics: From IoT to Storytelling
EGUIDE: Predictive analytics takes many forms, and allows you to make the most effective decisions for your enterprise. In this expert guide, uncover the many faces of predictive analytics. Discover why to use data visualization to craft a story, how real-time analytics and IoT go hand-in-hand, and the how predictive analytics has affected the enterprise.
Posted: 22 Feb 2017 | Published: 17 Feb 2017


Project Success Plan: Rethinking Enterprise Content Management
EGUIDE: Traditional ECM can't keep up with how businesses operate today. But before tackling ECM disruptors, you need to understand its evolution and key steps to modernizing your suite. This 7-part guide collection provides the insights you need to push your ECM strategy forward. Learn ECM basics, trends, security considerations, and more.
Posted: 08 Sep 2016 | Published: 31 Aug 2016


Pervasive ECM Problems and How to Solve Them
EGUIDE: Access this expert e-guide to learn how older ECM tools are straining under increasing workloads and sub-par configurations. Also, explore how mobile, social, IoT, and other relatively new technologies are creating problems for ECM systems.
Posted: 10 Jun 2016 | Published: 09 May 2016


Cloud Enterprise Content Management: Trends and Business Impacts
EGUIDE: In this expert e-guide, learn about the drivers of enterprise content management today—including digitizing paper-based processes, hybrid-based cloud growth, collaboration platforms, and more—as well as the key ways ECM can provide digital transformation.
Posted: 12 May 2016 | Published: 09 May 2016


Enterprise BI Platforms
WHITE PAPER: This resource dives into the top vendors in the BI sector, comparing them based on a wide array of criteria. Cut through the complexity and find out what providers should have your business, and save yourself a BI headache down the road.
Posted: 08 Dec 2015 | Published: 08 Dec 2015