All Research Sponsored By:OpenText

Creating a Secure Software Supply Chain You Can Trust
WHITE PAPER: Software supply chains form a complex ecosystem that allow companies to innovate quickly by using common components. However, these ecosystems can quickly turn into weaknesses if attackers compromise the open-source components or the vendors you rely on for their software and services. Learn how to secure your supply chain in this white paper.
Posted: 05 Mar 2024 | Published: 05 Mar 2024

TOPICS:  .NET

Unlock Resources With Automated Open-Source Discovery And Intake
FORRESTER RESEARCH REPORT: For a deep dive on the possibilities of automated open-source discovery and intake, review this 2024 Forrester report.
Posted: 05 Mar 2024 | Published: 05 Mar 2024

TOPICS:  .NET

State of Code Security: The AppSec Maturity Marathon Infographic
INFOGRAPHIC: 57% of organizations are implementing DevSecOps, with 60%-64% still relying on manual methods to find vulnerabilities. Dive into this State of Code Security infographic to learn more about the AppSec maturity marathon.
Posted: 04 Mar 2024 | Published: 04 Mar 2024

TOPICS:  .NET

Increase Speed and Accuracy with AI Driven Static Analysis Auditing
WHITE PAPER: Triaging and validating raw static analysis results is one of the most time-intensive manual processes within AppSec testing. Fortify Audit Assistant leverages past audit decisions to power machine learning-assisted auditing. Learn more about the latest innovations of Fortify Audit Assistant in this white paper.
Posted: 04 Mar 2024 | Published: 04 Mar 2024

TOPICS:  .NET

Voltage Powers Data Privacy CCPA/CPRA
PRODUCT OVERVIEW: New compliance laws demand more data privacy than ever before. Voltage Fusion by OpenText delivers advanced privacy-enhancing and privacy preserving technologies to help customers deliver on compliance while ensuring that the data can be securely and ethically shared across the business. Read on to learn more.
Posted: 08 Feb 2024 | Published: 08 Feb 2024

TOPICS:  .NET

Multinational Retail Organization
CASE STUDY: To evolve their siloed approach to data-centric security, this retailer sought out Voltage SecureData, encrypting 6 million daily transactions and 7 million customer records for risk management and GDPR compliance. Read the study to ascertain 6 SecureData successes from the retailer.
Posted: 07 Feb 2024 | Published: 07 Feb 2024

TOPICS:  .NET

Voltage Powers Data Privacy (GDPR)
PRODUCT OVERVIEW: Grab a copy of this product overview to gain a firm understanding of how Voltage Fusion by OpenText delivers advanced privacy-enabling and privacy-preserving technologies to augment GDPR, ISO 27701, and other compliance programs.
Posted: 07 Feb 2024 | Published: 07 Feb 2024

TOPICS:  .NET

Belbim
CASE STUDY: When this financial government institution began to struggle with information protection, they sought out a way that they could ensure data privacy regulatory compliance while also improving their data structure visibility to streamline data management. Browse this case study to learn more.
Posted: 06 Feb 2024 | Published: 06 Feb 2024

TOPICS:  .NET

The State of Passwordless Authentication: Security and Convenience Drive the Change
ANALYST REPORT: Recent findings show that 80% of all breaches use compromised identities and can take up to 250 days to identify. This white paper presents the findings of a new survey commissioned by OpenText and conducted by Dark Reading, aiming to shed insight into the state of passwordless security. Read on to learn more.
Posted: 03 Feb 2024 | Published: 03 Feb 2024

TOPICS:  .NET

Queensland Museum
CASE STUDY: Queensland Museum was looking to discover “lost” and sensitive data sitting in a wide range of repositories. Using the Voltage Fusion data platform from OpenText, the Museum was able to: Discover 11% duplicated and 38% obsolete filesAchieve $60,000 annual storage cost savingsLearn more about Voltage Fusion here.
Posted: 31 Oct 2023 | Published: 31 Oct 2023

TOPICS:  .NET

Privacy Compliance in North America: Status and Progress in 2023
ANALYST REPORT: Year over year, more organizations are experiencing a high number of breach types.75% of organizations dealt with two or more types of breaches in 2023, up from 28% in 2022. This white paper reports on how organizations in the United States and Canada are meeting the requirements of current and emerging privacy regulations. Dive into the report.
Posted: 31 Oct 2023 | Published: 31 Oct 2023

TOPICS:  .NET

CISO and CIO Investment Priorities for Cybersecurity in 2023
ANALYST REPORT: The top investment priorities in cybersecurity for CISOs and CIOs focused on cloud security, ransomware protections, and improving underlying data disciplines such as discovery and classification. Dive into this CISO and CIO Investment Priorities for Cybersecurity in 2023-24 report to learn more about the state of cybersecurity heading into 2024.
Posted: 27 Oct 2023 | Published: 28 Oct 2023

TOPICS:  .NET

NetIQ Advanced Authentication for Your Business
PRODUCT OVERVIEW: As cyber threats continue to get more advanced and harder to catch, many organizations are turning to authentication strategies to combat attacks and more. However, most companies don’t know where to begin when it comes to building an authentication framework. Dig into this white paper to learn more.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET

Voltage Fusion Overview and Introduction
PRODUCT DEMO: This video provides an overview of a data discovery solution designed to equip data protection and risk management professionals with the tools they need to quickly find, secure, and protect sensitive and high-value data. Tune in to learn how you can leverage the service to unlock complete visibility across structured and unstructured data silos.
Posted: 25 Oct 2023 | Premiered: 25 Oct 2023

TOPICS:  .NET

Hub - Voltage Fusion Data Security Platform
LANDING PAGE: Data and application sprawl is the norm today. Depending on the survey source, enterprise data volumes are growing by 60% or more per month! Access this article to learn about Voltage Fusion Data Security Platform, which helps you identify your sensitive data across your file shares, databases, and cloud data warehouses – wherever it is.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET

Mitigating Risk with Voltage Fusion Data Security Platform
WHITE PAPER: High-value and sensitive data are what drive your business, but they increase your risk of a breach as well. You need a holistic view of risk across both your unstructured and structured data repositories to address how best to protect your crown jewels. Access this white paper to learn about how your data security can benefit from the platform.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET

NetIQ Identity Governance and Administration
PRODUCT OVERVIEW: Discover in this product overview how NetIQ identity governance and administration (IGA) solutions can help your organization seamlessly manage the lifecycle of accounts and access rights to information resources.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET

NetIQ Identity Governance for Your Business
WHITE PAPER: As business owners drive digital transformation to increase efficiency and establish new business models, they also inherit shared responsibility for new challenges and security. Read on to learn about a solution designed to provide businesses with the tools they need to successfully govern entitlements to their information and minimize risk.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET

The Ant and the Grasshopper Tackle Cyberland's Sensitive Data
VIDEO: For modern digital businesses data is the most important resource. This narrative video uses a story about ants and grasshoppers, and their different strategies when preparing for winter, to introduce and demonstrate the fundamental principles and importance of securing sensitive data. Tune in for a fun way to learn more about data protection.
Posted: 21 Oct 2023 | Premiered: 21 Oct 2023

TOPICS:  .NET

The Forrester Wave™: Data Security Platforms, Q1 2023
FORRESTER RESEARCH REPORT: Explore in this analyst report the 14 data security providers that matter most, and how they stand up to the test.
Posted: 21 Oct 2023 | Published: 21 Oct 2023

TOPICS:  .NET

Voice of the Customer for Data Masking
GARTNER RESEARCH REPORT: Data masking enables organizations to transform sensitive data elements to ensure the original values are not identifiable when used in app testing environments. This Gartner “Voice of the Customer” report compares the top data masking vendors on the market, including OpenText, Microsoft, Oracle, and Broadcom. Dive into the Gartner report here.
Posted: 21 Oct 2023 | Published: 21 Oct 2023

TOPICS:  .NET

Brochure - Voltage Fusion Data Security Platform
PRODUCT OVERVIEW: As the value of data continues to increase, and new compliance for data regulation come into effect, organizations need systems and tools to secure their resource. The voltage Fusion Data Security Platform provides a single solution that enables a unified approach to data security, privacy, and governance. Read on to learn more.
Posted: 20 Oct 2023 | Published: 20 Oct 2023

TOPICS:  .NET

State of Code Security: The AppSec Maturity Marathon Report
WHITE PAPER: Application programming interfaces (APIs) represent a growing attack surface and an area where security teams are left vulnerable. This report presents the findings from a study conducted by Dark Reading Research which was designed to better understand the maturity of different organizations’ application security models. Read on to learn more.
Posted: 19 Oct 2023 | Published: 19 Oct 2023

TOPICS:  .NET

Creating Personalized Experiences with Real-Time Insights for CEM
EGUIDE: Creating an engaging and unified multichannel customer experience is a top priority, but many companies find themselves scrambling to adapt. In this expert e-guide, discover how to generate key customer insights in real-time and learn about 4 ways to create personalized experiences.
Posted: 28 Mar 2017 | Published: 21 Mar 2017


Secure Information Exchange in the Digital Age
WHITE PAPER: Forrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.
Posted: 27 Feb 2017 | Published: 31 Jan 2017