This comprehensive collection of articles explores a wide range of cutting-edge technology topics relevant to today's business landscape. From artificial intelligence and data analytics to content management and cybersecurity, our industry experts delve into all the latest trends and innovations. These articles also cover essential business areas such as DevOps, IT operations, and remote workforce solutions, providing valuable insights that align with OpenText products and solutions.
Whether you're a tech professional or a business leader looking to stay ahead of the curve, these in-depth articles offer the knowledge and understanding you need to navigate the ever-evolving world of technology.
Learn how adaptive access management can adjust your businesses the level of access security, and how it adjusts those safeguards to match the risk at hand.
Agile software development refers to project management methodologies that help dev teams deliver high-quality end results.
Agile testing is a method of testing software that follows the principles of agile software development. Learn more about the process and benefits.
Learn how AIOps applies big data analytics, AI, and machine learning to IT operations data to identify patterns, enhance common processes, and automate tasks.
Learn what API Security is, and why it is essential to application security and preventing malicious attacks on application program interfaces.
Application security includes security measures at the application level that aim to prevent data breaches within applications.
Artificial intelligence (AI) imitates human intelligence with machines. Learn more about how OpenText incorporates artificial intelligence into its solutions.
Discover what B2B integration is, why it is important for your supply chain, and how it can optimize collaboration with customers, suppliers, and partners.
Business to business federated access enforces identity security standards and protocols. Learn more about B2B federated access.
What is behavioral data, why you should be collecting it, and how to use it to protect your business.
Capacity planning can help your business better plan for the future. Learn more about capacity planning and why it is important to your business.
Cloud Access Security Broker (CASB) is used to monitor cloud-related activity and apply security, compliance, and governance rules to cloud based resources.
Chaos engineering is an approach to software development testing designed to achieve resilience against unexpected failures.
Continuous integration (CI) and continuous delivery (CD) are methods development teams use to deliver frequent code changes.
Cloud backup is a process where your server's data is backed up and stored in another location in the cloud for better protection.
Cloud data management refers to the practice of storing, organizing, protecting, and analyzing data using cloud computing infrastructure and services.
Cloud management systems help maintain administrative control of cloud computing. Learn how cloud service management can help your enterprise.
Cloud orchestration helps to manage the interconnection of workloads on cloud infrastructures.
A configuration management database (CMDB) is a database used to make it much easier to keep track of IT assets and configurations.
Cognitive search, powered by artificial intelligence (AI), delivers contextually aware information that is highly relevant to the user's information quest by understanding the user's intent and the patterns and relationships within the data corpus.
Content management is the process of managing content from creation to delivery. Learn more about content management and frameworks.
Learn about cyber resilience and why it is essential to your organization to adapt to known and unknown security crises, threats, adversities, and challenges.
Cyber threat hunting is a security process that hunts for malicious or suspicious activities that may have previously evaded detection.
Cybersecurity helps to prevent security threats and protect organizations effectively. OpenText explains the importance of cybersecurity in organizations.
Learn what Data Access Governance is and how it can help your business identify and address threats from unauthorized access to your unstructured data.
Learn about data collection, starting with defining what it means. Get access to data collection blogs, resources, conferences and more today.
Data governance is a framework that helps organizations better manage data assets.
Learn how Data mesh and data fabric take different approaches to solving the disparate data problem in order to help you achieve more value from data.
Data orchestration is the process of organizing, coordinating, and managing various data-related tasks and workflows across multiple systems, applications, and storage locations.
Learn all about data security, starting with an expert definition. Get access to data security resources including blog posts, articles, research papers, and more.
Learn how Database as a Service (DBaaS) provides database access without needing physical hardware, installing software, or configuring the database.
Data-centric audit and protection (DCAP) is an approach to information protection that combines data security and audit functionality.
What is DevOps, what are its key capabilities, and how can it enable faster, more successful application production rollouts?
DevSecOps, aka Secure DevOps or SecDevOps, enables seamless application security earlier in the software development lifecycle (SDLC).
A Digital Factory is an organizational model for creating and maintaining one or more digital products, services, or experiences.
Digital transformation can have a major positive impact on your company. Learn how to get started with your digital business transformation.
Dynamic Application Security Testing (DAST) helps catch vulnerabilities in an application before it is deployed. Learn why it's an important part of the SDLC.
Encryption helps protect your data by preventing it from being accessed by unauthorized users. Learn more about what encryption is and how it works.
Learn why Enterprise Service Management (ESM) is essential, and why businesses should rethink their approach to providing employee workplace services.
Event correlation refers to the processes involved in analyzing relationships between events. Learn more about event correlation and its tools.
Learn what file analysis is, and why it is important to help your organization address increasing data volumes and identifying who has access to what data.
Learn more about FinOps, its key areas, and how it helps cross-functional teams collaborate and manage cloud computing costs.
OpenText explains functional testing, functional testing types, and how to achieve value from functional tests. Learn more about our functional testing software.
Learn what a Hybrid cloud strategy is and how organizations deploy analytics and services on both public and private clouds for greater flexibility and power.
Learn how Hybrid cloud is used as an IT infrastructure that combines public and private clouds and enables applications to be managed and ported between them.
Learn what hybrid it management is and how it helps manage both cloud and on-premises infrastructure to provide a lower-cost, lower-risk approach to IT operations.
Learn why information management is a critical discipline in today's information-driven business world.
Learn what Identity and Access Management is and why it's essential to protect your business's sensitive information and systems from unauthorized access.
Learn how identity governance and administration (IGA) ensures that only the right people have access to sensitive information with your IT infrastructure.
Information governance is a defined strategy for information in your organization. Learn more about information governance and why it's vital to your business.
Insider threats pose internal threats to businesses and their data. Learn more about the types of insider security threats in cyber security.
Learn how IT automation uses software to create repeatable instructions and processes that can replace or reduce human interaction with IT systems.
IT Service Management (ITSM) is the set of policies, processes and procedures to design, plan, deliver, operate, control and improve customer-oriented IT services.
Learn why the proper management of cryptographic keys is essential to effective encryption and why poor key management can make strong algorithms useless.
Load testing measures the speed or capacity of a system or component. Learn more about load testing and how it works.
Machine learning is an application of AI that allows applications to learn from experience and improve over time. Learn more about machine learning functionality.
Mobile authentication helps to verify a user's identify securely. Learn more about mobile authentication and why it is vital to your business.
Learn what multi-factor authentication is and how your business can use MFA to protect your data and prevent cybersecurity attacks.
Learn how Advanced Authentication allows organizations to implement passwordless solutions for 2-factor authentication, multi-factor authentication implementations.
Network management helps to effectively manage and maintain your enterprise networks.
Discover how network observability ensures optimal performance and seamless connectivity.
Learn about observability in ITOps and how it differs from traditional monitoring by providing a comprehensive understanding of system/application behavior.
Open Source Security provides users better visibility into the open source inventory of applications. Learn more about open source security.
OSINT is the insight gained from analyzing public data sources such as broadcast TV and radio, social media, and websites.
Learn about the OWASP Top 10 and how it provides application security guidelines to help developers secure the applications they design and deploy.
Learn more about performance engineering and the differences between performance engineering and performance testing.
Here's a look at what performance testing is and how it can vastly improve the quality of your organization's applications.
Discover how policy orchestration provides centralized visibility and control over access rights, policy changes, and policy controls across organizations' IT environments.
Learn how Predictive Maintenance applies data analytics to improve expensive break/fix and scheduled maintenance service models.
Learn what the security concept of “least privilege access” is and why users should only be granted access to what they need to be productive, but no more.
Learn how Privileged Access Management (PAM) helps your business facilitate administrative access across your complex, hybrid infrastructure.
What is release management and what are the key steps in the release management process? Find the answers to these questions and more.
Risk based authentication (RBA) helps your business to calculate the risk of the user requesting access and adapt your authentication accordingly. Learn more about risk based authentication.
What is RPA? How can robotic process automation help automate processes to perform everyday tasks? What are RPA use cases?
OpenText explains what a security operations center (SOC) is and how a security operations center can benefit your organization's cybersecurity strategy.
Single Point of Administration software helps to centralize access control for all web sites, eliminating the need for multiple software tools.
Learn how Single Sign-On logins and SSO authentication work, and how a user can log in to several related, yet independent, secure systems with one ID.
Static Application Security Testing scans the source files of an application to identify security flaws in the code. Learn more about SAST.
What is test management and what can it be used for? Learn more about test management and test management processes and tools.
The software development life cycle (SDLC) is a process used to design, develop, and test software applications.
Threat intelligence helps security teams prevent cyberattacks. Learn more about how threat intelligence and detection can protect your business.
We break down what tokenization is and how tokenization of data works. Learn more about the process of tokenization with examples provided.
Trusted Internet Connection (TIC) 3.0 helps standardize the security process of individual external network connections. Learn more about Zero Trust at OpenText.
Unstructured data is datasets that aren't organized within a predefined manner. Knowing the types of unstructured data and how to manage them is essential.
User and Entity Behavior Analytics (UEBA) helps to improve on outdated security tools and identify unknown cyber-attacks.
What is value stream management and what can it be used for? Learn more about ValueEdge—our value stream management software.
A virtual assistant is a cognitive computing system that acts like a human operator by engaging, guiding and providing users with contextually relevant information.
What is a zero trust security? Learn what zero trust is, how to implement zero trust security, and the challenges faced in implementing a zero trust security model.