OpenText brings decades of expertise to help you unlock data, connect people and processes, and fuel AI with trust
Unify data seamlessly across your enterprise to eliminate silos, improve collaboration, and reduce risks
Get AI-ready and transform your data into structured, accessible, optimized information
Meet regulatory and compliance requirements and protect your information throughout its lifecycle
OpenText helps people manage content, automate work, use AI, and collaborate to boost productivity
See how thousands of companies around the world are succeeding with innovative solutions from OpenText™
Our people are our greatest asset; they are the life of the OpenText brand and values
Learn how we aspire to advance societal goals and accelerate positive change
Find a highly skilled OpenText partner with the right solution to enable digital transformation
Explore scalable and flexible deployment options for global organizations of any size
Local control. Global scale. Trusted AI
Your cloud, your control
Free up resources, optimize performance and rapidly address issues
Run anywhere and scale globally in the public cloud of your choice
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Empower users, service agents, and IT staff to find the answers they need
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Empower users, service agents, and IT staff to find the answers they need
Predict, act, and win with real-time analytics on a smarter data platform
Give users access to the answers they need, faster and easier, with multi-repository AI-based search that lets you contextualize everything from clicks to conversations
Connect once, reach anything with a secure B2B integration platform
Reimagine knowledge with AI-ready content management solutions
Supercharge intelligent workspaces with AI to modernize work
Integrated cybersecurity solutions for enterprise protection
Purpose built data protection and security solutions
Reinvent threat hunting to improve security posture with the power of agile AI
Ship better software—faster—with AI-driven DevOps automation, testing, and quality
Reimagine conversations with unforgettable customer experiences
Get the clarity needed to cut the cost and complexity of IT operations
Redefine Tier 1 business support functions with self-service capabilities from private generative AI
Build custom applications using proven OpenText Information Management technology
Build it your way with OpenText Cloud APIs that create the real-time information flows that enable custom applications and workflows
Protect what matters, recover when it counts
Get greater visibility and sharper insights from AI-driven information management. Ready to see how?
Break free from silos, streamline processes, and improve customer experiences with secure information management for AI
Improve efficiency, security, and customer satisfaction with OpenText
Run processes faster and with less risk
Achieve digital transformation with guidance from certified experts
Modernize your information management with certified experts
Unlock the full potential of your information management solution
Turn support into your strategic advantage
Extend IT teams with certified OpenText application experts
Discover training options to help users of all skill levels effectively adopt and use OpenText products
Modernize your information management with certified experts
Unlock the full potential of your information management solution
Turn support into your strategic advantage
Extend IT teams with certified OpenText application experts
Discover training options to help users of all skill levels effectively adopt and use OpenText products
Information is the heartbeat of every organization. We build information management software so you can build the future
OpenText partners with leading cloud infrastructure providers to offer the flexibility to run OpenText solutions anywhere
OpenText partners with top enterprise app providers to unlock unstructured content for better business insights
Discover flexible and innovative offerings designed to add value to OpenText solutions
Discover the resources available to support and grow Partner capabilities
Get expert product and service support to accelerate issue resolution and keep business flows running efficiently
Explore detailed services and consulting presentations, briefs, documentation and other resources
Cryptography is the foundation of cybersecurity, and can effectively protect both consumer privacy and sensitive data from attackers. When encrypted data is stolen, what may have been a serious breach is only a mere incident: something to continue to protect against, but which has minimal impact and may not even require public disclosure.
OpenText™ Voltage™ SecureData uses cryptographic algorithms and keys, and the proper management of cryptographic keys is essential to effective use of encryption: poor key management can make strong algorithms useless. The National Institute of Standards and Technology (NIST) publishes “Recommendations for Key Management” in Special Publication 80057 (Part 1, Revision 5).
Modern, strong encryption is never cracked, but often bypassed. It does not matter how much encryption is done: if keys are not well protected, it takes little for a hacker to obtain the crown jewels, with significant business and reputational impact. Key management is just as important as implementing strong cryptography, and is all too often the Achilles heel of enterprise data security and privacy programs.
There are two ways to create a cryptographic key: generate a random key, or calculate it. It's easy to understand why random keys are good. There is no computational trick that will help an attacker guess a random value that is any better than just guessing all possible values until they get the right one. But it is also possible to generate keys dynamically, in a manner that is just as secure as the traditional approach: by using random seed material generated once, and then deriving keys on demand based on combining a key “name” or an “identifier” with that seed material.
The most secure way to calculate a key is by using a secure key derivation function (KDF), the output of which is a derived key. Derived keys are just as secure as random keys, but they have some significant practical advantages. In particular, they make it much cheaper to buy, use, and maintain systems that employ them.
Traditional key management entails a complex sequence: generating keys, marking them “not yet used” backing them up; making them available; assigning names; marking them as “in use” deactivating them, so they are no longer available; and more, including replication, synchronization, archiving, and permissions management. This is tedious, and installations using many encryption keys quickly find that key management is as much or more work than the actual encryption.
The downside of the random key generation approach is that you must back up each new key before it is used to encrypt data. If you do not, then the protected data will not be able to be decrypted if the key store fails.
Comparatively, derived keys offer some significant practical advantages. Since the secret changes only rarely, backups are infrequently required and the need for the whole create-activate-name-deactivate sequence (other than authorization) is removed. Multiple key servers can be created from a single backup and are guaranteed to derive the same keys from the same inputs, since the original seed material is reused, without requiring any real-time replication or synchronization. There is also no risk of losing keys: if an application loses a derived key, it can be re-derived as easily as generating it in the first place.
Regardless of the key management solution, a significant challenge is to ensure that keys are not mishandled by users. It is critical to disconnect users and developers from key management. Application teams should not be involved in storing, protecting, or rotating encryption keys, and nor should they be allowed to actually possess keys. Instead, they should be provided with key identifiers and an interface to an abstraction layer that automates key generation, retrieval, caching, protection, and refresh.
Voltage SecureData by OpenText™ implements stateless key management, giving enterprises unprecedented scale and simplified key management. With Voltage SecureData, key management is also abstracted, which means developers don’t ever hold keys and hence don’t need to store them. Instead they store identities – key names – which can be meaningful strings, such as PAN, SSN, SensitiveData, etc. Developers can store these identities in properties files without any protection, since they are not sensitive. SecureData client software takes care of the key management processes – key retrieval, security, cache, etc. With remote, REST-based operation, keys are never exposed outside of the SecureData server. SecureData enables key derivation at the SecureData server or within an HSM.
Encryption can be hard, and key management is even harder; but there are ways to make key management easier while fully complying with even the most rigorous standards. Voltage SecureData makes key management easy helping to shield this critical aspect of a data security program.
Protect high-value data while keeping it usable for hybrid IT
Secure data, reduce risks, improve compliance, and govern access