Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

OpenText Inc.

OpenText can help you tackle the most complex digital transformation programs with confidence. With the world's most complete and integrated Information Management platform, we empower our customers to organize, integrate and protect data and content as it flows through business processes inside and outside their organization.

Our Website: https://security.opentext.com/


Latest Content From OpenText Inc.

E-Book: What to Look For in a Network Detection and Response Platform

by OpenText Inc.Feb 28, 2022

As organizations navigate the transition to remote work, the rise in ransomware, and the aftershocks of SUNBURST, security teams need a better way to identify, investigate and take action quickly. That's why an NDR solution is a must-have. But selecting the right tool can be a challenge given the number of vendors and the specifics of each environment.

This eBook provides insight that helps you simplify the search and identify the right features and functions for your business.

Read "What to Look For in a Network Detection and Response Platform" to understand these key aspects to consider:

  • Network Visibility: Empower your security organization or replace them?
  • Detection: Is it all about behavior or should I look for more?
  • Storage and Retention: here today gone tomorrow?
  • Simplicity of Deployment: Eliminating Blind Spots
  • Costs: Understanding TCO
  • Dipping your toe in the water: Early stage testing


Whitepaper: Managed Detection and Response (MDR): Investigative Capability as a Key Selection Factor

by OpenText Inc.Feb 28, 2022

Managed detection and response (MDR) solutions benefit from investigative capabilities, particularly as derived and evolved from the digital forensic community. Buyers should thus include investigative experience as a selection factor when reviewing MDR offerings.

This whitepaper reviews the key selection factor that buyers are advised to consider in their selection of an MDR partner. This key factor, investigative capability, involves the MDR vendor's ability to perform analytic tasks to make sense of the data from managed infrastructure. The case is made here that investigative capabilities, including how such expertise has evolved within the vendor team, is a primary predictor of MDR success.

Read this whitepaper to learn more about:

  • Investigation as a key MDR Component
  • Elements of a Digital Forensic Investigation
  • Questions to ask your MDR provider


Whitepaper: MITRE Endpoint Security Testing: Interpreting Results

by OpenText Inc.Feb 28, 2022

MITRE endpoint security testing offers a means for gaining insight into how commercial vendors approach threat detection. The third round of MITRE ATT&CK evaluations tested 29 Endpoint Detection & Response products against emulated FIN7 and Carbanak threat tactics and techniques. Together these threat actors have resulted in the theft of more than $1 billion targeting financial services and hospitality businesses over the past five years. OpenText EnCase Endpoint Security demonstrated strength in visibility, flexibility and real-time detection.

Read this white paper to understand and interpret the results from the MITRE ATT&CK Round 3 evaluation.


Whitepaper: Evaluating Your Managed Extended Detection and Response Provider

by OpenText Inc.Feb 28, 2022

Managed Detection and Response (MDR) solutions have become a vital tool for cyber security, but the glut of available offerings can be confusing for enterprise teams to evaluate. These solutions evolved out of 1990s-era managed security service (MSS) options which were limited to attack prevention and perimeter-based firewalls. Download to learn the top tips on how MXDR now provides a far more holistic approach including data collection and processing, incident response, analysis support and access to experienced security experts.