ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:OpenText

  • Creating a Secure Software Supply Chain You Can Trust

    Software supply chains form a complex ecosystem that allow companies to innovate quickly by using common components. However, these ecosystems can quickly turn into weaknesses if attackers compromise the open-source components or the vendors you rely on for their software and services. Learn how to secure your supply chain in this white paper.

  • Unlock Resources With Automated Open-Source Discovery And Intake

    For a deep dive on the possibilities of automated open-source discovery and intake, review this 2024 Forrester report.

  • State of Code Security: The AppSec Maturity Marathon Infographic

    57% of organizations are implementing DevSecOps, with 60%-64% still relying on manual methods to find vulnerabilities. Dive into this State of Code Security infographic to learn more about the AppSec maturity marathon.

  • Increase Speed and Accuracy with AI Driven Static Analysis Auditing

    Triaging and validating raw static analysis results is one of the most time-intensive manual processes within AppSec testing. Fortify Audit Assistant leverages past audit decisions to power machine learning-assisted auditing. Learn more about the latest innovations of Fortify Audit Assistant in this white paper.

  • Voltage Powers Data Privacy CCPA/CPRA

    New compliance laws demand more data privacy than ever before. Voltage Fusion by OpenText delivers advanced privacy-enhancing and privacy preserving technologies to help customers deliver on compliance while ensuring that the data can be securely and ethically shared across the business. Read on to learn more.

  • Multinational Retail Organization

    To evolve their siloed approach to data-centric security, this retailer sought out Voltage SecureData, encrypting 6 million daily transactions and 7 million customer records for risk management and GDPR compliance. Read the study to ascertain 6 SecureData successes from the retailer.

  • Voltage Powers Data Privacy (GDPR)

    Grab a copy of this product overview to gain a firm understanding of how Voltage Fusion by OpenText delivers advanced privacy-enabling and privacy-preserving technologies to augment GDPR, ISO 27701, and other compliance programs.

  • Belbim

    When this financial government institution began to struggle with information protection, they sought out a way that they could ensure data privacy regulatory compliance while also improving their data structure visibility to streamline data management. Browse this case study to learn more.

  • The State of Passwordless Authentication: Security and Convenience Drive the Change

    Recent findings show that 80% of all breaches use compromised identities and can take up to 250 days to identify. This white paper presents the findings of a new survey commissioned by OpenText and conducted by Dark Reading, aiming to shed insight into the state of passwordless security. Read on to learn more.

  • Queensland Museum

    Queensland Museum was looking to discover “lost” and sensitive data sitting in a wide range of repositories. Using the Voltage Fusion data platform from OpenText, the Museum was able to: Discover 11% duplicated and 38% obsolete filesAchieve $60,000 annual storage cost savingsLearn more about Voltage Fusion here.

  • Privacy Compliance in North America: Status and Progress in 2023

    Year over year, more organizations are experiencing a high number of breach types.75% of organizations dealt with two or more types of breaches in 2023, up from 28% in 2022. This white paper reports on how organizations in the United States and Canada are meeting the requirements of current and emerging privacy regulations. Dive into the report.

  • CISO and CIO Investment Priorities for Cybersecurity in 2023

    The top investment priorities in cybersecurity for CISOs and CIOs focused on cloud security, ransomware protections, and improving underlying data disciplines such as discovery and classification. Dive into this CISO and CIO Investment Priorities for Cybersecurity in 2023-24 report to learn more about the state of cybersecurity heading into 2024.

  • NetIQ Advanced Authentication for Your Business

    As cyber threats continue to get more advanced and harder to catch, many organizations are turning to authentication strategies to combat attacks and more. However, most companies don’t know where to begin when it comes to building an authentication framework. Dig into this white paper to learn more.

  • Voltage Fusion Overview and Introduction

    This video provides an overview of a data discovery solution designed to equip data protection and risk management professionals with the tools they need to quickly find, secure, and protect sensitive and high-value data. Tune in to learn how you can leverage the service to unlock complete visibility across structured and unstructured data silos.

  • Mitigating Risk with Voltage Fusion Data Security Platform

    High-value and sensitive data are what drive your business, but they increase your risk of a breach as well. You need a holistic view of risk across both your unstructured and structured data repositories to address how best to protect your crown jewels. Access this white paper to learn about how your data security can benefit from the platform.

  • Hub - Voltage Fusion Data Security Platform

    Data and application sprawl is the norm today. Depending on the survey source, enterprise data volumes are growing by 60% or more per month! Access this article to learn about Voltage Fusion Data Security Platform, which helps you identify your sensitive data across your file shares, databases, and cloud data warehouses – wherever it is.

  • NetIQ Identity Governance and Administration

    Discover in this product overview how NetIQ identity governance and administration (IGA) solutions can help your organization seamlessly manage the lifecycle of accounts and access rights to information resources.

  • NetIQ Identity Governance for Your Business

    As business owners drive digital transformation to increase efficiency and establish new business models, they also inherit shared responsibility for new challenges and security. Read on to learn about a solution designed to provide businesses with the tools they need to successfully govern entitlements to their information and minimize risk.

  • The Ant and the Grasshopper Tackle Cyberland's Sensitive Data

    For modern digital businesses data is the most important resource. This narrative video uses a story about ants and grasshoppers, and their different strategies when preparing for winter, to introduce and demonstrate the fundamental principles and importance of securing sensitive data. Tune in for a fun way to learn more about data protection.

  • The Forrester Wave™: Data Security Platforms, Q1 2023

    Explore in this analyst report the 14 data security providers that matter most, and how they stand up to the test.

  • Voice of the Customer for Data Masking

    Data masking enables organizations to transform sensitive data elements to ensure the original values are not identifiable when used in app testing environments. This Gartner “Voice of the Customer” report compares the top data masking vendors on the market, including OpenText, Microsoft, Oracle, and Broadcom. Dive into the Gartner report here.

  • Brochure - Voltage Fusion Data Security Platform

    As the value of data continues to increase, and new compliance for data regulation come into effect, organizations need systems and tools to secure their resource. The voltage Fusion Data Security Platform provides a single solution that enables a unified approach to data security, privacy, and governance. Read on to learn more.

  • State of Code Security: The AppSec Maturity Marathon Report

    Application programming interfaces (APIs) represent a growing attack surface and an area where security teams are left vulnerable. This report presents the findings from a study conducted by Dark Reading Research which was designed to better understand the maturity of different organizations’ application security models. Read on to learn more.

  • Creating Personalized Experiences with Real-Time Insights for CEM

    Creating an engaging and unified multichannel customer experience is a top priority, but many companies find themselves scrambling to adapt. In this expert e-guide, discover how to generate key customer insights in real-time and learn about 4 ways to create personalized experiences.

  • Secure Information Exchange in the Digital Age

    Forrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.