ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:OpenText

  • Queensland Museum

    Queensland Museum was looking to discover “lost” and sensitive data sitting in a wide range of repositories. Using the Voltage Fusion data platform from OpenText, the Museum was able to: Discover 11% duplicated and 38% obsolete filesAchieve $60,000 annual storage cost savingsLearn more about Voltage Fusion here.

  • Privacy Compliance in North America: Status and Progress in 2023

    Year over year, more organizations are experiencing a high number of breach types.75% of organizations dealt with two or more types of breaches in 2023, up from 28% in 2022. This white paper reports on how organizations in the United States and Canada are meeting the requirements of current and emerging privacy regulations. Dive into the report.

  • CISO and CIO Investment Priorities for Cybersecurity in 2023

    The top investment priorities in cybersecurity for CISOs and CIOs focused on cloud security, ransomware protections, and improving underlying data disciplines such as discovery and classification. Dive into this CISO and CIO Investment Priorities for Cybersecurity in 2023-24 report to learn more about the state of cybersecurity heading into 2024.

  • NetIQ Advanced Authentication for Your Business

    As cyber threats continue to get more advanced and harder to catch, many organizations are turning to authentication strategies to combat attacks and more. However, most companies don’t know where to begin when it comes to building an authentication framework. Dig into this white paper to learn more.

  • Voltage Data Privacy Manager

    Data privacy laws are changing the landscape of test data management, with new laws obligating you to protect citizen data even when consumed internally. So, how can you ensure you’re staying compliant? Read this white paper on Voltage Data Privacy Manager, which takes the risk out of using production data in nonproduction test data environments.

  • Istanbul Metropolitan Municipality

    Istanbul Metropolitan Municipality (IMM) is responsible for utilities, environment, transportation, and many other areas of public service. The company wanted to set up an anonymous charity to support struggling citizens with overdue bills. Discover how Voltage secured the financial system to raise over $6.5 million for those in need.

  • Large Financial Services Company

    In order to unify their data protection practices, this large financial services company launched a corporate data protection program. This led the team to the implementation of Vertica, overhauling their existing data protection protocols. Download the full case study to learn more.

  • Driving Efficiency and Optimization Helps Transform Your Business and Guides Data Privacy Preparedness

    Most organizations have a clear understanding that data growth is an issue, but where do you start to tackle this challenge? Read this white paper to learn about Voltage File Analysis Suite from OpenText, which helps organizations quickly find, protect and secure sensitive and high-value data.

  • Secure Cloud Analytics

    By 2025, according to MarketsandMarkets, the size of the cloud analytics market is projected to grow to $65.4 billion. Along with exploring drivers of that shift, this overview considers how organizations can prioritize security when leveraging cloud analytics. Keep reading to unlock these insights.

  • Voltage Fusion Overview and Introduction

    This video provides an overview of a data discovery solution designed to equip data protection and risk management professionals with the tools they need to quickly find, secure, and protect sensitive and high-value data. Tune in to learn how you can leverage the service to unlock complete visibility across structured and unstructured data silos.

  • Hub - Voltage Fusion Data Security Platform

    Data and application sprawl is the norm today. Depending on the survey source, enterprise data volumes are growing by 60% or more per month! Access this article to learn about Voltage Fusion Data Security Platform, which helps you identify your sensitive data across your file shares, databases, and cloud data warehouses – wherever it is.

  • Mitigating Risk with Voltage Fusion Data Security Platform

    High-value and sensitive data are what drive your business, but they increase your risk of a breach as well. You need a holistic view of risk across both your unstructured and structured data repositories to address how best to protect your crown jewels. Access this white paper to learn about how your data security can benefit from the platform.

  • NetIQ Identity Governance and Administration

    Discover in this product overview how NetIQ identity governance and administration (IGA) solutions can help your organization seamlessly manage the lifecycle of accounts and access rights to information resources.

  • NetIQ Identity Governance for Your Business

    As business owners drive digital transformation to increase efficiency and establish new business models, they also inherit shared responsibility for new challenges and security. Read on to learn about a solution designed to provide businesses with the tools they need to successfully govern entitlements to their information and minimize risk.

  • Voltage SecureData Cloud

    According to Enterprise Strategy Group (ESG), 40% of organizations’ corporate data in the cloud is sensitive in nature and insufficiently secured. Voltage SecureData Cloud by OpenText protects sensitive data persistently across your multi-cloud, hybrid, and on-premises environments. Learn more about Voltage SecureData Cloud in this white paper.

  • The Forrester Wave™: Data Security Platforms, Q1 2023

    Explore in this analyst report the 14 data security providers that matter most, and how they stand up to the test.

  • Voice of the Customer for Data Masking

    Data masking enables organizations to transform sensitive data elements to ensure the original values are not identifiable when used in app testing environments. This Gartner “Voice of the Customer” report compares the top data masking vendors on the market, including OpenText, Microsoft, Oracle, and Broadcom. Dive into the Gartner report here.

  • NetIQ as a Service

    NetIQ offers identity-powered enterprise security solutions as a service. Access multi-factor authentication, identity governance, and privileged access management with flexible deployment, enabling you to strengthen security and reduce risk. Access this resource to learn how cloud-based IAM can help your organization.

  • Brochure - Voltage Fusion Data Security Platform

    As the value of data continues to increase, and new compliance for data regulation come into effect, organizations need systems and tools to secure their resource. The voltage Fusion Data Security Platform provides a single solution that enables a unified approach to data security, privacy, and governance. Read on to learn more.

  • Data Security and Climate Change

    Voltage data security is a platform from OpenText that helps support carbon-friendly data strategies. Voltage data discovery can help you find unused data, unnecessary tables, obsolete databases and even forgotten databases that contain data. Learn more about sustainable data security by reading this white paper.

  • Critical Capabilities for Application Security Testing

    As applications themselves become more complex, and the application portfolios that organizations compile become more diverse, the door is opened to greater levels of risk and vulnerability. This Gartner Critical Capabilities report provides buyers of application security testing (AST) tools with rankings of 12 key vendors. Read on to learn more.

  • State of Code Security: The AppSec Maturity Marathon

    Application programming interfaces (APIs) represent a growing attack surface and an area where security teams are left vulnerable. This report presents the findings from a study conducted by Dark Reading Research which was designed to better understand the maturity of different organizations’ application security models. Read on to learn more.

  • Magic Quadrant for Application Security Testing

    The application security testing market is expanding more rapidly than ever before. This Gartner Magic Quadrant explores the leading vendors from across the application security testing market. Access now to learn more.

  • Creating Personalized Experiences with Real-Time Insights for CEM

    Creating an engaging and unified multichannel customer experience is a top priority, but many companies find themselves scrambling to adapt. In this expert e-guide, discover how to generate key customer insights in real-time and learn about 4 ways to create personalized experiences.

  • Secure Information Exchange in the Digital Age

    Forrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.