Category: Cybersecurity, Cybersecurity
Automating Data Subject Access Requests (DSAR) with OpenText Core Data Discovery & Risk Insights
This guided tour overviews ‘Data Subject Access Request’ capabilities of OpenText Core Data Discovery & Risk Insights.
OpenText Core Threat Detection and Response
This guided tour showcases OpenText™ Core Threat Detection and Response, a cutting-edge addition to our end-to-end OpenText Cybersecurity portfolio. Designed to provide comprehensive threat detection capabilities across an entire security landscape, it leverages advanced AI-powered behavioral analytics to redefine how organizations protect against, detect, and respond to cyber threats—quickly, accurately, and confidently.
OpenText™ Cybersecurity Aviator
In this demo you'll see how using generative AI, Aviator brings a new level of understanding and interpretation of threat discovery data to OpenText's ArcSight Intelligence product.
Debricked Open Source Select and Software Composition Analysis
This Guided Tour overviews the Debricked tool, showcasing its capabilities through the perspective of a fictional developer, Mike Anderson, working at Innovate Inc. on the MediMart Online Shop project.
OpenText Fortify On Demand
This Guided Tour gives an overview of how Innovate Inc.’s team uses Fortify on Demand to manage application security. It covers tasks such as generating application security assessment reports, triaging vulnerabilities, and auditing code. It also provides a few sample reports generated by Fortify on Demand.
OpenText ArcSight Intelligence
In this demo lab you'll see how using OpenText ArcSight Intelligence brings a new level of understanding and interpretation of threat discovery data for advanced threat detection.
Real-Time Threat Detection and Response for Enhanced Network Protection using OpenText Network Detection and Response
Join our guided tour to explore how our solution addresses the challenge of detecting and responding to unusual network behaviors, such as abnormal data flows or unrecognized protocols, which often indicate cyber threats.
Automated Forensic Data Collection using OpenText Encase Endpoint Security in Incident Response
This guided tour explores a powerful use case of forensic data collection using Encase Endpoint Security to address gaps in incident response caused by missing crucial evidence.