Category: Cybersecurity, Cybersecurity
OpenText Fortify On Demand
This Guided Tour gives an overview of how Innovate Inc.’s team uses Fortify on Demand to manage application security. It covers tasks such as generating application security assessment reports, triaging vulnerabilities, and auditing code. It also provides a few sample reports generated by Fortify on Demand.
OpenText ArcSight Intelligence
In this demo lab you'll see how using OpenText ArcSight Intelligence brings a new level of understanding and interpretation of threat discovery data for advanced threat detection.
OpenText™ Cybersecurity Aviator
In this demo you'll see how using generative AI, Aviator brings a new level of understanding and interpretation of threat discovery data to OpenText's ArcSight Intelligence product.
Data Subject Access Request (DSAR) using OpenText Voltage Fusion
This Guided Tour provides an overview of a Data Subject Access Request (DSAR) supported by OpenText Voltage Fusion
Real-Time Threat Detection and Response for Enhanced Network Protection using OpenText Network Detection and Response
Join our guided tour to explore how our solution addresses the challenge of detecting and responding to unusual network behaviors, such as abnormal data flows or unrecognized protocols, which often indicate cyber threats.
Automated Forensic Data Collection using OpenText Encase Endpoint Security in Incident Response
This guided tour explores a powerful use case of forensic data collection using Encase Endpoint Security to address gaps in incident response caused by missing crucial evidence.
OpenText ArcSight Enterprise Security Manager End-to-End Security Incident Management
This guided-tour lab showcases end-to-end security incident management workflow with IT service management (OpenText SMAX) Integration - covering detection, escalation, and resolution.
OpenText Voltage Fusion - Data Minimization and ROT analysis
This guided tour illustrates the cleanup of duplicate records as well as analysis related to Redundant, Obsolete and Trivial data. Administrator will use Voltage Fusion to perform these activities.