OpenText brings decades of expertise to help you unlock data, connect people and processes, and fuel AI with trust
Unify data seamlessly across your enterprise to eliminate silos, improve collaboration, and reduce risks
Get AI-ready and transform your data into structured, accessible, optimized information
Meet regulatory and compliance requirements and protect your information throughout its lifecycle
OpenText helps people manage content, automate work, use AI, and collaborate to boost productivity
See how thousands of companies around the world are succeeding with innovative solutions from OpenText™
Our people are our greatest asset; they are the life of the OpenText brand and values
Learn how we aspire to advance societal goals and accelerate positive change
Find a highly skilled OpenText partner with the right solution to enable digital transformation
Explore scalable and flexible deployment options for global organizations of any size
Local control. Global scale. Trusted AI
Your cloud, your control
Free up resources, optimize performance and rapidly address issues
Run anywhere and scale globally in the public cloud of your choice
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Empower users, service agents, and IT staff to find the answers they need
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Empower users, service agents, and IT staff to find the answers they need
Predict, act, and win with real-time analytics on a smarter data platform
Give users access to the answers they need, faster and easier, with multi-repository AI-based search that lets you contextualize everything from clicks to conversations
Connect once, reach anything with a secure B2B integration platform
Reimagine knowledge with AI-ready content management solutions
Supercharge intelligent workspaces with AI to modernize work
Integrated cybersecurity solutions for enterprise protection
Purpose built data protection and security solutions
Reinvent threat hunting to improve security posture with the power of agile AI
Ship better software—faster—with AI-driven DevOps automation, testing, and quality
Reimagine conversations with unforgettable customer experiences
Get the clarity needed to cut the cost and complexity of IT operations
Redefine Tier 1 business support functions with self-service capabilities from private generative AI
Build custom applications using proven OpenText Information Management technology
Build it your way with OpenText Cloud APIs that create the real-time information flows that enable custom applications and workflows
Protect what matters, recover when it counts
Get greater visibility and sharper insights from AI-driven information management. Ready to see how?
Break free from silos, streamline processes, and improve customer experiences with secure information management for AI
Improve efficiency, security, and customer satisfaction with OpenText
Run processes faster and with less risk
Achieve digital transformation with guidance from certified experts
Modernize your information management with certified experts
Unlock the full potential of your information management solution
Turn support into your strategic advantage
Extend IT teams with certified OpenText application experts
Discover training options to help users of all skill levels effectively adopt and use OpenText products
Modernize your information management with certified experts
Unlock the full potential of your information management solution
Turn support into your strategic advantage
Extend IT teams with certified OpenText application experts
Discover training options to help users of all skill levels effectively adopt and use OpenText products
Information is the heartbeat of every organization. We build information management software so you can build the future
OpenText partners with leading cloud infrastructure providers to offer the flexibility to run OpenText solutions anywhere
OpenText partners with top enterprise app providers to unlock unstructured content for better business insights
Discover flexible and innovative offerings designed to add value to OpenText solutions
Discover the resources available to support and grow Partner capabilities
Get expert product and service support to accelerate issue resolution and keep business flows running efficiently
Explore detailed services and consulting presentations, briefs, documentation and other resources
IT Security ProviderIT firm uses ArcSight to dramatically improve cybersecurity visibility for a telecommunications company

Help protect the operations and reputation of a large telecommunications company from cyber attack.
One such customer is a large telecommunications provider that contacted the IT security provider to help resolve a cybersecurity problem. The company’s complex IT environment and multiple levels of bureaucracy were causing headaches for IT employees trying to monitor the company’s environment for threats.
To detect security breaches or suspicious behavior, the telco needed to monitor data logs from thousands of devices and applications. This included applications created by the company’s in-house developers, as well as many types of telecommunications equipment. “We’re talking about a very large number of systems,” says a manager at the IT security provider.
Interpreting the deluge of data logs generated by these devices and applications was difficult. The number of applications and devices was also rapidly increasing.
Collecting and ingesting the logs was time consuming. IT employees couldn’t access the systems and logs belonging to some business units, but instead needed to ask for help from relevant managers. Someone also had to sign forms giving them permission to collect the data.
Even if employees did collect, ingest, and analyze the log data, they couldn’t do it quickly enough to respond to breaches. “It was taking too much time. If there was an attack, it would have been finished before they could act to prevent or stop it,” says the manager. As a result, the company did not comprehensively monitor its systems for security threats.
There was also a risk that any of the company’s many employees would inadvertently cause a security breach. They had minimal understanding of cybersecurity, and might be lured by attackers to click on links to malware or phishing schemes. Without a way to quickly monitor network activity, the company didn’t know if users were adhering to security rules. “Their security department created security policies, but if users didn’t abide by them there was no way to catch them,” the manager says.
The telco was therefore highly vulnerable to data breaches. The company had also failed an audit, designed to check that systems followed the Payment Card Industry Data Security Standard (PCI DSS). If the company didn’t resolve this problem, there would be potential financial sanctions.
To speed up the telco’s ability to detect threats, employees needed a centralized mechanism to collect and ingest data logs from the entire business. They also needed a way to rapidly analyze the logs.
To achieve this, the company purchased a security information and event monitoring (SIEM) solution. This would automate the collection and analysis of log data, allowing IT employees to respond to threats much faster.
The company tested SIEM solutions from LogRhythm and OpenText, and evaluated a solution from RSA. Like many of the IT security provider’s customers, the telco scrutinized the products in detail, spending a year testing Enterprise Security Manager (ESM) proof of concept. “Our customers want to dig deep into the functionality,” the manager says.
By late 2016, the company chose the OpenText solution, primarily because employees could integrate with various applications and devices, and because the system could be customized to detect threats more accurately and in real-time. “The Micro Focus (now OpenText) product’s flexibility was the deciding factor,” says another manager at the IT security provider.
This is for companies that don’t just want a token SIEM. The system is very flexible. They can customize it and fine-tune it any way they want.
The telco was in the final stages of integrating ESM at the time of writing. The IT security provider expects the solution will provide significant benefits.
One will be simplifying the task of monitoring the complex IT environment. The telco has connected more than 2,000 systems to ESM. “Even the employee attendance machine is connected to ArcSight,” the manager says.
The OpenText solution also makes it easier to monitor applications that the telco has customized. To connect some SIEM tools to these applications, employees would usually need assistance from the software vendor that created the applications. But they found this wasn’t necessary using ESM.
Processing the log data was also much easier. Previously, even if IT staff members had access to log data, they weren’t always able to understand it, the manager notes. “They would have to ask, ‘What am I looking for? How can I detect if something is wrong?’” he says. By contrast, the OpenText solution performs the difficult and repetitive part of this process automatically. “ArcSight opens the logs, and reads and classifies them. It formats them in a way that administrators can understand,” he says.
By collecting data from many systems, the ESM gives the company a greater likelihood of detecting suspicious network activity. This allows staff members to respond to security events to determine the threat risk, reducing the risk of attacks interrupting operations or damaging the company’s reputation. It will also save employees hours of work.
The company received encouraging evidence of this during the proof of concept test, when ESM alerted employees to a vulnerability they had not previously seen. “It was something they could not detect before. That was a major convincing argument to purchase ArcSight,” the manager says.
Another important benefit is that users can customize ESM so that it provides more accurate alerts about potential breaches.
For example, organizations can create use case rules and content that directs the SIEM which specific system activity they are most concerned about. This is particularly helpful for banks, which can create rules to alert them to certain activity involving their databases.
“The system is very flexible. They can customize it and fine-tune it any way they want,” says the manager. “This is for companies that don’t just want a token SIEM.”
These rules can be used to identify potential network activity as suspicious, even if it doesn’t technically breach company policies. For example, during the ESM proof of concept test, a use case rule alerted the telco to a user logging on to the organizations’ systems at 3 a.m.
An increasing number of the IT security provider’s customers are requesting SIEM tools to address regulatory compliance, according to another manager. “We are seeing [governments] enforcing banks to go through a SIEM solution for PCI compliance. I’m seeing customers request that more and more,” she adds. With the ESM implementation nearly complete, the telco is already looking at other ways it can improve security. This could include purchasing Fortify, which tests software code for vulnerabilities.
Whenever we have a large customer with a lot of customizable solutions, then we go with ArcSight.

As a provider of innovative cybersecurity solutions to customers around the world, this IT security provider, who prefers to remain anonymous, understands the challenges of securing large and complex IT environments. The company has a customer portfolio that includes banks, manufacturers, and airlines. These clients utilize the solutions the IT security provider sells to collectively monitor thousands of devices, systems, and applications. Some have a significant workforce with minimal IT knowledge, which creates security risks and technological gaps.