OpenText brings decades of expertise to help you unlock data, connect people and processes, and fuel AI with trust
Unify data seamlessly across your enterprise to eliminate silos, improve collaboration, and reduce risks
Get AI-ready and transform your data into structured, accessible, optimized information
Meet regulatory and compliance requirements and protect your information throughout its lifecycle
OpenText helps people manage content, automate work, use AI, and collaborate to boost productivity
See how thousands of companies around the world are succeeding with innovative solutions from OpenText™
Our people are our greatest asset; they are the life of the OpenText brand and values
Learn how we aspire to advance societal goals and accelerate positive change
Find a highly skilled OpenText partner with the right solution to enable digital transformation
Explore scalable and flexible deployment options for global organizations of any size
Local control. Global scale. Trusted AI
Your cloud, your control
Free up resources, optimize performance and rapidly address issues
Run anywhere and scale globally in the public cloud of your choice
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Empower users, service agents, and IT staff to find the answers they need
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Empower users, service agents, and IT staff to find the answers they need
Predict, act, and win with real-time analytics on a smarter data platform
Give users access to the answers they need, faster and easier, with multi-repository AI-based search that lets you contextualize everything from clicks to conversations
Connect once, reach anything with a secure B2B integration platform
Reimagine knowledge with AI-ready content management solutions
Supercharge intelligent workspaces with AI to modernize work
Integrated cybersecurity solutions for enterprise protection
Purpose built data protection and security solutions
Reinvent threat hunting to improve security posture with the power of agile AI
Ship better software—faster—with AI-driven DevOps automation, testing, and quality
Reimagine conversations with unforgettable customer experiences
Get the clarity needed to cut the cost and complexity of IT operations
Redefine Tier 1 business support functions with self-service capabilities from private generative AI
Build custom applications using proven OpenText Information Management technology
Build it your way with OpenText Cloud APIs that create the real-time information flows that enable custom applications and workflows
Protect what matters, recover when it counts
Get greater visibility and sharper insights from AI-driven information management. Ready to see how?
Break free from silos, streamline processes, and improve customer experiences with secure information management for AI
Improve efficiency, security, and customer satisfaction with OpenText
Run processes faster and with less risk
Achieve digital transformation with guidance from certified experts
Modernize your information management with certified experts
Unlock the full potential of your information management solution
Turn support into your strategic advantage
Extend IT teams with certified OpenText application experts
Discover training options to help users of all skill levels effectively adopt and use OpenText products
Modernize your information management with certified experts
Unlock the full potential of your information management solution
Turn support into your strategic advantage
Extend IT teams with certified OpenText application experts
Discover training options to help users of all skill levels effectively adopt and use OpenText products
Information is the heartbeat of every organization. We build information management software so you can build the future
OpenText partners with leading cloud infrastructure providers to offer the flexibility to run OpenText solutions anywhere
OpenText partners with top enterprise app providers to unlock unstructured content for better business insights
Discover flexible and innovative offerings designed to add value to OpenText solutions
Discover the resources available to support and grow Partner capabilities
Get expert product and service support to accelerate issue resolution and keep business flows running efficiently
Explore detailed services and consulting presentations, briefs, documentation and other resources
OpenText™ Network Detection & Response streamlines cyber threat hunting and triage efforts with improved contextual network visibility
Create more contextual visibility to detect cyber threats without flooding the system with false positives that slow down performance.
This organization employs more than 100,000 people, producing and selling a wide range of consumer goods. Although it has a mature security operations center (SOC), its security team felt it needed more contextual visibility to make sure no crucial cyber threat information was missed. The team’s security architect explains further: “We are committed to our Zero Trust journey with real-time network monitoring and controls to identify and stop malicious activity. We have a sophisticated security information and event management (SIEM) solution but were essentially still relying on traditional network security to detect cyber threats. To address a flat network design, lack of access controls, and possibly over-permissive firewall rules, we felt we needed an advanced network detection and response solution to gain the visibility we were lacking.”
Having evaluated two potential solutions in this space, the organization found that the requirements it initially thought were needed changed as the team learned more about different capabilities. For instance, packet capture (PCAP) is essential to analyze the network’s raw packet data. In a large environment such as this, with millions of network flows every day, the team is at risk of being flooded with many false positives. Network Detection & Response (NDR) combines detection, forensic analysis, and proactive threat hunting to provide enterprise security teams with full visibility. Unlike the other solutions, it includes smart PCAP to provide flow detail to expedite alert triage. When unusual network activity is detected, such as significant communications with an unknown server or conviction of a potentially malicious file, a smart PCAP creation is triggered. This simultaneously and intelligently begins to target the packets in the stream of known interest. This enables SOCs to search the right packets immediately after receiving an alert, optimizing their threat hunting and triage efforts.
We started to measure the number of major incidents that were identified and confirmed within our network. In the last 12 months since we installed the NDR solution, we identified over 200 of these issues that have been assigned priority levels and are currently in active assessment by our cyber threat response team.
“After learning what PCAP could do for us, it became a key requirement that was easily met by NDR,” says the security architect. “We also particularly appreciated that the OpenText solution is designed with federal government clients in mind, where security is paramount and the solution often has to operate in an air-gapped environment, with no direct connection to external networks. Due to the sensitive nature of data traversing our network, we require on-premises storage for packet capture and metadata. In a global operation such as ours, this prevents compliance issues related to PII and our own proprietary data.”
A proof-of-concept (POC) enabled the organization to explore NDR further and discover how best to leverage the different components within a global environment. The OpenText Cybersecurity experts worked closely with the security team, configuring the NDR solution within their architecture and, through regular calls, explaining the key features around the available analytics and metadata. The POC experience gave the team a better understanding of the scalability of NDR, which was an important requirement for this organization, as the deployment spans multiple geographical locations. The cost of ownership for NDR is typically lower than for alternative solutions, as clients can purchase and use their own hardware rather than paying a premium for hardware included within the network detection and response solution. Most large organizations have volume discount deals with their existing hardware vendors that can easily be leveraged with an NDR deployment.
Following the successful POC, the decision to go with the NDR solution was straightforward, according to the security architect: “We received excellent support and engagement from OpenText during the POC. Their simple pricing model meant that we didn’t need to procure dedicated appliances to utilize NDR, and instead could easily deploy it on standard bare metal servers, hypervisor-hosted virtual machines, and in the cloud. We tailored the NDR solution to our specific requirements, leveraging custom signatures, use-cases, and advanced data tuning policies. From day one, this gave us the ability to scan, alert, and create rich metadata on tens of gigabytes of traffic without significant performance issues."
NDR gave us the increased network visibility that we needed, while never compromising our data security. Combined with a hardware-agnostic go-to-market strategy and a very advantageous pricing model, we are delighted with our choice. We estimate that our partnership with OpenText will ultimately save us many hundreds of thousands of dollars.
One of NDR’s strengths is its ability to seamlessly integrate with existing environments. Within this organization, it is integrated with the existing SIEM and security orchestration, automation, and response (SOAR) infrastructure. The SIEM integration relies on raw JSON log exports of all alerts generated by the system. The integration of the NDR solution with the company’s SOAR is based on specific alert aggregation queries and dedicated API calls to provide SOC analysts with a holistic view of any issue, including alert data for all signatures violated by a specific host. This delivers downstream visibility to easily optimize response workflows.
The increased visibility soon began to deliver results. “We started to measure the number of major incidents that were identified and confirmed within our network,” comments the security architect. “This could range from unencrypted traffic to unauthorized applications that were downloaded. In the last 12 months since we installed the NDR solution, we identified over 200 of these issues that have been assigned priority levels and are currently in active assessment by our cyber threat response team.”
He concludes: “NDR gave us the increased network visibility that we needed, while never compromising our data security. Combined with a hardware-agnostic go-to-market strategy and a very advantageous pricing model, we are delighted with our choice. We estimate that our partnership with OpenText will ultimately save us many hundreds of thousands of dollars.”
This organization employs more than 100,000 people, producing and selling a wide range of consumer goods. Although it has a mature security operations center (SOC), its security team felt it needed more contextual visibility to make sure no crucial cyber threat information was missed.