OpenText brings decades of expertise to help you unlock data, connect people and processes, and fuel AI with trust
Unify data seamlessly across your enterprise to eliminate silos, improve collaboration, and reduce risks
Get AI-ready and transform your data into structured, accessible, optimized information
Meet regulatory and compliance requirements and protect your information throughout its lifecycle
OpenText helps people manage content, automate work, use AI, and collaborate to boost productivity
See how thousands of companies around the world are succeeding with innovative solutions from OpenText™
Our people are our greatest asset; they are the life of the OpenText brand and values
Learn how we aspire to advance societal goals and accelerate positive change
Find a highly skilled OpenText partner with the right solution to enable digital transformation
Explore scalable and flexible deployment options for global organizations of any size
Local control. Global scale. Trusted AI
Your cloud, your control
Free up resources, optimize performance and rapidly address issues
Run anywhere and scale globally in the public cloud of your choice
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Empower users, service agents, and IT staff to find the answers they need
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Empower users, service agents, and IT staff to find the answers they need
Predict, act, and win with real-time analytics on a smarter data platform
Give users access to the answers they need, faster and easier, with multi-repository AI-based search that lets you contextualize everything from clicks to conversations
Connect once, reach anything with a secure B2B integration platform
Reimagine knowledge with AI-ready content management solutions
Supercharge intelligent workspaces with AI to modernize work
Integrated cybersecurity solutions for enterprise protection
Purpose built data protection and security solutions
Reinvent threat hunting to improve security posture with the power of agile AI
Ship better software—faster—with AI-driven DevOps automation, testing, and quality
Reimagine conversations with unforgettable customer experiences
Get the clarity needed to cut the cost and complexity of IT operations
Redefine Tier 1 business support functions with self-service capabilities from private generative AI
Build custom applications using proven OpenText Information Management technology
Build it your way with OpenText Cloud APIs that create the real-time information flows that enable custom applications and workflows
Protect what matters, recover when it counts
Get greater visibility and sharper insights from AI-driven information management. Ready to see how?
Break free from silos, streamline processes, and improve customer experiences with secure information management for AI
Improve efficiency, security, and customer satisfaction with OpenText
Run processes faster and with less risk
Achieve digital transformation with guidance from certified experts
Modernize your information management with certified experts
Unlock the full potential of your information management solution
Turn support into your strategic advantage
Extend IT teams with certified OpenText application experts
Discover training options to help users of all skill levels effectively adopt and use OpenText products
Modernize your information management with certified experts
Unlock the full potential of your information management solution
Turn support into your strategic advantage
Extend IT teams with certified OpenText application experts
Discover training options to help users of all skill levels effectively adopt and use OpenText products
Information is the heartbeat of every organization. We build information management software so you can build the future
OpenText partners with leading cloud infrastructure providers to offer the flexibility to run OpenText solutions anywhere
OpenText partners with top enterprise app providers to unlock unstructured content for better business insights
Discover flexible and innovative offerings designed to add value to OpenText solutions
Discover the resources available to support and grow Partner capabilities
Get expert product and service support to accelerate issue resolution and keep business flows running efficiently
Explore detailed services and consulting presentations, briefs, documentation and other resources
Multi-National Retail Organization Voltage SecureData Enterprise supports digital transformation by providing comprehensive data security to 7+ million cloud-hosted customer records

Support customer’s digital transformation while enabling them to focus on their core business and reduce hardware and maintenance investment.
With a global presence of over 12,000 physical stores, the organization is also extremely focused on digital transformation with a successful multi-channel approach.
In a classic IT model, organizations manage their security in a layered or siloed approach. Sensitive data flows between applications, the network layer, databases, file systems, and data center storage systems. Although the data is secured at each of these levels, there are inevitable security gaps between the different layers, as data moves around the infrastructure. A project manager for the organization’s CISO office, explains the issue: “Although within the layers all data was encrypted, if a privileged user account is compromised this could still cause a data leak. We used SFTP for data flow protection, but the exchanged file contained plain text data which is risky too since it is stored between the different steps from the source to the destination. Our layer approach was also expensive, as each layer needed its own security solution with its own expertise, making resourcing complex. With an enterprise-wide move towards the cloud, leveraging Azure and Google Cloud, we needed the peace-of-mind of comprehensive data security. We felt transforming our security model to a data-centric approach would solve these issues.”.
On average, we on-board a new application into Voltage every other week. We encrypt data by default so that it is only ever exposed when really required. This gives us a much better risk and compliance position.
Unlike point solutions that require system-based security integration, data-centric security enables trusted data to move between untrusted environments. It allows full data security as data moves from storage to in-flight to in use within applications, remaining entirely usable in encrypted form. After evaluating several market options, the organization moved forward with SecureData Enterprise, to drive business value through secure data.
Making ‘privacy by default’ central to the organization’s security architecture means that data stays fully encrypted from the moment it enters the system. The data format and integrity, including validation rules, are respected through the use of Voltage’s Format-Preserving Encryption (FPE) by OpenText. Standard encryption can lead to data bloatage, where more fields are used in the encrypted format than in the original. This can result in system performance issues, and unnecessary maintenance and support overhead. Leveraging Voltage FPE, partial or full fields are encrypted but the fields remain the same size and format. The project manager comments on the importance of this: “We have over seven million cloud-hosted customer records, each one containing up to 10 encrypted fields. [Voltage] FPE supports virtually any data type in any format and no database schema updates are required to preserve usability and referential integrity for data processes and applications. We can have field-specific decryption, for instance to decrypt just the fields required for sending emails during a marketing campaign.”
Working with Micro Focus (now OpenText), we have enhanced collaboration between security, development, operations, and project teams as they share data knowledge they require for their particular task in the product lifecycle.
Traditionally, decryption key administration is complex and costly. An organization needs to maintain a key database, as well as the corresponding hardware, software, and IT processes required to protect the database continuously. There is typically also a need to replicate or backup keys from site to site. Not so with Voltage Stateless Key Management by OpenText™. This securely derives keys on-the-fly as required by an application, once that application and its users have been properly authenticated and authorized against a centrally managed policy. The keys don’t need to be stored as they are just generated when required, making life easier from an operations and disaster recovery perspective.
Fast time to market is everything, and service delivery improvement is a key success factor for the organization. The project manager recalls a recent scenario where having ‘security by design’ at the heart of the IT architecture proved invaluable: “Our marketing department came up with a great idea to engage our loyalty card holders through a collaboration with an innovative gaming company. We would gain valuable extra intelligence on our customers, while they could have some fun. Normally, we would need to fully understand how an application works and how it manages sensitive data, including data flows. However, the Voltage basis we have in place makes it easy for us to integrate 3rd party applications really quickly, often from start-up companies who are very agile, but may not have data security at their forefront. Because we keep control of the data access we can speed up the global process, while complying fully with GDPR and other relevant data privacy regulations. We accelerate our business, but in a fully secure manner.”
All data is captured in a Hadoop data lake where it stays encrypted. Consuming applications retrieve data from it and if it needs to be decrypted, Voltage manages the authorization through the key identifier stored in each data object. Google Big Query is used by the data science and business intelligence teams to process data correlation which drives data-driven decision making. Business analysts enjoy working with Voltage as it is clear the data is protected through its end-to-end lifecycle, while integrating with a broad range of environments, clients, and platforms.
As part of its organization, a banking and finance division stores sensitive financial customer data. Applying the Voltage datacentric security principles at a central level means that the company saves time and money on individual Privacy Impact Assessments (PIAs), as the auditing authorities already have full visibility into the data security processes.
The project manager can see clear benefits: “As a result of implementing Voltage in a data-centric security model, we are more agile and can respond much faster to ever-changing business requirements. On average, we on-board a new application into Voltage every other week. We encrypt data by default so that it is only ever exposed when really required. This gives us a much better risk and compliance position.”
He concludes: “Working with Micro Focus (now OpenText), we have enhanced collaboration between security, development, operations, and project teams as they share data knowledge they require for their particular task in the product lifecycle. We now feel very confident in our brand image: ‘all your data is encrypted— Your data is safe with us!’”

With a global presence of over 12,000 physical stores, the organization is also extremely focused on digital transformation with a successful multi-channel approach.