OpenText brings decades of expertise to help you unlock data, connect people and processes, and fuel AI with trust
Unify data seamlessly across your enterprise to eliminate silos, improve collaboration, and reduce risks
Get AI-ready and transform your data into structured, accessible, optimized information
Meet regulatory and compliance requirements and protect your information throughout its lifecycle
OpenText helps people manage content, automate work, use AI, and collaborate to boost productivity
See how thousands of companies around the world are succeeding with innovative solutions from OpenText™
Our people are our greatest asset; they are the life of the OpenText brand and values
Learn how we aspire to advance societal goals and accelerate positive change
Find a highly skilled OpenText partner with the right solution to enable digital transformation
Explore scalable and flexible deployment options for global organizations of any size
Local control. Global scale. Trusted AI
Your cloud, your control
Free up resources, optimize performance and rapidly address issues
Run anywhere and scale globally in the public cloud of your choice
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Empower users, service agents, and IT staff to find the answers they need
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Empower users, service agents, and IT staff to find the answers they need
Predict, act, and win with real-time analytics on a smarter data platform
Give users access to the answers they need, faster and easier, with multi-repository AI-based search that lets you contextualize everything from clicks to conversations
Connect once, reach anything with a secure B2B integration platform
Reimagine knowledge with AI-ready content management solutions
Supercharge intelligent workspaces with AI to modernize work
Integrated cybersecurity solutions for enterprise protection
Purpose built data protection and security solutions
Reinvent threat hunting to improve security posture with the power of agile AI
Ship better software—faster—with AI-driven DevOps automation, testing, and quality
Reimagine conversations with unforgettable customer experiences
Get the clarity needed to cut the cost and complexity of IT operations
Redefine Tier 1 business support functions with self-service capabilities from private generative AI
Build custom applications using proven OpenText Information Management technology
Build it your way with OpenText Cloud APIs that create the real-time information flows that enable custom applications and workflows
Protect what matters, recover when it counts
Get greater visibility and sharper insights from AI-driven information management. Ready to see how?
Break free from silos, streamline processes, and improve customer experiences with secure information management for AI
Improve efficiency, security, and customer satisfaction with OpenText
Run processes faster and with less risk
Achieve digital transformation with guidance from certified experts
Modernize your information management with certified experts
Unlock the full potential of your information management solution
Turn support into your strategic advantage
Extend IT teams with certified OpenText application experts
Discover training options to help users of all skill levels effectively adopt and use OpenText products
Modernize your information management with certified experts
Unlock the full potential of your information management solution
Turn support into your strategic advantage
Extend IT teams with certified OpenText application experts
Discover training options to help users of all skill levels effectively adopt and use OpenText products
Information is the heartbeat of every organization. We build information management software so you can build the future
OpenText partners with leading cloud infrastructure providers to offer the flexibility to run OpenText solutions anywhere
OpenText partners with top enterprise app providers to unlock unstructured content for better business insights
Discover flexible and innovative offerings designed to add value to OpenText solutions
Discover the resources available to support and grow Partner capabilities
Get expert product and service support to accelerate issue resolution and keep business flows running efficiently
Explore detailed services and consulting presentations, briefs, documentation and other resources
 US Department of Defense contractor
US Department of Defense contractorOpenText™ NetIQ™ Identity Governance accelerated the adoption of a unified review process to address audit findings and improve security and compliance at scale

The business must pass a CMMC compliance assessment and improve enterprise governance audit results.
A US Department of Defense (DoD) contractor had to prepare for compliance with the Cybersecurity Maturity Model Certification (CMMC). This new certification model is the latest development by the DoD to reduce risk in the defense supply chain. A compliant CMMC score is critical as future DoD procurements will require minimum CMMC scoring for suppliers to compete for contracts and task orders. To address specific CMMC security controls, DoD contractors must perform certain identity governance and administration processes. However, application owners were already struggling with the existing audits, access reviews, and compliance of several critical financial applications and other sensitive databases. The DoD contractor chose to leverage a COTS solution to address their governance deficiencies.
Implementing NetIQ Identity Governance accelerated progress toward meeting CMMC requirements by automating the onboarding of so many applications quickly and simplified the administrative burden of governance across the organization, which was a huge positive paradigm shift.
TriVir, an OpenText (formerly Micro Focus) Cybersecurity partner with nearly 20 years of experience supporting commercial and government clients with complex identity and access requirements, was engaged to improve the existing governance processes and quickly integrate with enterprise systems. After assisting with vendor selection and recommending NetIQ Identity Governance, TriVir piloted a solution to connect Identity Governance with the Identity Vault, Active Directory, and the Card Management System.
NetIQ Identity Governance was ideal for the task of defining and enforcing identity governance controls for access to business applications, as well as enabling system owners to control the security of valuable business assets. This was all done in an automated, web-based fashion instead of spending weeks or months manipulating data in spreadsheets. While the deployment’s default review fulfillment mechanism was to use ServiceNow tickets, some changes could be made directly to the Identity Vault or Active Directory. The Internal Audit team reviewed evidence captured and presented by the system to ensure compliance with audit policy which increased the level of trust that the system was successfully collecting all relevant data and remediating access change decisions properly.
System and application owners saw these benefits and requested identity governance onboarding for their systems and applications. After the successful initial deployment, the management team was excited to tackle the next identity governance challenges.
After the successful initial deployment, the next governance challenge was connecting to over 200 applications with accounts and permissions stored in databases with similar schemas. The typical configuration of one IG collector for accounts and one IG collector for permissions to each of these 200 databases wasn’t feasible because it would take too long to configure each of these 400 identity governance collectors manually. Jim Montgomery, TriVir Governance Practice Lead, explains the novel approach to integrating with so many applications: “We created an application integration model to quickly onboard more than 200 applications by leveraging the organization’s Enterprise Service Bus (ESB) and two custom-developed NetIQ Identity Governance account and permission collectors for all 200 DBs.” In most cases, database owners could onboard themselves with very little assistance–all they had to provide were the connection details and match up their database fields to the collector schema. Building identity governance collectors that use the existing enterprise service bus allowed data to pass securely between systems and enabled automatic onboarding of applications with similar account and permission mapping needs.
The successful connection to 200 databases was still only scratching the surface–hundreds of high-risk applications and thousands of additional in-scope applications were next to meet CMMC compliance. Using this proven design, the work continues to identify application types successfully integrated previously and applications with similar data models for quick onboarding. Shifting this mapping exercise to the application owners focuses on the experts best suited to provide the information. Additionally, sharing the efforts with application teams allows a faster deployment than if the IG team connected one application at a time.
The DoD contractor chose to implement a privileged access management (PAM) solution, CyberArk, to store and track the usage of privileged account credentials. With so many elevated privileges, this system became management’s next target for access review and certification.
Although no CyberArk collector is available out of the box, NetIQ Identity Governance contains an SDK for writing custom collectors and fulfillers for any system. TriVir assisted the DoD contractor with creating a custom collector for CyberArk to gather the system’s different account and permission types. The organization’s CyberArk system contained both internal CyberArk accounts and Active Directory accounts from the local domain. CyberArk uses “safes” to store credentials and access information, and permissions to the safes are configured separately. Both permissions sets needed to be cataloged to understand who had what kind of access to a particular safe and what kind of access to what was stored in the safe.
Once both types of accounts and permissions were imported, reviews of who has access to which safes and who has access to privileged accounts for enterprise apps were configured. This consolidation of administrative and privileged account information both simplified and greatly improved the organization’s security.
We have worked with the NetIQ suite of identity and access management solutions for the last 20 years and felt NetIQ Identity Governance ticked all required boxes. We introduced it in a proof-of-concept (POC) and beat the other vendors in the mix.
Brent Kynaston, TriVir Solution Architect, describes the success experienced so far: “The system owners tell us emphatically how much better their user experience is with the full automation of identity governance. They no longer need to respond to cumbersome and time-consuming queries about what entitlements are assigned within their applications, who has assigned them, and why. Instead, internal and external auditors log onto a user-friendly enterprise portal where they can run specific reports that provide all the required data.”
Jim Montgomery explains how TriVir helped the DoD contractor meet CMMC compliance regulations: “This particular DoD contractor manages tens of thousands of identities, covering thousands of applications, including financial solutions containing very sensitive data. Implementing NetIQ Identity Governance accelerated progress toward meeting CMMC requirements by automating the onboarding of so many applications quickly and simplified the administrative burden of governance across the organization, which was a huge positive paradigm shift.
This rapid deployment facilitated the complete audit and access review process for more applications than had ever been reviewed before. More importantly, the first review and access certification removed many erroneous existing accesses, resulting in significant zero trust progress toward least-privilege access. It was estimated more than 3000 hours were saved by eliminating manual data sampling, spreadsheet review, and email communication. The success of this program has enabled CMMC compliance and opened the door to continue adding thousands of additional applications.