skip to main content

Security & Protection Security & Protection Cloud

Secure. Investigate. Recover.

Cyber resilience and investigative solutions to keep threats at bay

Contact us

Protect critical information at scale

Get peace of mind with award-winning solutions to maintain business security and continuity to better manage cyber threat, data loss and endpoint protection, forensic investigation and remediation.

  • Discreet agent, installed anywhere

    Protect against advanced threats with a single, unified and low-impact agent that is invisible to users and installed on anything.

  • Remote remediation and collection

    Monitor, remediate and forensically collect data remotely with unrivaled endpoint visibility and OS and artifact support.

  • Recognized as an industry leader

    Partner for data protection, endpoint security and forensic investigations with the dominant, award-winning voice in security, from solutions to 24/7 support.

Endpoint Detection & Response (EDR)

Detect cyber threats, comprehensively respond and recover from compromise to avoid a data breach.

Endpoint and Network Security

Go beyond traditional antivirus to keep critical systems, data and users safe from ransomware, phishing, malware and other cyberattacks with cyber security purpose-built for SMBs and home users.

Digital Investigations and Forensics

Accurately analyze digital evidence to support IT, HR, Compliance and Law Enforcement investigations.

Information Governance, Risk & Compliance

Identify and protect privileged, sensitive (PII, PHI, etc.) and confidential (IP) data from inadvertent disclosure to third parties in litigation, investigations, FOIA requests, data breach response and DSAR/SRR (GDPR, CCPA) related requests.

Data Protection, Backup and Migration

Fill protection gaps for small businesses through complex enterprise environments, from server and endpoint backup to workload migration and disaster recovery.

Threat Intelligence Services

Integrated by leading network and security vendors for accurate and near realtime threat intelligence into network and endpoint protection to protect customers from malicious URLs, IPs, files and mobile apps.

What’s new in Security & Protection Cloud

  • Deploy anomaly detection rules based on MITRE ATT&CK
  • Automate incident response with SOAR technologies
  • Get new threat intelligence capabilities–file, IP and DNS
  • Investigate off-network endpoints
  • Cloud-enabled security and investigations

Explore the latest features

OpenText in the cloud

Content Cloud logo

Content Cloud

Connect content, people and process to get more productivity, collaboration, governance and compliance.

Learn more

Business Network Cloud logo

Business Network Cloud

Build adaptive, sustainable and compliant trading networks by connecting any business, person, system or thing.

Learn more

OpenText Experience Cloud logo

Experience Cloud

Improve customer interactions by managing the compelling content that powers personalized omnichannel experiences.

Learn more

Developer Cloud logo

Developer Cloud

Use service-based cloud capabilities to reduce development costs and improve time-to-market with faster ways to build applications and solution extensions.

Learn more

Training and Certification

Develop in-house security skills with world-class training and certification programs led by industry pioneers who have helped advance the careers of more than 60,000 expert forensic investigators.

Advanced technologies

Accelerate digital transformation and free up resources for creativity and innovation.


Visit the OpenText Security Information Portal thumbnail

Have questions?

Contact us