2063 OpenText Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "GilbyIM, based on Content Manager, breaks down many of the barriers that stop smaller organizations adopting a records management solution that is genuinely compliant. It’s simple, affordable and secure."

  • "Content Manager-based GilbyIM comes with a built-in retention schedule which we can amend if required. We have complete control and can restrict user access to just view or just add documents. It is so helpful to have a clear and safe records repository, especially for our local authority audits."

  • "Content Manager makes life a lot easier. I can concentrate on doing my job."

  • "In close partnership with OpenText Cybersecurity, we constructed a five-year unlimited subscription license. This flexibility, combined with a per-event pricing model, alleviates our incremental infrastructure cost concerns, and gives us a predictable cost model. It enables us to move to a cloud environment with ease while vastly reducing our administrative workload."

  • “With the advent of the cloud, many of our clients see great opportunities to reduce their IT footprint and streamline their business. Although this is good news, the cloud also brings with it an expanded attack surface and even a slight Microsoft 365 misconfiguration can have disastrous consequences. We partner with OpenText Cybersecurity to provide a multilayered cyber resilience approach to keep our clients’ data and systems safe.”

  • “We couldn’t report on our data in a centralized manner, all the data was separated into different systems. That meant that when we found a security threat, our security administrators would need to examine the logs for each business system. This would take too much time; time in which a security breach could do untold damage to our business. This manual and time-consuming process meant we couldn’t meet our compliance regulations and were being charged penalties.”

  • “It wasn’t just a shift for our staff and students; today, parents no longer wait for report cards, they have real-time interaction with teachers and access to their children’s progress. We connect students, teachers, and parents across different cloud services and internal domains linking our two campuses. We had to quickly figure out how we allow access to sensitive student information for external stakeholders, such as parents. With students operating multiple devices to access learning materials, we found ourselves supporting over 10,000 user touch points.”

  • "We are fully compliant with the latest financial services regulations and thanks to Voltage SecureData [Enterprise] we achieved this in a minimally invasive manner, without having to change our existing infrastructure. We protect our sensitive data very cost-effectively in a complex and distributed environment."

  • "Having a single, centralized point of management is fantastic as we can now monitor access to all systems much more efficiently."

  • “At a very basic level, we all love to know who we're working with and understanding where people fit in the organization helps improve productivity. This is not so easy in a decentralized environment like ours, and setting up a comprehensive company directory, including photos, and org charts, was a key initiative for us."

  • “ArcSight was on our radar from the early days. It was, and in my opinion still is, the number one SIEM on the market, backed by a reassuring position in Gartner’s magic quadrant.”

  • "[NetIQ] Access Manager gives us granular control over authentication, so we can manage a complex hierarchy of access rights for attorneys."

  • “Because many of our clients are government agencies, we deal with stringent regulatory compliance requirements. But even in the private sector, with increasingly sophisticated cyberattacks and the high volumes of sensitive data that are at risk of leakage, there is an expectation that throughout the supply chain of service providers, everyone complies with strict cybersecurity rules. Considering the growing data processing needs that we see in most of our clients, providing a scalable system is essential to our success.”

  • “We are a centralized security division for the whole company, across all locations. Although security has always been important to us, a move towards cloud-hosting our own and our partner’s applications made us much more aware of potential security risks. Once the organization as a whole understood the serious consequences of a security breach with a cloud-hosted application, it became a priority to find a solution that could help us identify any potential application vulnerabilities.”

  • "The Catholic Church is one of the oldest institutions in the world and is now increasingly embracing new technology to improve communication, work processes and collaboration between parishes and dioceses. To enable smooth and quick co-operation across organizational borders, we needed to simplify and streamline our internal processes and re-think how we could ensure efficiency in managing large numbers of people with different access rights."