skip to main content

Security solutions

Address enterprise risk, information security and digital investigation needs with industry-leading forensic-grade solutions

Explore the latest features

What are Enterprise Information Security solutions?

Secure the Intelligent and Connected Enterprise with forensic visibility and fearless response

With cybercrime evolving rapidly, data security software is no longer optional. Privacy and risk management leaders know that cybersecurity solutions are essential to good information management and critical to protecting one of their business’s most valuable assets—their enterprise data.

The best enterprise information security solutions provide deep visibility into data security and investigate potential risk across all endpoints and devices as it emerges. They also allow for greater automation and contextualization of security events for faster triage, more informed decision-making, data loss prevention and effective remediation.

OpenText Security Suite overview

OpenText™ Security Suite, powered by OpenText™ EnCase™, provides 360-degree visibility across laptops, desktops and servers for proactive discovery of sensitive data, identification and remediation of threats and discreet, forensically-sound data collection and investigation.

With agents deployed on more than 40 million endpoints, clients that include 78 of the Fortune 100 and more than 6,600 EnCE™ certified users, Security Suite delivers the industry gold standard for incident response and digital investigations.

EnCase solutions help enterprises, government agencies and law enforcement address a range of needs around risk and compliance, file analytics, endpoint detection and response (EDR) and digital forensics with the most trusted digital forensics and cybersecurity software. Solving problems that often go undetected or unsolved on the endpoint, Security Suite restores the confidence of companies and their customers with unparalleled reliability and breadth of coverage.

Security Suite is augmented by OpenText Professional Services, providing consulting and implementation services, managed services and learning services for Security products.

Protect against threats

Don't fight today's threat with yesterday's strategies. Read the latest white paper by OpenText CEO & CTO Mark J. Barrenechea to learn how a Zero Trust approach to security helps safeguard information.

Get the CEO white paper


What's new in Security

  • Deploy anomaly detection rules based on MITRE ATT&CK

  • Automate incident response with SOAR technologies

  • Get new threat intelligence capabilities–file, IP and DNS

  • Investigate off-network endpoints

  • Cloud-enabled security and investigations

Learn more about the new Security features in the launch blog.

OpenText Security features

  • Access data on Apple Computers with T2 Chip

    Uses the EnCase Agent in EnCase Forensic and Endpoint Investigator to remotely preview and acquire data from Apple computers equipped with a T2 Security chip.

  • OneDrive connector

    Available for EnCase eDiscovery, Forensic, and Endpoint Investigator, collect data from Microsoft OneDrive cloud and on-premise storage accounts for eDiscovery or digital forensic investigations.

  • Modernized web interface beta release

    Provides a modern and intuitive user experience with functional, beta implementations of Legal Hold and Jobs workflow ready for customer validation.

  • Endpoint Security & Investigator integration

    Unifies the incident response and forensic examination process with automated case creation in OpenText™ EnCase™ Endpoint Security. Streamlines triage process to bring the Investigator to the Security dashboard.

  • TX1 on secure 802.1X networks

    Offers TX1 on networks locked down with 802.1X network access control policies. 802.1X support is required by some forensic labs, government agencies, and corporations.

Customer success stories

OpenText Security benefits

  • Earlier threat detection and response

    Detect elusive risks, threats and anomalous activity, exposing and addressing threats before they have a chance to harm the organization.

  • Forensic-grade visibility

    Expose data risks, no matter how well hidden, with the gold standard in digital investigations.

  • Data compliance

    Align with the threat detection and response requirements of numerous regulations and mandates, such as PCI, HIPAA, PHI, and EU GDPR.

  • Complete, remote collection without disruption

    Collect potentially relevant data from all sources efficiently and discreetly, with no impact on day-to-day business.

  • Accelerated investigations

    Spend more time investigating and less time analyzing data, with automatic processing and indexing functions.

  • Total defensibility

    Preserve collected evidence in the industry-standard EnCase Evidence File format, proven forensically-sound and accepted in courts worldwide.

Security Suite products

Need help? Contact us to request a demo or quote