Security & Protection Cloud
Secure. Investigate. Recover.
Cyber resilience and investigative solutions to keep threats at bay

Protect critical information at scale
Get peace of mind with award-winning solutions to maintain business security and continuity to better manage cyber threat, data loss and endpoint protection, forensic investigation and remediation.
-
Discreet agent, installed anywhere
Protect against advanced threats with a single, unified and low-impact agent that is invisible to users and installed on anything.
-
Remote remediation and collection
Monitor, remediate and forensically collect data remotely with unrivaled endpoint visibility and OS and artifact support.
-
Recognized as an industry leader
Partner for data protection, endpoint security and forensic investigations with the dominant, award-winning voice in security, from solutions to 24/7 support.
Endpoint Detection & Response (EDR)
Detect cyber threats, comprehensively respond and recover from compromise to avoid a data breach.
Endpoint and Network Security
Go beyond traditional antivirus to keep critical systems, data and users safe from ransomware, phishing, malware and other cyberattacks with cyber security purpose-built for SMBs and home users.
Digital Investigations and Forensics
Accurately analyze digital evidence to support IT, HR, Compliance and Law Enforcement investigations.
Information Governance, Risk & Compliance
Identify and protect privileged, sensitive (PII, PHI, etc.) and confidential (IP) data from inadvertent disclosure to third parties in litigation, investigations, FOIA requests, data breach response and DSAR/SRR (GDPR, CCPA) related requests.
Data Protection, Backup and Migration
Fill protection gaps for small businesses through complex enterprise environments, from server and endpoint backup to workload migration and disaster recovery.
Threat Intelligence Services
Integrated by leading network and security vendors for accurate and near realtime threat intelligence into network and endpoint protection to protect customers from malicious URLs, IPs, files and mobile apps.
Security & Protection Cloud customers
What’s new in Security & Protection Cloud
Deploy anomaly detection rules based on MITRE ATT&CK
Automate incident response with SOAR technologies
Get new threat intelligence capabilities–file, IP and DNS
Investigate off-network endpoints
Cloud-enabled security and investigations
OpenText in the cloud
Customer choice and flexibility
Training and Certification
Develop in-house security skills with world-class training and certification programs led by industry pioneers who have helped advance the careers of more than 60,000 expert forensic investigators.
Advanced technologies
Accelerate digital transformation and free up resources for creativity and innovation.
Resources

-
Visit the OpenText Security Information Portal
-
Read SANS‘ EnCase Endpoint Security product review
-
How cybersecure are your edges?
-
How phishing capitalized on a global crisis