SlideShare a Scribd company logo
SERVICE OVERVIEW
OpenText Security Health Check Service
Cost effective review targeting high-impact, strategic cybersecurity controls
Organizations must be proactive and resilient when mitigating
cyber and regulatory risks. Many have implemented new tools
and processes to combat increasing risks, but they may have
lost track of core resilience elements in the process. In order to
properly prevent and respond to cyber-attacks, it’s critical that
they maintain a complete picture of their foundational security
controls and capabilities.
Businesses must assess risks regularly to ensure that security controls required for
compliance are in place and operating effectively. A Cybersecurity Health Check is
a great way to achieve these objectives.
Mitigate
Analyze
OpenText
Security Health
Check
Security Health Check workflow
Initiate
Discover
Recommend
Visibility
into current
capabilities
for 6 foundational
security control
areas
Actionable
recommendations
to address
gaps and drive
security posture
Reduced risk
through improved
procedures
2/2
Copyright © 2024 Open Text. All Rights Reserved. Trademarks owned by Open Text.
For more information, visit: https://www.opentext.com/about/copyright-information • 01.24 | 24696
opentext.com/contact
Visibility—Having a clear line of sight to control activity maturity provides valuable
information to support informed decision-making. OpenText Professional Services
provides an independent assessment of foundational controls that ensures you
have your bases covered.
Actionable recommendations—The key deliverable is a security health check
report featuring an executive summary, identified risks, and recommendations for
improvement. Recommendations are prioritized by the associated risk impact and
ease of implementation.
Reduced risk—Recommended action plans are designed to reduce the risk of a
cyber incident or regulatory fines.
Inventory and Actively manage (inventory, track, and correct) all hardware devices on the
control of hardware network so that only authorized devices are given access. Unauthorized and
assets unmanaged devices are found and prevented from gaining access.
Actively manage (inventory, track, and correct) all software devices on the
Inventory and
network so that only authorized software is installed and can execute. All
control of software
unauthorized and unmanaged software is found and prevented from installation
assets
or execution.
Continuous Continuously acquire, assess, and take action on new information in order to
vulnerability identify vulnerabilities, remediate, and minimize the window of opportunity for
management attackers.
Controlled use Utilize processes and tools to track/control/prevent/correct the use, assignment,
of administrative and configuration of administrative privileges on computers, networks, and
privileges applications.
Secure configuration for
hardware and software Establish, implement, and actively manage (track, report on, correct) the security
on mobile devices, configuration of mobile devices, laptops, servers, and workstations using rigorous
laptops, workstations configuration management and change control process to prevent attackers from
and servers exploiting vulnerable services and settings.
Maintenance
monitoring and Collect, manage, and analyze audit logs of events that could help detect,
analysis of understand, or recover from attack.
audit logs
Security Health Check controls
To talk to a Security Services expert, please contact securityservices@opentext.com
About OpenText
OpenText, The Information Company, enables organizations to gain insight through
market leading information management solutions, on premises or in the cloud. For
more information about OpenText (NASDAQ: OTEX, TSX: OTEX) visit: opentext.com.
Connect with us:
• OpenText CEO Mark Barrenechea’s blog
• X (formerly Twitter) | LinkedIn
Additional
Security Services:
Threat Hunting Service
Cybersecurity
Tabletop Exercise

More Related Content

PDF
OpenText Cyber Resilience Fastrak
PDF
OpenText Vulnerability Assessment & Penetration Testing
PDF
100 Cyber Attack Vectors Every Business Must Know
PDF
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
PPTX
Chapter 3 security part i auditing operating systems and networks
PPTX
Cybersecurity Health Checks: Safeguarding Your Organisation
PPTX
Chapter 3 security part i auditing operating systems and networks
PDF
How To Handle Cybersecurity Risk Powerpoint Presentation Slides
OpenText Cyber Resilience Fastrak
OpenText Vulnerability Assessment & Penetration Testing
100 Cyber Attack Vectors Every Business Must Know
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Chapter 3 security part i auditing operating systems and networks
Cybersecurity Health Checks: Safeguarding Your Organisation
Chapter 3 security part i auditing operating systems and networks
How To Handle Cybersecurity Risk Powerpoint Presentation Slides

Similar to OpenText Security Health Check Service (20)

PDF
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
PDF
How To Present Cyber Security To Senior Management Complete Deck
PDF
How To Present Cyber Security To Senior Management Complete Deck
PDF
ProCern Technology Solutions -Tailored Cyber Health Plans for Comprehensive S...
PPTX
MUSE 2015 Product Showcase v2
PPTX
Introduction-to-Cybersecurit57hhfcbbcxxx
PDF
Network and System Security John R. Vacca
PPTX
Tsc2021 cyber-issues
PDF
Cybersecurity Incident Management Powerpoint Presentation Slides
PDF
OpenText Cyber Resilience Program
PPTX
Cybersecurity Frameworks and You: The Perfect Match
PDF
Cybersecurity Incident Management PowerPoint Presentation Slides
PDF
OpenText Threat Hunting Service
PDF
Overcoming the Challenges of Conducting a SRA
PDF
cybersecurity-careers.pdf
PPTX
So You Want a Job in Cybersecurity
PPTX
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
PPTX
Cybersecurity-Course.9643104.powerpoint.pptx
PDF
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
PDF
Cybersecurity Interview Questions Part -2.pdf
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
ProCern Technology Solutions -Tailored Cyber Health Plans for Comprehensive S...
MUSE 2015 Product Showcase v2
Introduction-to-Cybersecurit57hhfcbbcxxx
Network and System Security John R. Vacca
Tsc2021 cyber-issues
Cybersecurity Incident Management Powerpoint Presentation Slides
OpenText Cyber Resilience Program
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Incident Management PowerPoint Presentation Slides
OpenText Threat Hunting Service
Overcoming the Challenges of Conducting a SRA
cybersecurity-careers.pdf
So You Want a Job in Cybersecurity
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Cybersecurity-Course.9643104.powerpoint.pptx
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
Cybersecurity Interview Questions Part -2.pdf
Ad

More from Marc St-Pierre (20)

PDF
Opentext Incident Response (IR) Service Overview.pdf
PDF
Digital Forensics & Incident Response (DFIR) Service Overview.pdf
PDF
OpenText MxDR Advanced EDR Agent with Autonomous, Next-Gen Protection
PDF
OpenText AI project security and compliance services
PDF
Data Protection Services Service Overview.pdf
PDF
Opentext Managed XDR paves the way for CyberResilience
PDF
OpenText Cybersecurity Tabletop Exercise
PDF
MITRE ATT&CK framework and Managed XDR Position Paper
PDF
OpenText AI & Analytics Services and Solutions Catalog
PDF
The Incident Response Decision Tree
PDF
US Medical University trust OpenText to guard against cyber threats-en.pdf
PDF
OpenText Managed Extended Detection and Response (MxDR)
PDF
Managed Detection and Response (MDR) Whitepaper
PDF
Opentext Translation and Localization Services
PDF
Digital Ethical Risk Assessment
PDF
OpenText Translation & Localization Services
PDF
Opentext Decisiv
PDF
OpenText Taxonomy Catalog & Services
PDF
Open text security services catalog
PDF
OpenText Legal Technology Solutions
Opentext Incident Response (IR) Service Overview.pdf
Digital Forensics & Incident Response (DFIR) Service Overview.pdf
OpenText MxDR Advanced EDR Agent with Autonomous, Next-Gen Protection
OpenText AI project security and compliance services
Data Protection Services Service Overview.pdf
Opentext Managed XDR paves the way for CyberResilience
OpenText Cybersecurity Tabletop Exercise
MITRE ATT&CK framework and Managed XDR Position Paper
OpenText AI & Analytics Services and Solutions Catalog
The Incident Response Decision Tree
US Medical University trust OpenText to guard against cyber threats-en.pdf
OpenText Managed Extended Detection and Response (MxDR)
Managed Detection and Response (MDR) Whitepaper
Opentext Translation and Localization Services
Digital Ethical Risk Assessment
OpenText Translation & Localization Services
Opentext Decisiv
OpenText Taxonomy Catalog & Services
Open text security services catalog
OpenText Legal Technology Solutions
Ad

Recently uploaded (20)

PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Mushroom cultivation and it's methods.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
Heart disease approach using modified random forest and particle swarm optimi...
A comparative study of natural language inference in Swahili using monolingua...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
WOOl fibre morphology and structure.pdf for textiles
Building Integrated photovoltaic BIPV_UPV.pdf
cloud_computing_Infrastucture_as_cloud_p
Group 1 Presentation -Planning and Decision Making .pptx
Enhancing emotion recognition model for a student engagement use case through...
Mushroom cultivation and it's methods.pdf
Programs and apps: productivity, graphics, security and other tools
Web App vs Mobile App What Should You Build First.pdf
NewMind AI Weekly Chronicles - August'25-Week II
TLE Review Electricity (Electricity).pptx
Digital-Transformation-Roadmap-for-Companies.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
1 - Historical Antecedents, Social Consideration.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
MIND Revenue Release Quarter 2 2025 Press Release
Encapsulation_ Review paper, used for researhc scholars
Univ-Connecticut-ChatGPT-Presentaion.pdf

OpenText Security Health Check Service

  • 1. SERVICE OVERVIEW OpenText Security Health Check Service Cost effective review targeting high-impact, strategic cybersecurity controls Organizations must be proactive and resilient when mitigating cyber and regulatory risks. Many have implemented new tools and processes to combat increasing risks, but they may have lost track of core resilience elements in the process. In order to properly prevent and respond to cyber-attacks, it’s critical that they maintain a complete picture of their foundational security controls and capabilities. Businesses must assess risks regularly to ensure that security controls required for compliance are in place and operating effectively. A Cybersecurity Health Check is a great way to achieve these objectives. Mitigate Analyze OpenText Security Health Check Security Health Check workflow Initiate Discover Recommend Visibility into current capabilities for 6 foundational security control areas Actionable recommendations to address gaps and drive security posture Reduced risk through improved procedures
  • 2. 2/2 Copyright © 2024 Open Text. All Rights Reserved. Trademarks owned by Open Text. For more information, visit: https://www.opentext.com/about/copyright-information • 01.24 | 24696 opentext.com/contact Visibility—Having a clear line of sight to control activity maturity provides valuable information to support informed decision-making. OpenText Professional Services provides an independent assessment of foundational controls that ensures you have your bases covered. Actionable recommendations—The key deliverable is a security health check report featuring an executive summary, identified risks, and recommendations for improvement. Recommendations are prioritized by the associated risk impact and ease of implementation. Reduced risk—Recommended action plans are designed to reduce the risk of a cyber incident or regulatory fines. Inventory and Actively manage (inventory, track, and correct) all hardware devices on the control of hardware network so that only authorized devices are given access. Unauthorized and assets unmanaged devices are found and prevented from gaining access. Actively manage (inventory, track, and correct) all software devices on the Inventory and network so that only authorized software is installed and can execute. All control of software unauthorized and unmanaged software is found and prevented from installation assets or execution. Continuous Continuously acquire, assess, and take action on new information in order to vulnerability identify vulnerabilities, remediate, and minimize the window of opportunity for management attackers. Controlled use Utilize processes and tools to track/control/prevent/correct the use, assignment, of administrative and configuration of administrative privileges on computers, networks, and privileges applications. Secure configuration for hardware and software Establish, implement, and actively manage (track, report on, correct) the security on mobile devices, configuration of mobile devices, laptops, servers, and workstations using rigorous laptops, workstations configuration management and change control process to prevent attackers from and servers exploiting vulnerable services and settings. Maintenance monitoring and Collect, manage, and analyze audit logs of events that could help detect, analysis of understand, or recover from attack. audit logs Security Health Check controls To talk to a Security Services expert, please contact securityservices@opentext.com About OpenText OpenText, The Information Company, enables organizations to gain insight through market leading information management solutions, on premises or in the cloud. For more information about OpenText (NASDAQ: OTEX, TSX: OTEX) visit: opentext.com. Connect with us: • OpenText CEO Mark Barrenechea’s blog • X (formerly Twitter) | LinkedIn Additional Security Services: Threat Hunting Service Cybersecurity Tabletop Exercise