Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

How OpenText minimized data risk during the pandemic

When a company’s global workforce transitioned to remote work almost overnight, it looked to a recent acquisition to help safeguard critical data.

By Muhi Majzoub
privacy freepik

<a href="https://www.freepik.com/photos/background">Background photo created by rawpixel.com - www.freepik.com</a>

April 29, 2021

OpenText acquired Carbonite and Webroot in December 2019, helping expand the company’s cyber resilience portfolio and strengthening its comprehensive information management offering. As it happens, the acquisition could not have come at better time. By the end of March 2020, 98% of OpenText’s global workforce of more than 14,000 had pivoted to remote work due to COVID-19. OpenText, like so many others, had to adapt to the new normal and find a way to protect the data and devices that were now well beyond the company network and firewall.

The challenge in the ‘new normal’

OpenText needed a way to automatically back up all critical data and protect it from everything from ransomware attacks and malicious insiders, to the more mundane device failures and everyday IT issues. Previous backup implementations relied on employees to save their own work. And data saved on devices like laptops was typically the only copy, creating a single-point-of-failure situation.

For long-term data storage, such as after an employee left the company, OpenText relied on USB hard drives to copy the data and keep it stored. However, the dramatic shift to remote made this approach unrealistic.

Practicing what you preach- An internal transformation

To better protect the dispersed endpoints that had proliferated so rapidly, OpenText turned to its newly acquired enterprise-grade cloud backup solution, Carbonite Endpoint. This solution offers the backup and recovery capabilities OpenText needed to secure its vast workforce, and it could be deployed globally as it satisfied strict global and regional data privacy requirements, including GDPR.

For even greater security, the deployment team opted to leverage the power, scalability and security of Microsoft Azure. To ensure a seamless rollout of the backup solution to more than 13,000 devices globally, the team decided to have single URL to administer all machines. This centralized management allowed for complete auditing and reporting, while monitoring data going into the cloud, all remotely.

Due to the sheer volume of endpoints and out of an abundance of caution, OpenText opted to stagger its deployment to about 1,000 endpoints a day. The team also left a couple of days between deployments to ensure any issues that came up could be addressed.

On the backend, OpenText configured Carbonite Endpoint to automate the backup process, making onboarding new employees easy. As a result, the solution runs silently in the background and scans for changes every 15 minutes. After the initial complete backup, the solution continuously sends new data to the vault, ensuring new work will not be lost.

Driving Operational Resiliency

Since deploying Carbonite Endpoint, OpenText’s IT team gained back hundreds of hours previously spent on manual installs and restores. Within the first five months of deployment, 200 data restores were needed and the solution ensured they were completed almost instantly.

Product features like legal hold and the ability manage and recover data remotely ensured both data compliance and business continuity. The ability to manage backups and restores from the console also allows IT to more easily support team members in other countries.

Ultimately, the improved backup system acts as an insurance policy for peoples’ work, providing OpenText employees with the confidence that they will never be in a position where they can’t access a document or file again. OpenText privacy and compliance teams know that OpenText company data is being stored and managed securely. Finally, leadership and the IT team demonstrated the value of accelerating digital transformation to be more successful in the hybrid/remote work environment that is here to stay.

KEYWORDS: business resilience COVID-19 cyber security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Muhi Majzoub is OpenText's Chief Product Officer.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Educational Organizations at Risk of Data Security Incidents during COVID-19 Pandemic

    See More
  • healthcare data security

    Protecting healthcare data during the COVID-19 pandemic

    See More
  • cybersecurity

    How to Minimize the Risk of Insider Threats (Physical and Cyber) During COVID-19

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing