Cybersecurity Resources
- BlogMSPs: Building your service stack for 6x revenue multiplierPart 3 of our 3-part blog series: Service Architecture and the Path to Expert StatusPartners
- Blog10 questions that drive higher MSP revenue multipliersPart 2 of our 3-part blog series: Understanding the Revenue Multiplier GapPartners
- Data SheetOpenText Server Backup – Public CloudOpenText™ Server Backup – Public Cloud unifies server backup and security tools into a single, multi-tenant console that simplifies management, speeds recovery, and supports cost-effective deployment.Data ProtectionPartnersSecure Cloud
- BlogAnnual report: Nastiest Malware 2025Cybercriminals aren’t slowing down, and neither is their malware. In 2025, the nastiest threats are smarter, faster, and more destructive than ever, putting SMBs and MSPs directly in the crosshairs.Cyberthreats
- Infographic2025's Nastiest MalwareThis year, ransomware evolved into AI-powered, identity-focused warfare. Our annual Nastiest Malware report highlights six notorious threat groups that have dominated 2025 through unprecedented sophistication and devastating business disruption.Data ProtectionData Security
- InfographicDemand Surge: How AI is Reshaping MSP PreparednessExplore how AI is transforming the managed services landscape — from rising client expectations to the new skills and solutions MSPs need to stay ahead.Data Protection
- BlogHack the hacker: How LockBit's ransomware empire crumbledIn 2024, law enforcement took down one of the cyber world's most ruthlessly efficient ransomware groups: Lockbit.CyberthreatsData ProtectionData Security
- BlogScattered Spider: How law enforcement turned the tablesRemembering the notorious Scattered Spider cybercrime group, whose social engineering scams caused millions of dollars in damages to some of the world's biggest brands.Cyberthreats
- VideoGet started with OpenText Core Endpoint BackupOpenText Core Endpoint Backup is a fully automated, enterprise-grade solution for endpoint backup and recovery that helps secure data on employee laptops and desktopsData ProtectionData recoveryData SecuritySecure Cloud




