OpenText Cybersecurity catalog
OpenText Cybersecurity, sold and delivered by Merito.
OpenText's full Cybersecurity catalog covering Application Security Testing, Data Security, Security Operations, Identity and Access Management, and Digital Forensics and Incident Response. Merito sells the licenses and delivers the security program rollout.
Why Merito for OpenText Cybersecurity
Five security pillars. One partner who quotes the contract and runs the program.
OpenText Cybersecurity is the consolidated NetIQ, Voltage, ArcSight, Fortify, and EnCase portfolio under one vendor. The Application Security Testing pillar covers SAST, DAST, SCA, and the Application Security Aviator AI surface. Data Security covers data discovery, classification, and structured-data privacy. Security Operations covers SIEM, NDR, threat intelligence, and behavioral analytics. Identity and Access Management covers Access Manager, Identity Manager, IAG, PAM, and Advanced Authentication. Digital Forensics and Incident Response covers EnCase Endpoint Forensics and the broader investigation toolset.
Application Security Aviator is the cross-cutting AI surface for the Cybersecurity pillar. It plugs into every Application Security product to surface developer-aware triage, remediation guidance, and risk-aware reporting. The Aviator license is sold alongside the security product it augments, identical to how DevOps Aviator and Content Aviator work in their pillars.
Merito sells every product in the Cybersecurity catalog and delivers AppSec program rollouts, IAM design and implementation, SecOps tool integration, data-security policy implementation, digital-forensics deployment, and ongoing run support. MAPS Assessment applies on Cybersecurity programs as the security-program scoping engagement.
The OpenText Cybersecurity toolchain
The OpenText Cybersecurity catalog, grouped by sub-pillar
Application Security Testing
Static, dynamic, software composition, and open-source governance plus the Application Security Aviator AI surface. Pick by code-language coverage, deployment shape, and AI augmentation needs.
Application Security Testing
Application Security Aviator
Cross-cutting generative AI for the Cybersecurity catalog and developer-aware triage, remediation guidance, and risk-aware reporting across AppSec products.
See product pageApplication Security Testing
Core Application Security
OpenText's SaaS application security testing platform unifying SAST, DAST, and SCA scan execution and findings management.
See product pageApplication Security Testing
Static Application Security Testing
Fortify-lineage SAST engine for source and binary code analysis across the languages and frameworks enterprise codebases actually run.
See product pageApplication Security Testing
Dynamic Application Security Testing
Fortify-lineage DAST scanner for running-application security testing across web, API, and mobile surfaces.
See product pageApplication Security Testing
Core Software Composition Analysis
SaaS SCA for open-source dependency risk, license compliance, and supply-chain governance across application portfolios.
See product pageApplication Security Testing
Core Open Source Select
Curated open-source component catalog and pre-vetted dependency selection to reduce supply-chain risk at sourcing time.
See product pageData Security
Data discovery and risk insight, privacy and protection foundation, structured-data security across enterprise environments.
Data Security
Core Data Discovery & Risk Insights
Voltage-lineage data discovery and classification across structured and unstructured stores with risk scoring.
See product pageData Security
Data Privacy & Protection Foundation
Tokenization, format-preserving encryption, and key management for regulated data across cloud and on-prem environments.
See product pageData Security
Structured Data Manager
Structured-data archival, masking, and lifecycle management for databases and ERP landscapes.
See product pageSecurity Operations
SIEM, NDR, behavioral analytics, adversary intelligence, log analytics, and threat intelligence for SecOps and the SOC.
Security Operations
Core Threat Detection & Response
ArcSight-lineage SaaS threat detection and response platform for the SOC.
See product pageSecurity Operations
Network Detection & Response
NDR for east-west and north-south network telemetry, packet capture, and behavioral detection.
See product pageSecurity Operations
Enterprise Security Manager
ArcSight ESM-lineage on-prem SIEM for high-throughput log correlation and compliance reporting.
See product pageSecurity Operations
Core Behavioral Signals
User and entity behavioral analytics for insider threat, account compromise, and anomaly detection.
See product pageSecurity Operations
Core Adversary Signals
Adversary-tracking intelligence and TTP correlation surfaced into the SOC workflow.
See product pageSecurity Operations
Security Log Analytics
Long-retention log analytics platform for SecOps investigation, hunt, and compliance.
See product pageSecurity Operations
Threat Intelligence
Curated threat intelligence feeds and IOC enrichment for SecOps and incident response.
See product pageIdentity and Access Management
Access Manager, Identity Governance, PAM, Identity Manager, Advanced Authentication, DAG, and Core Identity Foundation cover the full IAM stack.
Identity and Access Management
Access Manager
NetIQ-lineage Access Manager for SSO, federation, web access management, and modern authentication.
See product pageIdentity and Access Management
Identity Governance
Identity governance and access reviews for SOX, SOD enforcement, and audit-ready entitlement reporting.
See product pageIdentity and Access Management
Privileged Access Manager
PAM platform for vaulting, session recording, and just-in-time elevation of privileged accounts.
See product pageIdentity and Access Management
Identity Manager
NetIQ-lineage identity lifecycle, provisioning, and synchronization across enterprise identity stores.
See product pageIdentity and Access Management
Advanced Authentication
Risk-based MFA and adaptive authentication for workforce, customer, and privileged users.
See product pageIdentity and Access Management
Data Access Governance
Unstructured data permission management, file-share entitlement reviews, and access remediation.
See product pageIdentity and Access Management
Core Identity Foundation
SaaS identity foundation bundling core IAM capabilities for cloud-first identity programs.
See product pageDigital Forensics and Incident Response
EnCase-lineage forensics covering endpoint, network, mobile, and field investigations plus Information Assurance and Forensic Equipment.
Digital Forensics and Incident Response
Endpoint Forensics & Response
EnCase-lineage endpoint forensics with full disk imaging, triage, and incident-response evidence collection.
See product pageDigital Forensics and Incident Response
Forensic
EnCase Forensic-lineage lab forensics platform for criminal, civil, and corporate investigations.
See product pageDigital Forensics and Incident Response
Endpoint Investigator
Remote endpoint investigation toolset for IT and security teams running corporate-scope investigations.
See product pageDigital Forensics and Incident Response
Information Assurance
Information assurance and audit toolset for evidentiary chain-of-custody and policy verification.
See product pageDigital Forensics and Incident Response
Mobile Investigator
Mobile device forensics for iOS, Android, and field-use investigations.
See product pageDigital Forensics and Incident Response
Forensic Equipment
Hardware acquisition and write-blocking equipment for lab and field forensic operations.
See product pageMerito services
Merito services across OpenText Cybersecurity
Implementation
Application Security, IAM, SecOps, Data Security, and DFIR rollouts for new and consolidating security programs.
02MAPS Assessment
Security-program assessment for OpenText Cybersecurity customers consolidating AppSec, IAM, SecOps, and data-security tooling.
03Upgrade and Migration
Fortify on-prem to Core Application Security transitions, NetIQ to Core Identity Foundation moves, ArcSight ESM upgrades, and competing-vendor migrations.
04DevOps Consulting
Application Security tooling integrated into CI/CD pipelines with developer-friendly findings management.
05CRAFT Enablement
AppSec test enablement using Application Security Aviator and developer-centric scanning patterns.
06Premium Support
Named engineer, priority SLAs, and release-time coverage on every OpenText Cybersecurity product Merito implements.
07Managed Services
Long-term run support for AppSec scanning pipelines, IAM operations, SecOps tooling, and forensic environments.
08Training and Enablement
Role-based training for AppSec engineers, IAM administrators, SOC analysts, and forensic investigators.
09Staff Augmentation
Merito-placed OpenText Cybersecurity architects, engineers, and analysts embedded on long-running programs.
OpenText Cybersecurity licensing
Buy OpenText Cybersecurity from the partner that also delivers the rollout, the upgrade, and the run.
Full Cybersecurity catalog under one delivery practice. Merito sells the licenses and delivers implementations, upgrades, migrations, and production support.
Related solutions
Where OpenText Cybersecurity connects to the rest of the Merito program
Application Security
Merito's broader AppSec program incorporating OpenText Application Security Testing alongside Checkmarx, Snyk, Sonatype, Black Duck, and Semgrep.
Read moreEnterprise Modernization
Legacy Fortify and NetIQ footprints modernized onto Core Application Security and Core Identity Foundation.
Read moreDevOps Toolchain
AppSec embedded in the SDLC with security gates in CI/CD and developer-aware triage workflows.
Read moreFrequently Asked Questions
OpenText Cybersecurity FAQs
Consultation request
Talk to Merito about OpenText Cybersecurity
Share the security program you are running. A Merito OpenText Cybersecurity specialist follows up within one business day with a recommendation.
Full Cybersecurity catalog
Licenses and delivery under one statement of work
Merito sells every OpenText Cybersecurity product and delivers implementations, upgrades, migrations, and ongoing support.
MAPS-driven scoping
Security-program scoping by Merito
MAPS Assessment sizes AppSec, IAM, SecOps, data-security, and DFIR programs before implementation begins.
Next step
Pick the OpenText Cybersecurity product that fits your gap. Merito delivers the work.
A Merito Cybersecurity conversation starts with the program decision and AppSec, IAM, SecOps, data security, or DFIR. We recommend the product that actually fits.