Intelligent, connected,

secure, responsible

Cybersecurity and data protection solutions from one vendor

In today’s digital age, surges in ransomware, the evolution of malware, natural disasters and new regulations are the catalysts for organisations to rethink the efficacy of their security posture. With increasing skill shortages, many businesses are relying on their IT providers to keep their business operational by securing critical assets, as well as have the best recovery tools to restore their data and systems.

Our solutions empower our partners and their clients to achieve cyber resilience via endpoint + cloud backup, endpoint + DNS protection, security awareness training right through to data restore, migration and replication.

OpenText Cybersecurity’s 100% channel model enables MSPs, resellers, system integrators and cloud service providers to grow and be competitive in the markets they serve. By offering predictable recurring revenue, tools, training, certifications and resources, our partners can build trust with their customers, and most importantly, be successful overall.


Defence in Depth, for Cyber Resilience

OpenText Cybersecurity provide a full range of cyber resilience solutions to keep your customers secure and protected.

Take the migraine out of migration

Carbonite™ Migrate makes migrating seamless and repeatable – across any infrastructure.

Carbonite™ Migrate by OpenText™ is a proven cross-platform solution that has been in the market for decades as Double-Take software. It makes your clients’ lives easier with:

Options for full server or data-only migrations

Hardware- and platform-agnostic experiences

Real-time, byte-level replication for minimum downtime over any distance

Simple one-click or automatic cutovers

Virtual machine auto provisioning for Hyper-V and vSphere

Carbonite™ Migrate

Carbonite™ Migrate allows users to easily migrate physical, virtual and cloud workloads of any size and complexity to and from any environment with minimal risk and near-zero downtime. Options for finely tuned automation help orchestrate every stage of the process.

Minimize downtime with easy, reliable migrations to any cloud, hypervisor or physical machine

Automate and streamline the migration process to eliminate common risks

Continuously mirror changes to ensure a successful cutover and near-zero downtime

Enable IT to switch between cloud platforms for increased agility and investment flexibility

Carbonite™ Cloud-to-Cloud Backup

Carbonite™ Cloud-to-Cloud Backup offers comprehensive backup and recovery of SaaS applications and boasts central management, granular restore, rapid recovery and flexible retention options. Our purpose-built backup solution ensures IT administrators can recover as much or as little SaaS application data as necessary.

Automate backups of Microsoft 365, Google Workspace, Salesforce, Box and Dropbox

Protect against ransomware, malware, data loss and data breach

Flexibly search and recover items, mailboxes or sites at any granular level

Easily recover data with point-in-time recovery

Browse daily snapshots and run searches

Feel more secure with full redundancy

Store more with unlimited storage and retention

Webroot™ Endpoint Protection

Webroot™ Endpoint Security with advanced machine learning and cloud-based protection, provides multi-vector protection against malicious files, scripts, exploits and URLs. Its lightweight footprint, ultra-fast scans and collective threat intelligence provide superior efficacy against zero-day threats.

Superior speed and efficiency

Highly automated, low-cost operation

Easy to deploy and installs in seconds

Fully remote endpoint management and control

Precision monitoring and roll-back capabilities for auto-restoring and infected files

Webroot™ DNS Protection

Webroot™ DNS Protection creates a highly secure, private, resilient and manageable connection to the internet. It automatically blocks requests to undesirable, dangerous or malicious internet domains, even encrypted DNS over HTTPS (DoH) requests. Now with Leak Prevention technology in Webroot ™ DNS Protection, you can seal the escape routes that DNS requests use to bypass DNS filtering services and shields against potential leaks and their associated risks.

Stop inbound malware and other DNS based attacks

Enforceable internet usage policies

Provide DoH visibility, filtering and security controls

Deployment options: Standalone DNS agent or with Webroot Endpoint Protection

Webroot™ Security Awareness Training

Webroot™ Security Awareness Training is a proven educational approach for reducing risky employee behaviors that can lead to security compromises. By efficiently delivering relevant information, security awareness training transforms employees into a business’s best line of defense. Employees learn about subjects like information security, social engineering, malware and industry-specific compliance topics. Knowledge verification increases employee resilience to cyberattacks at home, on the move and at the office.

Educate employees and reduce the risk of cybersecurity incidents

Simple administration and campaign management

Multi-tenant management solution purpose-built for MSPs and SMBs

Automated training management plus compliance reporting

Carbonite™ Server Backup

Carbonite™ Server Backup is a secure, all-in-one server backup and recovery solution for physical, virtual and legacy systems. Recognised for its flexibility, Carbonite Server Backup offers various deployment options and the ability to restore current or historical data from the cloud or a local appliance. It also reduces costs by providing a fully integrated cloud component from a single vendor.

Implement server protection in the cloud (SaaS), onsite or as a hybrid solution

Monitor and manage all server environments from a single pane of glass

Recover a VM from a backup on a few minutes with no size limitations

Carbonite™ Availability

Carbonite™ Availability enables IT organizations to maintain the highest availability of their Windows® and Linux® servers. Preventing downtime and data loss, Carbonite™ Availability employs a continuous replication mechanism to maintain a secondary copy of the operating environment, without taxing the primary system or network bandwidth.

Continuously replicate critical systems and automate failover to either live data or to a saved point, with near-zero downtime

Choose rapid failover and then perform failback when ready

Maintain duplicated physical, virtual or cloud systems at a secondary location

Reduce risks associated with both your planned and unplanned outages

Achieve compliance and meet SLAs through protection of mission-critical data in your preferred environment

Carbonite™ Endpoint

Remote workforces face many IT challenges. Protecting critical business data on endpoints should not be one of them. With Carbonite™ Endpoint, organizations have complete confidence they can back up data on their laptops and desktops and recover it easily after any data loss event.

Easy deployment

Global deduplication

Advanced administrative control

Secure protection

Policy-controlled backups

Incremental restore

Discover the OpenText Cybersecurity difference for yourself!

We’d like to hear from you. Send us an email or better yet, give us a call!

Call Us Email

  • This field is for validation purposes and should be left unchanged.