OpenText Extended ECM Documentum for Salesforce storing and managing business-critical content into the Salesforce platform. Enterprise-grade content governance and lifecycle management can now be introduced to content within the world’s leading CRM system.
Run in parallel, Documentum and Salesforce leave the end-user constantly switching between the two systems. This is inefficient, wastes time and increases risk. Built to address this key challenge, OpenText™ Extended ECM Documentum for Salesforce integrates OpenText Documentum with Salesforce solutions, such as Sales Cloud, Service Cloud and Financial Service Cloud, so users can easily access all information contained in Documentum directly from the process experience in Salesforce. Integration enables information flows, allowing Documentum content to be surfaced automatically within the Salesforce UI, giving users real-time information to enhance sales cycles, customer service and process efficiency.
Using Extended ECM Documentum for Salesforce, data processes and information are linked together combining structured and unstructured data in a single convenient end-user experience. Users can see all relevant content in the context of a business process within Salesforce. Working from within Documentum users can see hierarchies of content enriched with key business data from Salesforce. This integration ensures that information and content are accurate, while providing a single source of truth and stronger collaboration, better quality of response and shorter response times.
You can read more about about Documentum integration to Salesforce for ECM here.
Teknita has the expert resources to support all your technology initiatives. We are always happy to hear from you. Click here to connect with our experts!
OpenText Documentum D2 is the next generation interface for accessing and interacting with content stored on a Documentum server.
Here are 10 reasons why to Upgrade from Webtop to Documentum D2:
1. Roadmap
When comparing roadmaps for Webtop and D2, users can clearly see that there is much more on the D2 horizon. D2 has a robust roadmap with a substantial engineering effort behind it, particularly on D2 SmartView which OpenText is continually expanding on so that users can do more using SmartView.
2. Configuration vs coding
D2 includes a configuration layer with an agile configuration tool for building content management apps. It uses a familiar, spreadsheet-like UI which runs in web browsers and allows business users to set policies without relying on custom development. It is less challenging for administrators to maintain, than using existing instances of Webtop, especially if it has been modified through years of custom coding to adapt to new use cases.
3. Validate and deploy quickly
With Webtop, implementing any new document control requirement involves a customization process of design, development, testing and validation. D2 reduces or even eliminates formally testing and validating. Deployment of new content management functionality is in the business’s hands and enables it to respond quickly to new requirements. Business analysts can work with users to configure the application, and changes to the configuration are immediately applied to the environment.
4. Collaboration
Webtop allows internal sharing and collaboration but is limited when it comes to ad-hoc external sharing with third parties or partners. D2 includes deep integration with OpenText Core Share, allowing users to securely share encrypted, audited content externally. Sharing content can either be automated based on pre-defined rules or initiated manually through the D2 interface.
5. User experience
D2 offers a modern, personalized user experience. Administrators can adapt applications to unique user and business function needs while adhering to a centralized set of rules that ensure consistency across the organization. On the other hand, Webtop was built to be a “do it all” interface, which can make it overly complex for casual users who only want to find and view content.
6. Mobile
Webtop has no mobile option and doesn’t scale to smaller screen formats. D2 scales dynamically between screen sizes. Even if you adjust your web browser to a smaller size, the tiles re-arrange, and you can still see the information you need. It also comes with a free iOS and Android app, featuring the same look and navigation as SmartView and functionality including remote wipe, Touch ID and offline content.
7. Widgets
Webtop doesn’t allow other apps to retrieve content and surface it in their UI. With D2, widgets allow Documentum content to be surfaced in Microsoft Office, SharePoint and Teams, Extended ECM for Documentum and Appworks, enabling people to work in their preferred applications. Documentum works transparently in the background, providing governance oversight.
8.Custom search screens
Search functionality that requires custom coding in Webtop is solved OOTB with D2. D2 offers facets at the folder level without performing a search. It provides facets for workflows as per the screenshot, it provides facets for tasks and facets can be nested.
9. Apply lifecycles during document creation
The ability to apply lifecycles during document creation is a common customization for many Webtop customers. D2 enables lifecycle management through a simple configuration that also includes lifecycle batch processing.
10. Controlling PDF documents
PDF is a universally accepted, secure format for sharing documents with virtually anyone, anywhere, using any application. Watermarking is a common requirement and custom code is necessary in Webtop. D2 comes standard with many PDF processing capabilities, including watermarking and the ability to add headers and footers. You can also insert content such as cover pages, signature pages, and automatically add PDF pages anywhere in the document.
You can read more about Reasons to Upgrade from Webtop to Documentum D2 here.
Teknita has the expert resources to support all your technology initiatives. We are always happy to hear from you. Click here to connect with our experts!
eRoom is an on-line project collaboration, or collaborative software product from Opentext Corporation. The solution helps create efficiency in daily tasks, also allows users to seamlessly collaborate on projects, programs and processes to eliminate the gaps that put pressure on profitability and time to market.
eRoom Key Features:
Robust collaboration Provides an enterprise repository across collaborative workspaces.
Business process support Extends business processes across the firewall while maintaining the security of the internal repository.
Classification support Supports the classification of collaborative content according to corporate taxonomies.
Web-based interface Requires only an internet connection and browser, especially useful for geographically dispersed workers.
eRoom Essential Benefits:
Improves enterprise knowledge work Leverage a virtual meeting space online to work on projects and collaborate on common initiatives.
Accelerates collaboration and group tasks Give employees and customers a web-based space to meet, manage projects or share calendars, reports and ideas.
Give users control Let members of the project team members run and manage online rooms without IT support.
Optimizes business processes Leverage collaboration features integrated with Documentum to set automatic versioning on documents and store files and their associated online threaded discussions.
You can read more about OpenText Documentum eRoom here.
Teknita has the expert resources to support all your technology initiatives. We are always happy to hear from you. Click here to connect with our experts!
Electronic Data Interchange is a standard electronic format that replaces paper-based documents such as purchase orders or invoices. By automating paper-based transactions, organizations can save time and eliminate costly errors caused by manual processing. In EDI transactions, information moves directly from a computer application in one organization to a computer application in another. Data can be shared rapidly instead of over the hours, days or weeks required when using paper documents or other methods.
There are 5 key business benefits that EDI technology delivers:
– EDI technology saves time and money through automation of a process previously manually executed with paper documents.
– EDI solutions improve efficiency and productivity because more business documents are shared and processed in less time with greater accuracy.
– EDI data transfer reduces errors through rigid standardization, which helps to ensure information and data are correctly formatted before they enter business processes or applications.
– EDI integration improves traceability and reporting because electronic documents can be integrated with a range of IT systems to support data collection, visibility and analysis.
– EDI automation supports positive customer experiences by enabling efficient transaction execution and prompt, reliable product and service delivery.
You can read more about Electronic Data Interchange here.
You need more details about automating your business processes?
Teknita has the expert resources to support you. Contact us now to kick off your planning with a complimentary assessment with our experts.
Considering that we use technology all day long in our personal lives and at work, it makes sense that cybercrime is on everyone’s mind. A prominent data Breach Investigation Report reported a record total of 157,525 incidents in categories that ranged from malware to hacking, social engineering breaches to ransomware. And cybercrime continues to evolve. Some of the most successful attack vectors in recent times — like phishing — target people, not technology. According to the report, phishing was the top threat vector in 2019 and was involved in 32% of confirmed breaches, and 78% of cyber-espionage incidents.
The threat landscape is more complex than ever, and it’s increasingly difficult for security teams to prevent, detect, analyze, and respond to threats. Cybercriminals have shifted their tactics from technological attacks to targeted assaults on employees by exploiting basic human behaviors. As security technology has grown more advanced, hackers look to access the weakest point in the network — most often that turns out to be human error. Security training opportunities, like this badge, are more important than ever. Since employees present the easiest target for hackers, it’s crucial that everyone learns how to protect themselves, and your company. More than ever before, every person has an impact on security regardless of their function or title.
It takes only one employee opening a phishing email to set off a chain of events that may compromise your company’s data. This means that security should be an integrated part of everyone’s job. In this module, we look at some basic behaviors that every employee can adopt to help make the company more secure.
Intruders Exploit Human Behaviors
Let’s talk about how human nature plays into cybercrime. Criminals have learned they can exploit typical human feelings, such as curiosity and the desire to please, to steal credentials and infiltrate your network. Let’s dig into some of the messaging that elicits these emotions.
• Fear: “If you don’t give me the information, I will report you to your manager.”
• Trust: “Your bank account has just been closed. Click here to reactivate.”
• Morality: “Can you hold that office door open for me? My arm’s broken, and this package is heavy.”
• Reward: “My company is considering investing in your products. Can you answer a few questions about your organization first?”
• Conformity: “Bill Stevens from Finance always gives me updates about Q2 earnings, but I can’t get a hold of him. Can you help me with the report?”
• Curiosity: “Wow… Check out this video of a giant snake eating a zookeeper!”
Would you like to know more about cybersecurity?
Teknita has the expert resources to support you. Contact us now to kick off your planning with a complimentary assessment with our experts.