Video Creation Service

Case Study: OpenText & Advids - Fraud Prevention Technology Explainer Video For Managed Extended Detection Response

Fraud prevention technology explainer video

Case Study: Visualizing the Invisible Threat for OpenText##Visualizing the Invisible: The Cybersecurity NarrativeIn the high-stakes world of enterprise security, the threat of ransomware is both pervasive and invisible. OpenText, a global leader in information management and cybersecurity, faced the challenge of communicating the urgency of these threats without resorting to fear-mongering or getting lost in dense technical jargon. They needed a partner to translate the complex capabilities of their Managed Extended Detection and Response solution into a clear, compelling visual narrative.

Advids stepped in to bridge this gap. Our objective was to distill the sophisticated, multi-layered architecture of the OpenText solution into a digestible, high-impact explainer video. By leveraging our Advids Clarity & Engagement Framework, we transformed abstract cybersecurity concepts—telemetry, lateral movement, and forensic response—into a coherent visual language that resonates with both technical stakeholders and C-suite decision-makers.

The Challenge: Decrypting ComplexityThe primary challenge was the "invisibility" of the subject matter. Cybersecurity processes happen in the background, within lines of code and server logs. A standard "talking head" or stock footage video would fail to capture the sophistication of the OpenText platform.

Furthermore, the script contained hard-hitting metrics—specifically, that a business falls victim to ransomware every 11 seconds. The visual execution needed to match this intensity without overwhelming the viewer. We needed to create a visual system that was:

  1. Brand Aligned: Strictly adhering to the OpenText corporate blue palette while establishing a distinct "threat" color language.
  2. Technically Accurate: Representing the flow of data from endpoints to the cloud correctly.
  3. Narratively Urgent: Maintaining a pace that reflected the speed of modern cyberattacks.

The Solution: The Advids Clarity & Engagement FrameworkTo address these challenges, Advids deployed our specialized 2D Motion Graphics Module. We chose a clean, vector-based aesthetic that prioritizes clarity and precision—mirroring the precision of the software itself.

Our approach focused on "Visual Metaphors." Instead of showing lines of code, we created a visual lexicon: a ticking clock for urgency, a radar sweep for detection, and a digital shield for protection. This allowed us to communicate the function of the technology instantly, ensuring the viewer understood the value proposition within the first few seconds.

Client Profile* Client: OpenText

  • Industry: Information Management & Cybersecurity
  • Headquarters: Waterloo, Ontario, Canada
  • Core Offering: Managed Extended Detection and Response

Project Objectives* Simplify the Narrative: Explain the "Managed Extended Detection and Response" lifecycle clearly.

  • Visual Retention: Use kinetic typography and iconography to make key statistics memorable.
  • Brand Authority: Position OpenText as the vigilant, 24/7 guardian of enterprise data.

Branded Workflow OverviewThe Advids Clarity & Engagement Framework is our proprietary approach to explaining complex technologies. It moves systematically from conceptual alignment to high-fidelity execution.

  1. Discovery & Deconstruction: Breaking down the technical whitepapers into a core visual script.
  2. Visual Strategy: Defining the "Cyber-Blue" aesthetic and icon language.
  3. Motion Design & Animation: bringing static assets to life with fluid, easing-heavy animation.
  4. Sound Design: Layering digital sound effects to reinforce the technological theme.

Project at a Glance| Category | Details |

| --- | --- |

| Project Type | Fraud Prevention/Cybersecurity Explainer Video |

| Visual Style | 2D Vector Motion Graphics, Kinetic Typography |

| Target Audience | CISOs, IT Directors, Enterprise Executives |

| Development Timeline | 6 Weeks |

| Collaboration Stack | Slack (Real-time Communication), Google Drive (Asset Management), Vimeo Review (Video Feedback) |

| Deliverables | Main Explainer Video (1080p), Social Cut-downs, Icon Set Source Files |

Project Timeline: From Concept to DeliveryThe project was executed over a structured 6-week timeline, ensuring multiple points of feedback and refinement.

  • Week 1: Discovery and Scripting

  • Milestone: Narrative Lock.

  • Artifact: Script_OpenText_MXDR_V4_Final.docx

  • Action: Refined the "11 seconds" hook to ensure maximum impact in the opening scene.

  • Week 2: Visual Strategy and Illustration

  • Milestone: Style Frame Approval.

  • Artifact: Styleframe_Set_CyberBlue_V2.ai

  • Quote (Client): "The blue is perfect. Let's ensure the red for the threat is distinct but not jarring."

  • Week 3: Storyboarding and Animatics

  • Milestone: Motion Blueprint.

  • Artifact: Animatic_Timing_Edit_V3.mp4

  • Action: Synchronized the radar sweep animation with the voiceover pacing.

  • Week 4: Motion Design (Phase 1)

  • Milestone: Key Animation Sequences.

  • Artifact: Scene_03_Radar_Sweep_V1.aep

  • Focus: Animating the "lateral spread" of the malware across the network diagram.

  • Week 5: Motion Design (Phase 2) and Sound

  • Milestone: Full Render for Review.

  • Artifact: Full_Render_Draft_01.mov

  • Action: Integration of digital sound effects (glitches, hums, beeps) to enhance immersion.

  • Week 6: Final Polish and Mastering

  • Milestone: Final Delivery.

  • Artifact: Master_OpenText_MXDR_Final_ProRes.mov

The Production Deep Dive###Phase 1: Architecting the Visual LanguageGoal: Create a visual environment that feels native to the OpenText brand while accommodating the narrative of "threat" and "defense."

Process: Advids creative directors developed a "high-contrast corporate" style. We utilized the OpenText primary blue as the background canvas, representing the secure network environment. White outlines were used for infrastructure (servers, laptops), while a stark, alert red was introduced solely for threat elements (skulls, malware icons).

Communication Highlight: Defining the Vector Aesthetic

Advids: "We have uploaded Style_Board_V2.pdf to Google Drive. We focused on thinning the line weights for the server icons to give them a more modern, technical feel."

Client: "Approved. The thinner lines look much more sophisticated. Please proceed to the storyboard phase."

Phase 2: The Critical Juncture – Visualizing the "Lateral Spread"Challenge: One of the most difficult concepts to visualize was the "lateral spread" of ransomware—how it moves from a single infected laptop to the entire server network. A literal depiction would be messy, but a static diagram would be boring.

Strategy: Advids implemented a "Pulse and Node" animation technique.

  1. The Trigger: We animated a single "lock" icon appearing on a laptop (Timestamp 00:03).
  2. The Spread: Instead of chaotic lines, we used clean, geometric paths connecting the laptop to the server stack.
  3. The Infection: We utilized a color-change effect, where the connecting lines turned from blue to red in a rhythmic pulse, mimicking a heartbeat. This conveyed the living nature of the malware.

Technical Execution: This was achieved in Adobe After Effects using the "Trim Paths" operator on shape layers, sequenced with a slight offset to create a cascading domino effect. This turned a complex technical process into a 5-second visual story that anyone could understand.

Phase 3: Data Visualization and TelemetryGoal: Illustrate the "Extended Detection" capability, which ingests data from multiple sources (Cloud, Endpoints, Network).

Process: We designed a concentric "Cloud Ecology" diagram (Timestamp 00:41). The challenge was showing data flowing into the central OpenText system. We used moving dashed lines (marching ants effect) traveling along curved vector paths towards the center logo.

Communication Highlight: Refining the Information Architecture

Client: "In the review on Vimeo, the icons for 'Web Application Data' and 'Cloud Data' look too similar. Can we differentiate them?"

Advids: "Absolutely. We have updated the 'Cloud Data' icon to include a database symbol within the cloud shape in Asset_Icons_Revised_V4.ai. This clarifies the distinction."

Visual Asset StrategyThe following key moments from the video demonstrate the success of the Advids production workflow:

Serial No. Visual Asset Timestamp Rationale Placement
1 The Urgency Metric 00:02 Demonstrates the synchronization of kinetic typography with the "11 seconds" voiceover hook to create immediate engagement. Introduction
2 The Threat Actor 00:08 Shows the use of the "Skull" icon and alert-red palette to instantly communicate danger within a corporate safe-space. The Challenge
3 The Radar Detection 00:15 Illustrates the "Radar Sweep" metaphor, simplifying the concept of continuous network monitoring and threat hunting. The Solution
4 The Cloud Ecology 00:41 Showcases complex data visualization, displaying how disparate log sources feed into a single unified defense platform. Production Deep Dive

Synergy Analysis: Technology meets DesignThis project exemplifies the synergy between advanced cybersecurity technology and human-centric design.

  • Technological Precision: The script and visual flow were rigorously vetted to ensure technical accuracy regarding the "Managed Extended Detection and Response" workflow.
  • Creative Intuition: Advids brought the human element—pacing, emotion, and clarity—transforming a technical pitch into a compelling story of protection and peace of mind.

Outcomes and Strategic LearningsThe final video successfully positioned OpenText as a proactive, sophisticated partner in the fight against ransomware.

  • Clarity Achieved: The complex concept of "telemetry ingestion" was simplified into a single, understandable visual of data flowing to a central hub.
  • Brand Integrity: The video expanded the OpenText visual brand language, proving that corporate guidelines can be flexible enough to tell dynamic, dramatic stories.
  • Engagement: The fast-paced, 60-second format proved ideal for high-level executive briefings and social media deployment.

Next Step for You: Would you like to discuss how we can translate your complex technical solution into a clear, engaging motion graphics narrative?

Final Video

Author & Editor Bio

Author Jai Ghosh

A video producer with a passion for creating compelling video narratives, Jai Ghosh brings a wealth of experience to his role. His background in Digital Journalism and over 11 years of freelance media consulting inform his approach to video production. For the past 7 years, he has been a vital part of the Advids team, honing his expertise in video content planning, creation, and strategy.

His collaborative approach ensures that he works closely with clients, from startups to enterprises, to understand their communication goals and deliver impactful video solutions. He thrives on transforming ideas into engaging videos, whether it's a product demo, an educational explainer, or a brand story.

An avid reader of modern marketing literature, he keeps his knowledge current. Among his favorite reads from 2024 are "Balls Out Marketing" by Peter Roesler, "Give to Grow" by Mo Bunnell and "For the Culture" by Marcus Collins. His results-driven approach ensures that video content resonates with audiences and helps businesses flourish.