ecm and enterprise 2.0

Post on 22-Nov-2014

5.666 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Overview of the role of ECM in Enterprise 2.0, with a further focus on content security

TRANSCRIPT

Defining the Role of ECM in

Enterprise 2.0

Carl FrappaoloVP, AIIM Market Intelligence

WAIT

?What is Enterprise 2.0

?What is ECM

Web/htmlIM

Meta Data Management

Records Management

Shared DrivesE-mail Data/tags

ID Extraction

IRM/ERM

BPM/Workflow

Authentication

Content Analytics

SearchPortal/Web

Social Network Analysis

Content Management

DocumentManagement

Taxonomy Collaboration

Information Architecture

Visualization

Facets

Contextual Filtering

MultiMedia

DAM

Web/htmlIM

Meta Data Management

Records Management

Shared Drives

E-mail Data/tags

ID Extraction

IRM/ERM

BPM/Workflow

Authentication

Content Analytics

SearchPortal/Web

Social Network Analysis

Content Management

DocumentManagement

Taxonomy Collaboration

Information Architecture

Visualization

Facets

Contextual Filtering

MultiMedia

DAM

Enterprise 2.0 Wikis Blogs Mashups Social Tagging RSS Social Bookmarking Social Networking

Web/htmlIM

Meta Data Management

Records Management

Shared Drives

E-mail Data/tags

ID Extraction

IRM/ERM

BPM/Workflow

Authentication

Content Analytics

SearchPortal/Web

Social Network Analysis

Content Management

DocumentManagement

Taxonomy Collaboration

Information Architecture

Visualization

Facets

Contextual Filtering

MultiMedia

DAM

New York Times, Sunday, 9/16/07

IMPORTANCE

Understanding

2006 Collaborative

Technologies Conference Technology Focus Intro to Wikis and

Blogs McAfee Presentation

2007 Enterprise 2.0

Conference Focus on Business

Value Cultural and

Procedural Issues Risk & Responsibility McAfee vs. Davenport

Records Management Content/Document Management Information/Enterprise Rights Management Authentication/Identity Management Data Loss/Leak Prevention CAS Trusted Timestamps

Is Your Content Security Strategy Driven By a Desire to Lock Down Content or to Enable Secure Collaboration?

7%

26%

49%

14%

3%

Source: AIIM Content Security Market IQ, 2007

What Content Types Are You Targeting With Content Security?

Source: AIIM Content Security Market IQ, 2007

Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally?

Source: AIIM Content Security Market IQ, 2007

Within the Last 2 Years Has Content Been Inappropriately Accessed by an Unauthorized Individual Either Deliberately or Accidentally?

Source: AIIM Content Security Market IQ, 2007

How Well Does Your Organization Understand Content Security?

Source: AIIM Content Security Market IQ, 2007

Who Owns The Content Security Initiative in Your Organization?

Source: AIIM Content Security Market IQ, 2007

Do You Have a Specific Group Within Your Organization to Address Content Security?

Source: AIIM Content Security Market IQ, 2007

ECM is the DNA of Enterprise 2.0

top related