ecm and enterprise 2.0
DESCRIPTION
Overview of the role of ECM in Enterprise 2.0, with a further focus on content securityTRANSCRIPT
Defining the Role of ECM in
Enterprise 2.0
Carl FrappaoloVP, AIIM Market Intelligence
WAIT
?What is Enterprise 2.0
?What is ECM
Web/htmlIM
Meta Data Management
Records Management
Shared DrivesE-mail Data/tags
ID Extraction
IRM/ERM
BPM/Workflow
Authentication
Content Analytics
SearchPortal/Web
Social Network Analysis
Content Management
DocumentManagement
Taxonomy Collaboration
Information Architecture
Visualization
Facets
Contextual Filtering
MultiMedia
DAM
Web/htmlIM
Meta Data Management
Records Management
Shared Drives
E-mail Data/tags
ID Extraction
IRM/ERM
BPM/Workflow
Authentication
Content Analytics
SearchPortal/Web
Social Network Analysis
Content Management
DocumentManagement
Taxonomy Collaboration
Information Architecture
Visualization
Facets
Contextual Filtering
MultiMedia
DAM
Enterprise 2.0 Wikis Blogs Mashups Social Tagging RSS Social Bookmarking Social Networking
Web/htmlIM
Meta Data Management
Records Management
Shared Drives
E-mail Data/tags
ID Extraction
IRM/ERM
BPM/Workflow
Authentication
Content Analytics
SearchPortal/Web
Social Network Analysis
Content Management
DocumentManagement
Taxonomy Collaboration
Information Architecture
Visualization
Facets
Contextual Filtering
MultiMedia
DAM
New York Times, Sunday, 9/16/07
IMPORTANCE
Understanding
2006 Collaborative
Technologies Conference Technology Focus Intro to Wikis and
Blogs McAfee Presentation
2007 Enterprise 2.0
Conference Focus on Business
Value Cultural and
Procedural Issues Risk & Responsibility McAfee vs. Davenport
Records Management Content/Document Management Information/Enterprise Rights Management Authentication/Identity Management Data Loss/Leak Prevention CAS Trusted Timestamps
Is Your Content Security Strategy Driven By a Desire to Lock Down Content or to Enable Secure Collaboration?
7%
26%
49%
14%
3%
Source: AIIM Content Security Market IQ, 2007
What Content Types Are You Targeting With Content Security?
Source: AIIM Content Security Market IQ, 2007
Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally?
Source: AIIM Content Security Market IQ, 2007
Within the Last 2 Years Has Content Been Inappropriately Accessed by an Unauthorized Individual Either Deliberately or Accidentally?
Source: AIIM Content Security Market IQ, 2007
How Well Does Your Organization Understand Content Security?
Source: AIIM Content Security Market IQ, 2007
Who Owns The Content Security Initiative in Your Organization?
Source: AIIM Content Security Market IQ, 2007
Do You Have a Specific Group Within Your Organization to Address Content Security?
Source: AIIM Content Security Market IQ, 2007
ECM is the DNA of Enterprise 2.0