ECM and Enterprise 2.0

21
Defining the Role of ECM in Enterprise 2.0

description

Overview of the role of ECM in Enterprise 2.0, with a further focus on content security

Transcript of ECM and Enterprise 2.0

Page 1: ECM and Enterprise 2.0

Defining the Role of ECM in

Enterprise 2.0

Carl FrappaoloVP, AIIM Market Intelligence

Page 2: ECM and Enterprise 2.0

WAIT

Page 3: ECM and Enterprise 2.0

?What is Enterprise 2.0

Page 4: ECM and Enterprise 2.0

?What is ECM

Page 5: ECM and Enterprise 2.0

Web/htmlIM

Meta Data Management

Records Management

Shared DrivesE-mail Data/tags

ID Extraction

IRM/ERM

BPM/Workflow

Authentication

Content Analytics

SearchPortal/Web

Social Network Analysis

Content Management

DocumentManagement

Taxonomy Collaboration

Information Architecture

Visualization

Facets

Contextual Filtering

MultiMedia

DAM

Page 6: ECM and Enterprise 2.0

Web/htmlIM

Meta Data Management

Records Management

Shared Drives

E-mail Data/tags

ID Extraction

IRM/ERM

BPM/Workflow

Authentication

Content Analytics

SearchPortal/Web

Social Network Analysis

Content Management

DocumentManagement

Taxonomy Collaboration

Information Architecture

Visualization

Facets

Contextual Filtering

MultiMedia

DAM

Page 7: ECM and Enterprise 2.0

Enterprise 2.0 Wikis Blogs Mashups Social Tagging RSS Social Bookmarking Social Networking

Page 8: ECM and Enterprise 2.0

Web/htmlIM

Meta Data Management

Records Management

Shared Drives

E-mail Data/tags

ID Extraction

IRM/ERM

BPM/Workflow

Authentication

Content Analytics

SearchPortal/Web

Social Network Analysis

Content Management

DocumentManagement

Taxonomy Collaboration

Information Architecture

Visualization

Facets

Contextual Filtering

MultiMedia

DAM

Page 9: ECM and Enterprise 2.0

New York Times, Sunday, 9/16/07

Page 10: ECM and Enterprise 2.0

IMPORTANCE

Page 11: ECM and Enterprise 2.0

Understanding

Page 12: ECM and Enterprise 2.0

2006 Collaborative

Technologies Conference Technology Focus Intro to Wikis and

Blogs McAfee Presentation

2007 Enterprise 2.0

Conference Focus on Business

Value Cultural and

Procedural Issues Risk & Responsibility McAfee vs. Davenport

Page 13: ECM and Enterprise 2.0

Records Management Content/Document Management Information/Enterprise Rights Management Authentication/Identity Management Data Loss/Leak Prevention CAS Trusted Timestamps

Page 14: ECM and Enterprise 2.0

Is Your Content Security Strategy Driven By a Desire to Lock Down Content or to Enable Secure Collaboration?

7%

26%

49%

14%

3%

Source: AIIM Content Security Market IQ, 2007

Page 15: ECM and Enterprise 2.0

What Content Types Are You Targeting With Content Security?

Source: AIIM Content Security Market IQ, 2007

Page 16: ECM and Enterprise 2.0

Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally?

Source: AIIM Content Security Market IQ, 2007

Page 17: ECM and Enterprise 2.0

Within the Last 2 Years Has Content Been Inappropriately Accessed by an Unauthorized Individual Either Deliberately or Accidentally?

Source: AIIM Content Security Market IQ, 2007

Page 18: ECM and Enterprise 2.0

How Well Does Your Organization Understand Content Security?

Source: AIIM Content Security Market IQ, 2007

Page 19: ECM and Enterprise 2.0

Who Owns The Content Security Initiative in Your Organization?

Source: AIIM Content Security Market IQ, 2007

Page 20: ECM and Enterprise 2.0

Do You Have a Specific Group Within Your Organization to Address Content Security?

Source: AIIM Content Security Market IQ, 2007

Page 21: ECM and Enterprise 2.0

ECM is the DNA of Enterprise 2.0