ecm and enterprise 2.0
DESCRIPTION
Overview of the role of ECM in Enterprise 2.0, with a further focus on content securityTRANSCRIPT
![Page 1: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/1.jpg)
Defining the Role of ECM in
Enterprise 2.0
Carl FrappaoloVP, AIIM Market Intelligence
![Page 2: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/2.jpg)
WAIT
![Page 3: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/3.jpg)
?What is Enterprise 2.0
![Page 4: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/4.jpg)
?What is ECM
![Page 5: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/5.jpg)
Web/htmlIM
Meta Data Management
Records Management
Shared DrivesE-mail Data/tags
ID Extraction
IRM/ERM
BPM/Workflow
Authentication
Content Analytics
SearchPortal/Web
Social Network Analysis
Content Management
DocumentManagement
Taxonomy Collaboration
Information Architecture
Visualization
Facets
Contextual Filtering
MultiMedia
DAM
![Page 6: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/6.jpg)
Web/htmlIM
Meta Data Management
Records Management
Shared Drives
E-mail Data/tags
ID Extraction
IRM/ERM
BPM/Workflow
Authentication
Content Analytics
SearchPortal/Web
Social Network Analysis
Content Management
DocumentManagement
Taxonomy Collaboration
Information Architecture
Visualization
Facets
Contextual Filtering
MultiMedia
DAM
![Page 7: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/7.jpg)
Enterprise 2.0 Wikis Blogs Mashups Social Tagging RSS Social Bookmarking Social Networking
![Page 8: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/8.jpg)
Web/htmlIM
Meta Data Management
Records Management
Shared Drives
E-mail Data/tags
ID Extraction
IRM/ERM
BPM/Workflow
Authentication
Content Analytics
SearchPortal/Web
Social Network Analysis
Content Management
DocumentManagement
Taxonomy Collaboration
Information Architecture
Visualization
Facets
Contextual Filtering
MultiMedia
DAM
![Page 9: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/9.jpg)
New York Times, Sunday, 9/16/07
![Page 10: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/10.jpg)
IMPORTANCE
![Page 11: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/11.jpg)
Understanding
![Page 12: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/12.jpg)
2006 Collaborative
Technologies Conference Technology Focus Intro to Wikis and
Blogs McAfee Presentation
2007 Enterprise 2.0
Conference Focus on Business
Value Cultural and
Procedural Issues Risk & Responsibility McAfee vs. Davenport
![Page 13: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/13.jpg)
Records Management Content/Document Management Information/Enterprise Rights Management Authentication/Identity Management Data Loss/Leak Prevention CAS Trusted Timestamps
![Page 14: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/14.jpg)
Is Your Content Security Strategy Driven By a Desire to Lock Down Content or to Enable Secure Collaboration?
7%
26%
49%
14%
3%
Source: AIIM Content Security Market IQ, 2007
![Page 15: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/15.jpg)
What Content Types Are You Targeting With Content Security?
Source: AIIM Content Security Market IQ, 2007
![Page 16: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/16.jpg)
Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally?
Source: AIIM Content Security Market IQ, 2007
![Page 17: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/17.jpg)
Within the Last 2 Years Has Content Been Inappropriately Accessed by an Unauthorized Individual Either Deliberately or Accidentally?
Source: AIIM Content Security Market IQ, 2007
![Page 18: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/18.jpg)
How Well Does Your Organization Understand Content Security?
Source: AIIM Content Security Market IQ, 2007
![Page 19: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/19.jpg)
Who Owns The Content Security Initiative in Your Organization?
Source: AIIM Content Security Market IQ, 2007
![Page 20: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/20.jpg)
Do You Have a Specific Group Within Your Organization to Address Content Security?
Source: AIIM Content Security Market IQ, 2007
![Page 21: ECM and Enterprise 2.0](https://reader037.vdocument.in/reader037/viewer/2022102721/5473529cb4af9fcd0a8b52a2/html5/thumbnails/21.jpg)
ECM is the DNA of Enterprise 2.0