SlideShare una empresa de Scribd logo
1 de 21
Defining the Role of ECM in Enterprise 2.0 Carl Frappaolo VP, AIIM Market Intelligence
WAIT
? What  is Enterprise 2.0
? What  is ECM
Web/html IM Meta Data Management Records  Management Shared  Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
Web/html IM Meta Data Management Records  Management Shared  Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web/html IM Meta Data Management Records  Management Shared  Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
[object Object],[object Object]
IMPORTANCE
Understanding
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Is Your Content Security Strategy Driven By a Desire to Lock Down Content or to Enable Secure Collaboration? 7% 26% 49% 14% 3% Source:  AIIM Content Security Market IQ, 2007
What Content Types Are You Targeting With Content Security? Source:  AIIM Content Security Market IQ, 2007
Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally? Source:  AIIM Content Security Market IQ, 2007
Within the Last 2 Years Has Content Been Inappropriately Accessed by an Unauthorized Individual Either Deliberately or Accidentally? Source:  AIIM Content Security Market IQ, 2007
How Well Does Your Organization Understand Content Security? Source:  AIIM Content Security Market IQ, 2007
Who Owns The Content Security Initiative in Your Organization? Source:  AIIM Content Security Market IQ, 2007
Do You Have a Specific Group Within Your Organization to Address Content Security?  Source:  AIIM Content Security Market IQ, 2007
[object Object]

Más contenido relacionado

La actualidad más candente

Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceUnified Communications Online
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreSeclore
 
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and RiskAIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and RiskCarl Frappaolo
 
Seclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | SecloreSeclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | SecloreSeclore
 
SAML Security Contacts
SAML Security ContactsSAML Security Contacts
SAML Security Contactsjbasney
 
Seclore Decrypter For Email
Seclore Decrypter For EmailSeclore Decrypter For Email
Seclore Decrypter For EmailSeclore
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data ProtectionSeclore
 
Securing IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSecuring IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSeclore
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Seclore
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRMSeclore
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesSteven Meister
 
Data Classification Protection | Seclore
Data Classification Protection | SecloreData Classification Protection | Seclore
Data Classification Protection | SecloreSeclore
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance SolutionsSeclore
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | SecloreSeclore
 
IT Trends - Cyber Security
IT Trends - Cyber SecurityIT Trends - Cyber Security
IT Trends - Cyber SecurityDatix Consulting
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore Seclore
 
Cyber Security Tips for Small Firms
Cyber Security Tips for Small FirmsCyber Security Tips for Small Firms
Cyber Security Tips for Small FirmsScott Griffith
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashSeclore
 
How to protect virtualized data from theft
How to protect virtualized data from theftHow to protect virtualized data from theft
How to protect virtualized data from theftDataGravity
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | SecloreSeclore
 

La actualidad más candente (20)

Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and compliance
 
GDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | SecloreGDPR Compliance & Data-Centric Security | Seclore
GDPR Compliance & Data-Centric Security | Seclore
 
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and RiskAIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
 
Seclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | SecloreSeclore For Spirion Data Classification | Seclore
Seclore For Spirion Data Classification | Seclore
 
SAML Security Contacts
SAML Security ContactsSAML Security Contacts
SAML Security Contacts
 
Seclore Decrypter For Email
Seclore Decrypter For EmailSeclore Decrypter For Email
Seclore Decrypter For Email
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Securing IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSecuring IBM ECM with Rights Management
Securing IBM ECM with Rights Management
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
 
Securing MS SharePoint with IRM
Securing MS SharePoint with IRMSecuring MS SharePoint with IRM
Securing MS SharePoint with IRM
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
 
Data Classification Protection | Seclore
Data Classification Protection | SecloreData Classification Protection | Seclore
Data Classification Protection | Seclore
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
 
IT Trends - Cyber Security
IT Trends - Cyber SecurityIT Trends - Cyber Security
IT Trends - Cyber Security
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore
 
Cyber Security Tips for Small Firms
Cyber Security Tips for Small FirmsCyber Security Tips for Small Firms
Cyber Security Tips for Small Firms
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and Stash
 
How to protect virtualized data from theft
How to protect virtualized data from theftHow to protect virtualized data from theft
How to protect virtualized data from theft
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
 

Similar a ECM and Enterprise 2.0

KMWorld Martin Briefing
KMWorld Martin BriefingKMWorld Martin Briefing
KMWorld Martin Briefingmartingarland
 
Filenet test
Filenet testFilenet test
Filenet testkflana26
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
ECM and Enterprise 2.0
ECM and Enterprise 2.0ECM and Enterprise 2.0
ECM and Enterprise 2.0Carl Frappaolo
 
Content Management Strategies
Content Management StrategiesContent Management Strategies
Content Management StrategiesSteve Kessler
 
20110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 2020110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 20Jesse Wilkins
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0Jesse Wilkins
 
20110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.020110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0Jesse Wilkins
 
A Pragmatic Strategy for Oracle Enterprise Content Management
A Pragmatic Strategy for Oracle Enterprise Content ManagementA Pragmatic Strategy for Oracle Enterprise Content Management
A Pragmatic Strategy for Oracle Enterprise Content ManagementBrian Huff
 
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docxRunning head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docxjeanettehully
 
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...Nadine Burnett
 
Content Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebContent Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebAmit Sheth
 
Content Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebContent Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebAmit Sheth
 
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)Brian Huff
 
00 14092011-1130-jesse wilkins
00 14092011-1130-jesse wilkins00 14092011-1130-jesse wilkins
00 14092011-1130-jesse wilkinsguiabusinessmedia
 
20110914 ECM Show 2011 Future of Information Management
20110914 ECM Show 2011 Future of Information Management20110914 ECM Show 2011 Future of Information Management
20110914 ECM Show 2011 Future of Information ManagementJesse Wilkins
 
ECM 101: Enterprise Content Management Meets Open Source
ECM 101: Enterprise Content Management Meets Open SourceECM 101: Enterprise Content Management Meets Open Source
ECM 101: Enterprise Content Management Meets Open SourceCheryl McKinnon
 

Similar a ECM and Enterprise 2.0 (20)

Esecurity e202
Esecurity e202Esecurity e202
Esecurity e202
 
KMWorld Martin Briefing
KMWorld Martin BriefingKMWorld Martin Briefing
KMWorld Martin Briefing
 
Filenet test
Filenet testFilenet test
Filenet test
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
ECM and Enterprise 2.0
ECM and Enterprise 2.0ECM and Enterprise 2.0
ECM and Enterprise 2.0
 
Content Management Strategies
Content Management StrategiesContent Management Strategies
Content Management Strategies
 
20110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 2020110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 20
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0
 
20110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.020110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0
 
A Pragmatic Strategy for Oracle Enterprise Content Management
A Pragmatic Strategy for Oracle Enterprise Content ManagementA Pragmatic Strategy for Oracle Enterprise Content Management
A Pragmatic Strategy for Oracle Enterprise Content Management
 
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docxRunning head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
 
What is killing ecm
What is killing ecmWhat is killing ecm
What is killing ecm
 
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
 
Content Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebContent Management, Metadata and Semantic Web
Content Management, Metadata and Semantic Web
 
Content Management, Metadata and Semantic Web
Content Management, Metadata and Semantic WebContent Management, Metadata and Semantic Web
Content Management, Metadata and Semantic Web
 
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
 
00 14092011-1130-jesse wilkins
00 14092011-1130-jesse wilkins00 14092011-1130-jesse wilkins
00 14092011-1130-jesse wilkins
 
20110914 ECM Show 2011 Future of Information Management
20110914 ECM Show 2011 Future of Information Management20110914 ECM Show 2011 Future of Information Management
20110914 ECM Show 2011 Future of Information Management
 
ECM 101: Enterprise Content Management Meets Open Source
ECM 101: Enterprise Content Management Meets Open SourceECM 101: Enterprise Content Management Meets Open Source
ECM 101: Enterprise Content Management Meets Open Source
 
Document repositories-and-metadata
Document repositories-and-metadataDocument repositories-and-metadata
Document repositories-and-metadata
 

Más de Carl Frappaolo

Can E2.0 Break Through the KM Cultural Barrier
Can E2.0 Break Through the KM Cultural BarrierCan E2.0 Break Through the KM Cultural Barrier
Can E2.0 Break Through the KM Cultural BarrierCarl Frappaolo
 
ECM Strategy Development
ECM Strategy DevelopmentECM Strategy Development
ECM Strategy DevelopmentCarl Frappaolo
 
Knowledge Managemnt: Has the Torch Been Passed to a New Generation
Knowledge Managemnt: Has the Torch Been Passed to a New GenerationKnowledge Managemnt: Has the Torch Been Passed to a New Generation
Knowledge Managemnt: Has the Torch Been Passed to a New GenerationCarl Frappaolo
 
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?Carl Frappaolo
 
Enterprise Search - Thinking Outside the Box
Enterprise Search - Thinking Outside the BoxEnterprise Search - Thinking Outside the Box
Enterprise Search - Thinking Outside the BoxCarl Frappaolo
 
SharePoint: Truth and Fiction
SharePoint: Truth and FictionSharePoint: Truth and Fiction
SharePoint: Truth and FictionCarl Frappaolo
 
Knowledge Management and Enterprise 2.0
Knowledge Management and Enterprise 2.0Knowledge Management and Enterprise 2.0
Knowledge Management and Enterprise 2.0Carl Frappaolo
 
Knowledge Management 2.0 - Enterprise 2.0
Knowledge Management 2.0 - Enterprise 2.0Knowledge Management 2.0 - Enterprise 2.0
Knowledge Management 2.0 - Enterprise 2.0Carl Frappaolo
 
5 08 Findability Webinar
5 08 Findability Webinar5 08 Findability Webinar
5 08 Findability WebinarCarl Frappaolo
 
Enterprise 2.0 Market Study
Enterprise 2.0 Market StudyEnterprise 2.0 Market Study
Enterprise 2.0 Market StudyCarl Frappaolo
 
Collaborate to Compete
Collaborate to CompeteCollaborate to Compete
Collaborate to CompeteCarl Frappaolo
 
Universal Search webinar
Universal Search webinarUniversal Search webinar
Universal Search webinarCarl Frappaolo
 

Más de Carl Frappaolo (16)

Can E2.0 Break Through the KM Cultural Barrier
Can E2.0 Break Through the KM Cultural BarrierCan E2.0 Break Through the KM Cultural Barrier
Can E2.0 Break Through the KM Cultural Barrier
 
ECM Strategy Development
ECM Strategy DevelopmentECM Strategy Development
ECM Strategy Development
 
Knowledge Managemnt: Has the Torch Been Passed to a New Generation
Knowledge Managemnt: Has the Torch Been Passed to a New GenerationKnowledge Managemnt: Has the Torch Been Passed to a New Generation
Knowledge Managemnt: Has the Torch Been Passed to a New Generation
 
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
 
Enterprise Search - Thinking Outside the Box
Enterprise Search - Thinking Outside the BoxEnterprise Search - Thinking Outside the Box
Enterprise Search - Thinking Outside the Box
 
Measuring Knowledge
Measuring KnowledgeMeasuring Knowledge
Measuring Knowledge
 
SharePoint: Truth and Fiction
SharePoint: Truth and FictionSharePoint: Truth and Fiction
SharePoint: Truth and Fiction
 
Knowledge Management and Enterprise 2.0
Knowledge Management and Enterprise 2.0Knowledge Management and Enterprise 2.0
Knowledge Management and Enterprise 2.0
 
BPM Market IQ
BPM Market IQBPM Market IQ
BPM Market IQ
 
Findability Market IQ
Findability Market IQFindability Market IQ
Findability Market IQ
 
Knowledge Management 2.0 - Enterprise 2.0
Knowledge Management 2.0 - Enterprise 2.0Knowledge Management 2.0 - Enterprise 2.0
Knowledge Management 2.0 - Enterprise 2.0
 
5 08 Findability Webinar
5 08 Findability Webinar5 08 Findability Webinar
5 08 Findability Webinar
 
Enterprise 2.0 Market Study
Enterprise 2.0 Market StudyEnterprise 2.0 Market Study
Enterprise 2.0 Market Study
 
Collaborate to Compete
Collaborate to CompeteCollaborate to Compete
Collaborate to Compete
 
Universal Search webinar
Universal Search webinarUniversal Search webinar
Universal Search webinar
 
IRM and E-discovery
IRM and E-discoveryIRM and E-discovery
IRM and E-discovery
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

ECM and Enterprise 2.0

  • 1. Defining the Role of ECM in Enterprise 2.0 Carl Frappaolo VP, AIIM Market Intelligence
  • 3. ? What is Enterprise 2.0
  • 4. ? What is ECM
  • 5. Web/html IM Meta Data Management Records Management Shared Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
  • 6. Web/html IM Meta Data Management Records Management Shared Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
  • 7.
  • 8. Web/html IM Meta Data Management Records Management Shared Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
  • 9.
  • 12.
  • 13.
  • 14. Is Your Content Security Strategy Driven By a Desire to Lock Down Content or to Enable Secure Collaboration? 7% 26% 49% 14% 3% Source: AIIM Content Security Market IQ, 2007
  • 15. What Content Types Are You Targeting With Content Security? Source: AIIM Content Security Market IQ, 2007
  • 16. Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally? Source: AIIM Content Security Market IQ, 2007
  • 17. Within the Last 2 Years Has Content Been Inappropriately Accessed by an Unauthorized Individual Either Deliberately or Accidentally? Source: AIIM Content Security Market IQ, 2007
  • 18. How Well Does Your Organization Understand Content Security? Source: AIIM Content Security Market IQ, 2007
  • 19. Who Owns The Content Security Initiative in Your Organization? Source: AIIM Content Security Market IQ, 2007
  • 20. Do You Have a Specific Group Within Your Organization to Address Content Security? Source: AIIM Content Security Market IQ, 2007
  • 21.

Notas del editor

  1. Old Buzzword - New Buzzword But before we jump In I thought