Your SlideShare is downloading. ×
0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
ECM and Enterprise 2.0
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

ECM and Enterprise 2.0

3,666

Published on

Overview of the role of ECM in Enterprise 2.0, with a further focus on content security

Overview of the role of ECM in Enterprise 2.0, with a further focus on content security

Published in: Technology, Business
1 Comment
4 Likes
Statistics
Notes
No Downloads
Views
Total Views
3,666
On Slideshare
0
From Embeds
0
Number of Embeds
18
Actions
Shares
0
Downloads
280
Comments
1
Likes
4
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Old Buzzword - New Buzzword But before we jump In I thought
  • Transcript

    • 1. Defining the Role of ECM in Enterprise 2.0 Carl Frappaolo VP, AIIM Market Intelligence
    • 2. WAIT
    • 3. ? What is Enterprise 2.0
    • 4. ? What is ECM
    • 5. Web/html IM Meta Data Management Records Management Shared Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
    • 6. Web/html IM Meta Data Management Records Management Shared Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
    • 7.
      • Enterprise 2.0
        • Wikis
        • Blogs
        • Mashups
        • Social Tagging
        • RSS
        • Social Bookmarking
        • Social Networking
    • 8. Web/html IM Meta Data Management Records Management Shared Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
    • 9.
      • New York Times,
      • Sunday, 9/16/07
    • 10. IMPORTANCE
    • 11. Understanding
    • 12.
      • 2006
        • Collaborative Technologies Conference
          • Technology Focus
          • Intro to Wikis and Blogs
          • McAfee Presentation
      • 2007
        • Enterprise 2.0 Conference
        • Focus on Business Value
        • Cultural and Procedural Issues
        • Risk & Responsibility
        • McAfee vs. Davenport
    • 13.
      • Records Management
      • Content/Document Management
      • Information/Enterprise Rights Management
      • Authentication/Identity Management
      • Data Loss/Leak Prevention
      • CAS
      • Trusted Timestamps
    • 14. Is Your Content Security Strategy Driven By a Desire to Lock Down Content or to Enable Secure Collaboration? 7% 26% 49% 14% 3% Source: AIIM Content Security Market IQ, 2007
    • 15. What Content Types Are You Targeting With Content Security? Source: AIIM Content Security Market IQ, 2007
    • 16. Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally? Source: AIIM Content Security Market IQ, 2007
    • 17. Within the Last 2 Years Has Content Been Inappropriately Accessed by an Unauthorized Individual Either Deliberately or Accidentally? Source: AIIM Content Security Market IQ, 2007
    • 18. How Well Does Your Organization Understand Content Security? Source: AIIM Content Security Market IQ, 2007
    • 19. Who Owns The Content Security Initiative in Your Organization? Source: AIIM Content Security Market IQ, 2007
    • 20. Do You Have a Specific Group Within Your Organization to Address Content Security? Source: AIIM Content Security Market IQ, 2007
    • 21.
      • ECM is the DNA of Enterprise 2.0

    ×