Content Security Strategy Risk vs. Benefit
The Traditional View to  Information Security <ul><li>Perimeter: &quot;Traditional&quot; Network Security </li></ul><ul><l...
Application-Level Security <ul><li>Document/Content Management provides access into repositories with document/user level ...
Content Security <ul><li>Policy-based </li></ul><ul><li>Imposed at the document/user/application level (context) </li></ul...
Content Security Strategy
Content Security Strategy
Content Security Component Technologies   <ul><ul><ul><li>Records Management </li></ul></ul></ul><ul><ul><ul><li>Document ...
Developing a Strategy
Enterprise Content Security Strategy   <ul><ul><ul><li>Aligned to/Foundation of Corporate Governance </li></ul></ul></ul><...
Market Reality Source:  AIIM Content Security Market IQ, 2007 Is Your Organization’s Content Security Strategy Driven More...
Market Reality How Well is Content Security Understood in Your Organization? Source:  AIIM Content Security Market IQ, 200...
Market Reality Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Either Deliberately ...
Market Reality Within the Last 2 Years Has Content Been Inappropriately Accessed by an Unauthorized Individual Either Deli...
<ul><li>Is There an Appreciation for the Potential Cost Associated with the Risk of Unsecured Content in Your Organization...
Market Reality Who Owns The Content Security Initiative in Your Organization? Source:  AIIM Content Security Market IQ, 2007
Market Reality What is Your Organization’s Current Involvement With Content Security? Source:  AIIM Content Security Marke...
Market Reality Do You Have a Specific Group Within Your Organization to Address Content Security?   Source:  AIIM Content ...
<ul><li>Assuming Budget is Available, What are the Primary Obstacles to Implementing Content Security? </li></ul>Market Re...
Why Care? <ul><li>Security is a major issue for CxOs </li></ul><ul><ul><li>Flexible, Comprehensive Enterprise Governance <...
Market Education
Q & A Carl Frappaolo Vice President, Market Intelligence [email_address]   Thank You
Upcoming SlideShare
Loading in …5
×

AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

1,599 views

Published on

An overview of the state-of-the-art in securing online content in a way that enables collaboration while minimizing risk

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,599
On SlideShare
0
From Embeds
0
Number of Embeds
32
Actions
Shares
0
Downloads
25
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

    1. 2. Content Security Strategy Risk vs. Benefit
    2. 3. The Traditional View to Information Security <ul><li>Perimeter: &quot;Traditional&quot; Network Security </li></ul><ul><li>Core: Desktops, Servers, Machines, OSes, Applications </li></ul><ul><li>Standard policy is: OUTSIDE = UNTRUSTED INSIDE = (COMPLETELY) TRUSTED </li></ul><ul><li>Content: Content in all forms, whether at rest or in motion </li></ul>Perimeter Core Content
    3. 4. Application-Level Security <ul><li>Document/Content Management provides access into repositories with document/user level controls - a mini perimeter </li></ul><ul><li>Records Management provides lifecycle management for Archive and Destruction </li></ul><ul><li>Content is free to go where it will once it is out of those systems </li></ul>
    4. 5. Content Security <ul><li>Policy-based </li></ul><ul><li>Imposed at the document/user/application level (context) </li></ul><ul><li>Omni-present </li></ul><ul><li>Auto-auditing </li></ul><ul><li>Content Authentication </li></ul><ul><li>User Authentication </li></ul><ul><li>Encryption </li></ul>POLICY
    5. 6. Content Security Strategy
    6. 7. Content Security Strategy
    7. 8. Content Security Component Technologies <ul><ul><ul><li>Records Management </li></ul></ul></ul><ul><ul><ul><li>Document Management </li></ul></ul></ul><ul><ul><ul><li>Web Content Management </li></ul></ul></ul><ul><ul><ul><li>Workflow/BPM </li></ul></ul></ul><ul><ul><ul><li>E-mail Management </li></ul></ul></ul><ul><ul><ul><li>Enterprise Rights Management/Digital Rights Management </li></ul></ul></ul><ul><ul><ul><li>Identity Management/User Authentication </li></ul></ul></ul><ul><ul><ul><li>Content Authentication </li></ul></ul></ul><ul><ul><ul><li>Content Addressed Storage </li></ul></ul></ul><ul><ul><ul><li>Trusted Time Stamps </li></ul></ul></ul><ul><ul><ul><li>Data Loss/Leak Prevention </li></ul></ul></ul><ul><ul><ul><li>Public Key Infrastructure (PKI) </li></ul></ul></ul><ul><ul><ul><li>Digital Signatures </li></ul></ul></ul><ul><ul><ul><li>Hierarchical Storage Management </li></ul></ul></ul>
    8. 9. Developing a Strategy
    9. 10. Enterprise Content Security Strategy <ul><ul><ul><li>Aligned to/Foundation of Corporate Governance </li></ul></ul></ul><ul><ul><ul><li>Lifecycle </li></ul></ul></ul><ul><ul><ul><li>Policy Driven </li></ul></ul></ul><ul><ul><ul><ul><li>Less is More </li></ul></ul></ul></ul><ul><ul><ul><li>File Type Agnostic </li></ul></ul></ul><ul><ul><ul><li>Automated to the Degree Practical </li></ul></ul></ul>
    10. 11. Market Reality Source: AIIM Content Security Market IQ, 2007 Is Your Organization’s Content Security Strategy Driven More by a Desire to Lock Down Content or to Enable Secure Collaboration?
    11. 12. Market Reality How Well is Content Security Understood in Your Organization? Source: AIIM Content Security Market IQ, 2007 Well aware and are expressly addressing it. Vaguely familiar and understand its relationship to the broader topic of security. Not sure how this is different from security in general. No clear how understanding.
    12. 13. Market Reality Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally? Source: AIIM Content Security Market IQ, 2007
    13. 14. Market Reality Within the Last 2 Years Has Content Been Inappropriately Accessed by an Unauthorized Individual Either Deliberately or Accidentally? Source: AIIM Content Security Market IQ, 2007
    14. 15. <ul><li>Is There an Appreciation for the Potential Cost Associated with the Risk of Unsecured Content in Your Organization? </li></ul>Market Reality Source: AIIM Content Security Market IQ, 2007
    15. 16. Market Reality Who Owns The Content Security Initiative in Your Organization? Source: AIIM Content Security Market IQ, 2007
    16. 17. Market Reality What is Your Organization’s Current Involvement With Content Security? Source: AIIM Content Security Market IQ, 2007
    17. 18. Market Reality Do You Have a Specific Group Within Your Organization to Address Content Security? Source: AIIM Content Security Market IQ, 2007
    18. 19. <ul><li>Assuming Budget is Available, What are the Primary Obstacles to Implementing Content Security? </li></ul>Market Reality Source: AIIM Content Security Market IQ, 2007
    19. 20. Why Care? <ul><li>Security is a major issue for CxOs </li></ul><ul><ul><li>Flexible, Comprehensive Enterprise Governance </li></ul></ul><ul><li>Knowledge Management, Innovation Management, Collaborative Teams, Enterprise 2.0 </li></ul><ul><li>M&A, e-Discovery, Conflict of Interest, Minimizing Mistakes & Embarrassment </li></ul><ul><li>Strategic deployment and alignment with business provides competitive advantage, holistic benefit </li></ul><ul><ul><li>Responsiveness </li></ul></ul><ul><ul><li>Reduced Costs </li></ul></ul><ul><ul><li>Increased Access </li></ul></ul><ul><li>Content Security is critical but requires positioning and education </li></ul>
    20. 21. Market Education
    21. 22. Q & A Carl Frappaolo Vice President, Market Intelligence [email_address] Thank You

    ×