Defining the Role of ECM in Enterprise 2.0 Carl Frappaolo VP, AIIM Market Intelligence
WAIT
? What  is Enterprise 2.0
? What  is ECM
Web/html IM Meta Data Management Records  Management Shared  Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
Web/html IM Meta Data Management Records  Management Shared  Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
Enterprise 2.0 Wikis Blogs Mashups Social Tagging RSS Social Bookmarking Social Networking
Web/html IM Meta Data Management Records  Management Shared  Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
New York Times,  Sunday, 9/16/07
IMPORTANCE
Understanding
2006 Collaborative Technologies Conference Technology Focus Intro to Wikis and Blogs McAfee Presentation 2007 Enterprise 2.0 Conference Focus on Business Value Cultural and Procedural Issues Risk & Responsibility McAfee vs. Davenport
Records Management Content/Document Management Information/Enterprise Rights Management Authentication/Identity Management Data Loss/Leak Prevention CAS Trusted Timestamps
Is Your Content Security Strategy Driven By a Desire to Lock Down Content or to Enable Secure Collaboration? 7% 26% 49% 14% 3% Source:  AIIM Content Security Market IQ, 2007
What Content Types Are You Targeting With Content Security? Source:  AIIM Content Security Market IQ, 2007
Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally? Source:  AIIM Content Security Market IQ, 2007
Within the Last 2 Years Has Content Been Inappropriately Accessed by an Unauthorized Individual Either Deliberately or Accidentally? Source:  AIIM Content Security Market IQ, 2007
How Well Does Your Organization Understand Content Security? Source:  AIIM Content Security Market IQ, 2007
Who Owns The Content Security Initiative in Your Organization? Source:  AIIM Content Security Market IQ, 2007
Do You Have a Specific Group Within Your Organization to Address Content Security?  Source:  AIIM Content Security Market IQ, 2007
ECM is the DNA of Enterprise 2.0

More Related Content

PPT
Ferraz Itp368 Optmizing Information Security
PPTX
20181110 sps leicester connect protecting your data in office 365
PPTX
Normative theories of business ethics and hotel wi fi
PDF
Social media, Text and Instant Message Archiving from Smarsh - Presented by A...
PPTX
Customer Data Privacy & Protection | Seclore
PPTX
20181115 O365 connect protecting your data in office 365
PPTX
Seclore For Microsoft 365 | Seclore
PPTX
Seclore for Forcepoint DLP
Ferraz Itp368 Optmizing Information Security
20181110 sps leicester connect protecting your data in office 365
Normative theories of business ethics and hotel wi fi
Social media, Text and Instant Message Archiving from Smarsh - Presented by A...
Customer Data Privacy & Protection | Seclore
20181115 O365 connect protecting your data in office 365
Seclore For Microsoft 365 | Seclore
Seclore for Forcepoint DLP

What's hot (20)

PPT
Social collaboration 10 must have tips for security, productivity and compliance
PPTX
GDPR Compliance & Data-Centric Security | Seclore
PPT
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
PPTX
Seclore For Spirion Data Classification | Seclore
PDF
SAML Security Contacts
PPTX
Seclore Decrypter For Email
PPTX
Inbound Data Protection
PPTX
Securing IBM ECM with Rights Management
PPTX
Mcafee CASB/DLP + Seclore Rights Management Solutions
PPTX
Securing MS SharePoint with IRM
PDF
Gdpr questions for compliance difficulties
PPTX
Data Classification Protection | Seclore
PPTX
Data Security For Insurance Solutions
PPTX
Application Data Security | Seclore
PDF
IT Trends - Cyber Security
PPTX
Data-Centric Security | Seclore
DOCX
Cyber Security Tips for Small Firms
PPTX
Data Governance Solutions With Seclore and Stash
PDF
How to protect virtualized data from theft
PPTX
Benefits of automating data protection | Seclore
Social collaboration 10 must have tips for security, productivity and compliance
GDPR Compliance & Data-Centric Security | Seclore
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
Seclore For Spirion Data Classification | Seclore
SAML Security Contacts
Seclore Decrypter For Email
Inbound Data Protection
Securing IBM ECM with Rights Management
Mcafee CASB/DLP + Seclore Rights Management Solutions
Securing MS SharePoint with IRM
Gdpr questions for compliance difficulties
Data Classification Protection | Seclore
Data Security For Insurance Solutions
Application Data Security | Seclore
IT Trends - Cyber Security
Data-Centric Security | Seclore
Cyber Security Tips for Small Firms
Data Governance Solutions With Seclore and Stash
How to protect virtualized data from theft
Benefits of automating data protection | Seclore
Ad

Similar to ECM and Enterprise 2.0 (20)

PDF
Esecurity e202
PDF
KMWorld Martin Briefing
PPT
Filenet test
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
PDF
ECM and Enterprise 2.0
PPTX
Content Management Strategies
PPTX
20110407 NARA E-Records Forum on RM 20
PPTX
20110427 ARMA Houston Keynote Records Management 2.0
PPTX
20110518-4 ARMA Central Iowa Records Management 2.0
PPT
A Pragmatic Strategy for Oracle Enterprise Content Management
DOCX
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
PPTX
What is killing ecm
PPT
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
PPT
Content Management, Metadata and Semantic Web
PPT
Content Management, Metadata and Semantic Web
PPT
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
PPTX
00 14092011-1130-jesse wilkins
PPTX
20110914 ECM Show 2011 Future of Information Management
ODP
ECM 101: Enterprise Content Management Meets Open Source
PPT
Document repositories-and-metadata
Esecurity e202
KMWorld Martin Briefing
Filenet test
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
ECM and Enterprise 2.0
Content Management Strategies
20110407 NARA E-Records Forum on RM 20
20110427 ARMA Houston Keynote Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0
A Pragmatic Strategy for Oracle Enterprise Content Management
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
What is killing ecm
Key Success Factors for MOSS 2007 as ECM at Telecom - V07 - Rayner, Miles & B...
Content Management, Metadata and Semantic Web
Content Management, Metadata and Semantic Web
A Pragmatic Strategy for Oracle Enterprise Content Management (ECM)
00 14092011-1130-jesse wilkins
20110914 ECM Show 2011 Future of Information Management
ECM 101: Enterprise Content Management Meets Open Source
Document repositories-and-metadata
Ad

More from Carl Frappaolo (16)

PDF
Can E2.0 Break Through the KM Cultural Barrier
PDF
ECM Strategy Development
PDF
Knowledge Managemnt: Has the Torch Been Passed to a New Generation
PDF
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
PDF
Enterprise Search - Thinking Outside the Box
PDF
Measuring Knowledge
PDF
SharePoint: Truth and Fiction
PDF
Knowledge Management and Enterprise 2.0
PDF
BPM Market IQ
PDF
Findability Market IQ
PDF
Knowledge Management 2.0 - Enterprise 2.0
PDF
5 08 Findability Webinar
PDF
Enterprise 2.0 Market Study
PDF
Collaborate to Compete
PDF
Universal Search webinar
PPT
IRM and E-discovery
Can E2.0 Break Through the KM Cultural Barrier
ECM Strategy Development
Knowledge Managemnt: Has the Torch Been Passed to a New Generation
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Enterprise Search - Thinking Outside the Box
Measuring Knowledge
SharePoint: Truth and Fiction
Knowledge Management and Enterprise 2.0
BPM Market IQ
Findability Market IQ
Knowledge Management 2.0 - Enterprise 2.0
5 08 Findability Webinar
Enterprise 2.0 Market Study
Collaborate to Compete
Universal Search webinar
IRM and E-discovery

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPT
What is a Computer? Input Devices /output devices
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
A novel scalable deep ensemble learning framework for big data classification...
DOCX
search engine optimization ppt fir known well about this
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
CloudStack 4.21: First Look Webinar slides
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
observCloud-Native Containerability and monitoring.pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
August Patch Tuesday
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Assigned Numbers - 2025 - Bluetooth® Document
What is a Computer? Input Devices /output devices
Developing a website for English-speaking practice to English as a foreign la...
Final SEM Unit 1 for mit wpu at pune .pptx
Getting Started with Data Integration: FME Form 101
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
A comparative study of natural language inference in Swahili using monolingua...
Taming the Chaos: How to Turn Unstructured Data into Decisions
A novel scalable deep ensemble learning framework for big data classification...
search engine optimization ppt fir known well about this
1 - Historical Antecedents, Social Consideration.pdf
Web Crawler for Trend Tracking Gen Z Insights.pptx
CloudStack 4.21: First Look Webinar slides
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
WOOl fibre morphology and structure.pdf for textiles
observCloud-Native Containerability and monitoring.pptx
Module 1.ppt Iot fundamentals and Architecture
sustainability-14-14877-v2.pddhzftheheeeee
August Patch Tuesday
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf

ECM and Enterprise 2.0

  • 1. Defining the Role of ECM in Enterprise 2.0 Carl Frappaolo VP, AIIM Market Intelligence
  • 3. ? What is Enterprise 2.0
  • 4. ? What is ECM
  • 5. Web/html IM Meta Data Management Records Management Shared Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
  • 6. Web/html IM Meta Data Management Records Management Shared Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
  • 7. Enterprise 2.0 Wikis Blogs Mashups Social Tagging RSS Social Bookmarking Social Networking
  • 8. Web/html IM Meta Data Management Records Management Shared Drives E-mail Data/tags ID Extraction IRM/ERM BPM/ Workflow Authentication Content Analytics Search Portal/Web Social Network Analysis Content Management Document Management Taxonomy Collaboration Information Architecture Visualization Facets Contextual Filtering MultiMedia DAM
  • 9. New York Times, Sunday, 9/16/07
  • 12. 2006 Collaborative Technologies Conference Technology Focus Intro to Wikis and Blogs McAfee Presentation 2007 Enterprise 2.0 Conference Focus on Business Value Cultural and Procedural Issues Risk & Responsibility McAfee vs. Davenport
  • 13. Records Management Content/Document Management Information/Enterprise Rights Management Authentication/Identity Management Data Loss/Leak Prevention CAS Trusted Timestamps
  • 14. Is Your Content Security Strategy Driven By a Desire to Lock Down Content or to Enable Secure Collaboration? 7% 26% 49% 14% 3% Source: AIIM Content Security Market IQ, 2007
  • 15. What Content Types Are You Targeting With Content Security? Source: AIIM Content Security Market IQ, 2007
  • 16. Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally? Source: AIIM Content Security Market IQ, 2007
  • 17. Within the Last 2 Years Has Content Been Inappropriately Accessed by an Unauthorized Individual Either Deliberately or Accidentally? Source: AIIM Content Security Market IQ, 2007
  • 18. How Well Does Your Organization Understand Content Security? Source: AIIM Content Security Market IQ, 2007
  • 19. Who Owns The Content Security Initiative in Your Organization? Source: AIIM Content Security Market IQ, 2007
  • 20. Do You Have a Specific Group Within Your Organization to Address Content Security? Source: AIIM Content Security Market IQ, 2007
  • 21. ECM is the DNA of Enterprise 2.0

Editor's Notes

  • #2: Old Buzzword - New Buzzword But before we jump In I thought