aiim webinar content security at the fulcrum of innovation and risk

22
Thank You to Our Underwriters

Upload: carl-frappaolo

Post on 18-Nov-2014

2.002 views

Category:

Business


2 download

DESCRIPTION

An overview of the state-of-the-art in securing online content in a way that enables collaboration while minimizing risk

TRANSCRIPT

Page 1: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Page 2: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Content Security StrategyContent Security Strategy

Control& Secure

Collaborate& Innovate

Risk vs.Benefit

Page 3: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

The Traditional View to The Traditional View to Information SecurityInformation Security

• Perimeter: "Traditional" Network Security

• Core: Desktops, Servers, Machines, OSes, Applications

• Standard policy is:OUTSIDE = UNTRUSTEDINSIDE = (COMPLETELY) TRUSTED

• Content: Content in all forms, whether at rest or in motion

Perimeter

Core

Content

Page 4: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Application-Level SecurityApplication-Level Security• Document/Content

Management provides access into repositories with document/user level controls - a mini perimeter

• Records Management provides lifecycle management for Archive and Destruction

• Content is free to go where it will once it is out of those systems

Page 5: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Content SecurityContent Security

• Policy-based

• Imposed at the document/user/application level (context)

• Omni-present

• Auto-auditing

• Content Authentication

• User Authentication

• Encryption

POLICY

Page 6: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Content Security StrategyContent Security Strategy

Page 7: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Content Security StrategyContent Security Strategy

Page 8: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Content Security Component Content Security Component TechnologiesTechnologies

• Records Management

• Document Management

• Web Content Management

• Workflow/BPM

• E-mail Management

• Enterprise Rights Management/Digital Rights Management

• Identity Management/User Authentication

• Content Authentication

• Content Addressed Storage

• Trusted Time Stamps

• Data Loss/Leak Prevention

• Public Key Infrastructure (PKI)

• Digital Signatures

• Hierarchical Storage Management

Page 9: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Developing a StrategyDeveloping a Strategy

Control& Secure

Collaborate& Innovate

Page 10: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Enterprise Content Security Enterprise Content Security StrategyStrategy

• Aligned to/Foundation of Corporate Governance• Lifecycle• Policy Driven

– Less is More • File Type Agnostic• Automated to the Degree Practical

Page 11: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Market RealityMarket Reality

Source: AIIM Content Security Market IQ, 2007

Is Your Organization’s Content Security Strategy Driven More by a Desire to Lock Is Your Organization’s Content Security Strategy Driven More by a Desire to Lock Down Content or to Enable Secure Collaboration?Down Content or to Enable Secure Collaboration?

Page 12: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Market RealityMarket Reality

0% 7.5% 15.0% 22.5% 30.0%

Well Aware and areExpressly Addressing It

Vaguely Familiar and Understandits Relationship to the BroaderTopic of Security

Not Sure How This is DifferentForm Security in General

No Clear How Understanding

How Well is Content Security Understood in Your Organization?How Well is Content Security Understood in Your Organization?

Source: AIIM Content Security Market IQ, 2007

Well aware and are expressly addressing it.

Vaguely familiar and understand its relationship to the broader topic of security.

Not sure how this is different from security in general.

No clear how understanding.

Page 13: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Within the Last 2 Years Has Content Been Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally?Either Deliberately or Accidentally?

Source: AIIM Content Security Market IQ, 2007

Market RealityMarket Reality

Page 14: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Within the Last 2 Years Has Content Within the Last 2 Years Has Content Been Inappropriately Accessed by an Been Inappropriately Accessed by an Unauthorized Individual Either Unauthorized Individual Either Deliberately or Accidentally?Deliberately or Accidentally?

Source: AIIM Content Security Market IQ, 2007

Market RealityMarket Reality

Page 15: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Is There an Is There an Appreciation for Appreciation for the Potential Cost the Potential Cost Associated with Associated with the Risk of the Risk of Unsecured Unsecured Content in Your Content in Your Organization?Organization?

There is No Appreciation

$0 - $5,000 Annually

$5,000 - $25,000 Annually

$25,000 - $100,000 Annually

$100,000 - $500,000 Annually

$500,000 - $1,000,000 Annually

$1,000,000 + Annually

0% 17.5% 35.0% 52.5% 70.0%

Market RealityMarket Reality

Source: AIIM Content Security Market IQ, 2007

Page 16: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Who Owns The Content Security Initiative in Your Organization?Who Owns The Content Security Initiative in Your Organization?

Source: AIIM Content Security Market IQ, 2007

Market RealityMarket Reality

Page 17: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Market RealityMarket Reality

What is Your Organization’s Current What is Your Organization’s Current Involvement With Content Security?Involvement With Content Security?

Source: AIIM Content Security Market IQ, 2007

Page 18: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Do You Have a Specific Do You Have a Specific Group Within Your Group Within Your Organization to Address Organization to Address Content Security?Content Security?

Source: AIIM Content Security Market IQ, 2007

Market RealityMarket Reality

Page 19: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Assuming Budget is Available, What are the Primary Obstacles to Assuming Budget is Available, What are the Primary Obstacles to Implementing Content Security?Implementing Content Security?

Lack of Understanding/Appreciation

Complexity of Solution

User Resistance

Lack of Business Interest

Lack of IT Support for the Initiative

Lack of a Business Case

Management Resistance

Other

0% 10% 20% 30% 40%

Market RealityMarket Reality

Source: AIIM Content Security Market IQ, 2007

Page 20: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Why Care?Why Care?• Security is a major issue for CxOs

– Flexible, Comprehensive Enterprise Governance• Knowledge Management, Innovation Management, Collaborative

Teams, Enterprise 2.0• M&A, e-Discovery, Conflict of Interest, Minimizing Mistakes &

Embarrassment• Strategic deployment and alignment with business provides

competitive advantage, holistic benefit – Responsiveness– Reduced Costs– Increased Access

• Content Security is critical but requires positioning and education

Page 21: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Market EducationMarket Education

Page 22: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk

Thank You to Our Underwriters

Q & ACarl Frappaolo

Vice President, Market [email protected]

Thank You