aiim webinar content security at the fulcrum of innovation and risk
DESCRIPTION
An overview of the state-of-the-art in securing online content in a way that enables collaboration while minimizing riskTRANSCRIPT
Thank You to Our Underwriters
Thank You to Our Underwriters
Content Security StrategyContent Security Strategy
Control& Secure
Collaborate& Innovate
Risk vs.Benefit
Thank You to Our Underwriters
The Traditional View to The Traditional View to Information SecurityInformation Security
• Perimeter: "Traditional" Network Security
• Core: Desktops, Servers, Machines, OSes, Applications
• Standard policy is:OUTSIDE = UNTRUSTEDINSIDE = (COMPLETELY) TRUSTED
• Content: Content in all forms, whether at rest or in motion
Perimeter
Core
Content
Thank You to Our Underwriters
Application-Level SecurityApplication-Level Security• Document/Content
Management provides access into repositories with document/user level controls - a mini perimeter
• Records Management provides lifecycle management for Archive and Destruction
• Content is free to go where it will once it is out of those systems
Thank You to Our Underwriters
Content SecurityContent Security
• Policy-based
• Imposed at the document/user/application level (context)
• Omni-present
• Auto-auditing
• Content Authentication
• User Authentication
• Encryption
POLICY
Thank You to Our Underwriters
Content Security StrategyContent Security Strategy
Thank You to Our Underwriters
Content Security StrategyContent Security Strategy
Thank You to Our Underwriters
Content Security Component Content Security Component TechnologiesTechnologies
• Records Management
• Document Management
• Web Content Management
• Workflow/BPM
• E-mail Management
• Enterprise Rights Management/Digital Rights Management
• Identity Management/User Authentication
• Content Authentication
• Content Addressed Storage
• Trusted Time Stamps
• Data Loss/Leak Prevention
• Public Key Infrastructure (PKI)
• Digital Signatures
• Hierarchical Storage Management
Thank You to Our Underwriters
Developing a StrategyDeveloping a Strategy
Control& Secure
Collaborate& Innovate
Thank You to Our Underwriters
Enterprise Content Security Enterprise Content Security StrategyStrategy
• Aligned to/Foundation of Corporate Governance• Lifecycle• Policy Driven
– Less is More • File Type Agnostic• Automated to the Degree Practical
Thank You to Our Underwriters
Market RealityMarket Reality
Source: AIIM Content Security Market IQ, 2007
Is Your Organization’s Content Security Strategy Driven More by a Desire to Lock Is Your Organization’s Content Security Strategy Driven More by a Desire to Lock Down Content or to Enable Secure Collaboration?Down Content or to Enable Secure Collaboration?
Thank You to Our Underwriters
Market RealityMarket Reality
0% 7.5% 15.0% 22.5% 30.0%
Well Aware and areExpressly Addressing It
Vaguely Familiar and Understandits Relationship to the BroaderTopic of Security
Not Sure How This is DifferentForm Security in General
No Clear How Understanding
How Well is Content Security Understood in Your Organization?How Well is Content Security Understood in Your Organization?
Source: AIIM Content Security Market IQ, 2007
Well aware and are expressly addressing it.
Vaguely familiar and understand its relationship to the broader topic of security.
Not sure how this is different from security in general.
No clear how understanding.
Thank You to Our Underwriters
Within the Last 2 Years Has Content Been Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally?Either Deliberately or Accidentally?
Source: AIIM Content Security Market IQ, 2007
Market RealityMarket Reality
Thank You to Our Underwriters
Within the Last 2 Years Has Content Within the Last 2 Years Has Content Been Inappropriately Accessed by an Been Inappropriately Accessed by an Unauthorized Individual Either Unauthorized Individual Either Deliberately or Accidentally?Deliberately or Accidentally?
Source: AIIM Content Security Market IQ, 2007
Market RealityMarket Reality
Thank You to Our Underwriters
Is There an Is There an Appreciation for Appreciation for the Potential Cost the Potential Cost Associated with Associated with the Risk of the Risk of Unsecured Unsecured Content in Your Content in Your Organization?Organization?
There is No Appreciation
$0 - $5,000 Annually
$5,000 - $25,000 Annually
$25,000 - $100,000 Annually
$100,000 - $500,000 Annually
$500,000 - $1,000,000 Annually
$1,000,000 + Annually
0% 17.5% 35.0% 52.5% 70.0%
Market RealityMarket Reality
Source: AIIM Content Security Market IQ, 2007
Thank You to Our Underwriters
Who Owns The Content Security Initiative in Your Organization?Who Owns The Content Security Initiative in Your Organization?
Source: AIIM Content Security Market IQ, 2007
Market RealityMarket Reality
Thank You to Our Underwriters
Market RealityMarket Reality
What is Your Organization’s Current What is Your Organization’s Current Involvement With Content Security?Involvement With Content Security?
Source: AIIM Content Security Market IQ, 2007
Thank You to Our Underwriters
Do You Have a Specific Do You Have a Specific Group Within Your Group Within Your Organization to Address Organization to Address Content Security?Content Security?
Source: AIIM Content Security Market IQ, 2007
Market RealityMarket Reality
Thank You to Our Underwriters
Assuming Budget is Available, What are the Primary Obstacles to Assuming Budget is Available, What are the Primary Obstacles to Implementing Content Security?Implementing Content Security?
Lack of Understanding/Appreciation
Complexity of Solution
User Resistance
Lack of Business Interest
Lack of IT Support for the Initiative
Lack of a Business Case
Management Resistance
Other
0% 10% 20% 30% 40%
Market RealityMarket Reality
Source: AIIM Content Security Market IQ, 2007
Thank You to Our Underwriters
Why Care?Why Care?• Security is a major issue for CxOs
– Flexible, Comprehensive Enterprise Governance• Knowledge Management, Innovation Management, Collaborative
Teams, Enterprise 2.0• M&A, e-Discovery, Conflict of Interest, Minimizing Mistakes &
Embarrassment• Strategic deployment and alignment with business provides
competitive advantage, holistic benefit – Responsiveness– Reduced Costs– Increased Access
• Content Security is critical but requires positioning and education
Thank You to Our Underwriters
Market EducationMarket Education
Thank You to Our Underwriters
Q & ACarl Frappaolo
Vice President, Market [email protected]
Thank You