Oracle Upgrades Security For Enterprise Content Management
Oracle Universal Content Management, the core of its ECM suite, can now store automatically encrypted content.
Oracle has updated the content security in its Enterprise Content Management Suite to offer both encryption and the ability to apply information management policies to who can view, share, and copy documents.
Oracle Universal Content Management, the core of its ECM suite, can now store automatically encrypted content, a feature it shares with the Oracle 10g database. The encryption feature was enabled by the content management system's integration with another Oracle product, Information Rights Management.
The Information Rights Management System allows policies to be set over documents that govern their use once they leave the document repository. An audit trail of who views, shares, and copies the document can be established, and rights to use the document can be granted or revoked from a central permission server. The system also encrypts documents.
The integration of the two systems means e-mail that is store in Oracle Universal Content Management may also be governed by document policies and user privilege levels. The integration can prevent unauthorized access or reproduction of sensitive documents and e-mail.
With the updated content management system, "users don't have worry about security settings, which enables results that are more consistent with corporate standards and helps reduce errors," said Frank Radichel, VP of software development, in a statement.
Universal Content Management may now use folios, or creat groups of related documents, including using a shopping basket, for document storage, distribution, and future reference as a set. Another new feature is an improved Ajax-based user interface to simplify Web editing for groups of users.
In addition, the content management system has been integrated with Oracle's AutoVue Enterprise Visualization to allow native document viewing, annotation and joint document creation or editing for many document types, including computer-aided design documents.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.