Software // Information Management
04:50 PM

In Focus: Exploiting Security to Increase Content Access

Electronic forms of content, from e-mail to Web sites, have opened the doors of collaboration in ways that defy the old boundaries of time and geography. With opportunity comes greater risk, however, because of the ease of proliferation, duplication and modification of content.

Electronic forms of content, from e-mail to Web sites, have opened the doors of collaboration in ways that defy the old boundaries of time and geography. With opportunity comes greater risk, however, because of the ease of proliferation, duplication and modification of content. From a security standpoint, there's a higher potential for loss of control over enterprise content. And from a risk standpoint, it's no coincidence that security concerns coexist with growth in industry and governmental regulation regarding content disclosure and secrecy.

Just as executives are seeking innovative ways to leverage content for increased market penetration, collaboration and profits, recent court rulings and regulations have made these same leaders apprehensive about providing content access. They don't have to fear, however, as 'security' and 'sharing' are not incompatible concepts. Content security is an emerging technology approach to handling content in an intelligent and flexible way. Behind the approach is a new philosophy that you can strengthen conventional security while simultaneously increasing opportunities for revenue and partnership through sharing.

Content security is not an easily obtained solution; there is no single out-of-the-box solution or single provider as yet. To be effective, it has to be built to specification following an extensive analysis of your business. Risks have to be weighed against opportunity, technology alternatives and capabilities understood, and business objectives and return on investment have to be considered. The business sponsor must work closely with a technologist to understand the strengths and weaknesses of point functionality and how orchestration and integration complement one another.

Among the technologies that will be fundamental to content security systems are document management, content management, user authentication, content authentication, digital rights management, enterprise rights management, e-mail management and e-records management. Their application must permit security down to at least the document (or message) level, as opposed to a collection/server level. It must also be policy driven, and for the utmost effect, it must permit embedded policies within the content. Ideally — and this will be the secret sauce — a single policy should be leveraged across all these technology components in an orchestrated manner that is transparent to the content consumer.

By instilling these characteristics and capabilities, it is possible to build a security system that secures content without the ongoing human intervention demanded by most security solutions. Better yet, content security can be enforced for the duration of each individual content object, no matter how or where it is used or stored.

Refocus your thinking so that security issues are business decisions, not technology decisions. Content security can promote new opportunity and business models. The initial investment may be sparked by compliance demands and piracy risks, but the lasting value will come from opportunities such as intelligent orchestration of potential mergers and acquisitions, paid subscription models to IP and broad-based secure collaboration.

While the exact nature of your deployment of content security may be unknown, one thing is certain: In the next three years, this emerging functionality is destined to become not just an issue of competitive advantage but a benchmark for business leadership.

Take the Survey: Delphi is currently conducting an online survey on content security. In exchange for your participation, you will receive access to the prepublication results.

Carl Frappaolo and Dan Keldsen of the Delphi Group provided this "Managing Content" guest opinion.

An executive overview of this report will be shared in an upcoming "Managing Content" newsletter. Please share your current understanding and plans for content security by taking the survey, which takes five to 10 minutes to complete.

Thanks, Doug Henschen, Editor, Managing Content


  1. Content at Risk: When content goes beyond the firewall, rights management technology can safeguard intellectual property.
  2. A Matter of Trust: To make better rights management choices, you have to understand the risks. Seven steps help you plan architectures and spot important features.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
The Agile Archive
The Agile Archive
When it comes to managing data, don’t look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on for the week of July 17, 2016. We'll be talking with the editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.