The Value Of Information

The speed at which information is created is astounding. Companies are unable to analyze this information as quickly as it’s created, and extracting value at a quick pace can be almost impossible. That means the potential value of the information is in many ways greater than the current actual value.

Information is one of their company’s greatest assets but executives do not truly understand, measure or leverage the total value of that information. In fact, they typically do not establish value for information assets the way they do for others assets within the company.

2015 will be the year of value. Companies will keep an internal balance sheet for the valuation of corporation information assets. Otherwise, they will maintain the idea that customer information is only valuable once it’s used and that idle data is valueless. Infonomics, coined by Doug Laney of Gartner Group as the theory and practice that information is an actual asset with both potential and realized value that can be quantified, maximized, and managed as an asset, will become more viable as it begins to be adopted more quickly.

You can read the rest in the article, “2015 Information Governance Trends” by Bassam Zarkout on KMWorld.

Preventing the Digital Landfill With Smarter Business Practices Using Enterprise Content Management (ECM)


“Content management is not simply a burden to be bared; efficient ECM can be a smart way to improve a current business and avoid digital landfills. Additionally, ECM is important in managing content storage costs and supporting an enterprise’s fiduciary obligation to protect and maintain records. When companies work with employees or contractors, personal information and intellectual property must be accessible, but must also be treated with confidentiality.”

Originally posted on IBM ECM:

Today’s Guest Post by: Christopher Kissel, Analyst, Frost & Sullivan

The television network A&E had a long-running series called Hoarders. Admittedly, I like most watch with morbid curiosity to see what items a person would keep in their houses, or carry with them in pocketbooks and wallets. In fact, hoarding is not a laughing matter; the Anxiety and Depression Association of America, ADAA considers hoarding to be an indicator of Obsessive-Compulsive Disorder. Hoarding is still a great metaphor what is occurring in many organizations with digital assets and the digital landfills that result.

A digital landfill occurs when a company stores so much content that records are hard to locate and access, often to a point the records might as well be lost. Toby Bell, the Marketing and Offering Strategy Lead of IBM Enterprise Content Management (ECM), described the mismanagement of content as “information anarchy.” In a recent eBroadcast…

View original 587 more words

The Link Between Data Classification And Security

Principal Analyst at Bloor Research, Fran Howarth said: “Effective information governance is essential for data security and needs to be implemented across the entire lifecycle of information. Data classification policies and tools allow all data to be classified according to its sensitivity and criticality to the organization. Such policies and tools need to be extended to all systems and devices, including mobile devices, the use of which is growing rapidly.”

Martin Sugden, Managing Director of Boldon James said: “Data classification is being seen as more and more critical to organizations as it improves the performance and return on investment of other security technologies such as DLP and rights management. It’s encouraging to see that one of the top drivers for implementing data classification projects is to follow best practice as a primary way to increase user awareness of data security. In terms of user awareness, data classification helps to ensure employees are more aware of the type of information they are dealing with and its value, as well as their obligations in protecting it to prevent data loss.”

Fran Howarth added: “Although malicious data breaches may be of greater concern to respondents, organizations should be aware that insider threats – whether malicious or accidental – can be the most damaging since those internal to the organization have access to the most sensitive information, particularly when they have high levels of privileged access.”

You can read more in the article, “Data Security Ranks In Top 3 In Security Concerns.”

The Challenge of Merging Enterprise Content Management With Mobile Content Management

Enterprises have to address content mobility in their enterprise content management strategies to properly manage this content. MCM offerings have to do more than just two-factor authentication as enterprise security needs become deeper. Overall strategies must look at and address the content, apps and devices, with attention tocontent version control, user access privileges, locking content and collaboration around the content.

So, while users can sign up for cloud storage services, IT should also ensure that content can be federated: stored in a secure, managed repository for security, compliance, long-term asset tracking and records management.

You can read the rest on Document Media in Your Content Is On The Move: Is It Secure?

Why The Shift To Information Governance

the sheer volume of content, the frequency of creation and the number of formats makes the application and execution of these traditional policies and processes difficult, hence the need to transform records management for information governance. Don’t get me wrong I’m not saying the records management policies or processes need to change, but more how we apply them to our content and ensure they are built-in to day to day processes without burdening the large proportion of staff who now have responsibility for records management without the records management training.

You can read more on the HP blog in “Information Governance: Transforming records management for information governance

Shining the Light of Compliance on Dark Data

Technology offers business users with “spell checking” in most authoring systems, and we expect that communications sent for business purposes will not have spelling mistakes. Compliance technology needs to bring this power and simplicity to the world of data protection and classification, with user-assisted tagging and automated classification. By repurposing these compliance systems to not only discover “dark data” for compliance purposes, but also for knowledge management and data discovery purposes, organizations will find they are effectively:

  • Lowering overall total cost of ownership
  • Enabling business self-service
  • Accelerating data access and collaboration capabilities
  • Adhering to compliance policies and mitigating data risks

For effective data management and collaboration to turn into a competitive advantage for the business, timely access to data as well as multi-directional communication flow — with the right risk management filters in place — is essential. This way, data is available whenever and wherever to those who need it, and unavailable to those who shouldn’t have access.

You can read more on CMS Wire in Dark Data As A Company Asset

The Six Figure Cost Savings of Digital Asset Management

Companies that use DAM systems to manage digital content recoup nearly $200,000 over a period of five years. Conversely, those that don’t are losing an average of $44,000 per year.

You can read the rest on Fierce Content Management in Infographic: Digital Asset Management Save Companies Thousands Every Year 


Get every new post delivered to your Inbox.

Join 448 other followers