What is enterprise content management?

Drowning in digital assets? The right software can help you stay on top of your data

Enterprise content management may sound like a repackaging of a long-established business tool, the content management systems (CMS), but it’s not. A regular CMS is typically used to keep a website fresh. That means it’s all about what’s new: your audience is interested in what’s happening today, not yesterday. Enterprise content management (ECM) tackles the other end of the attention-span spectrum. It relates to storing items with a long, useful lifespan, or which need to be retained for regulation and reference reasons. This means it needs a different design philosophy – one that’s ready for the day in the far future when today’s trivial edit turns out to be the pivotal statement at the heart of a billion-dollar lawsuit.

Advertisement - Article continues below

ECM systems are used to manage more than standard text files. Modern company data can easily include videos, CAD pictures or even algorithms. One client I’ve worked with regularly handled drawings of oil tankers, as part of the documentation for a particular contract. Some digital assets might even exist solely in long-defunct file formats, which can only be accessed by maintaining a complete fossil operating system in a virtual machine – and yes, that too needs to be managed.

Related Resource

The future of EDI: an IBM point of view

Electronic Data Interchange is growing and maturing, and remains a backbone for global business

Download now

An unnecessary security risk?

If you’re worried about losing data, your enterprise repository ought to be read-only anyhow, and both you and your CMS provider ought to be keeping both backup and frozen-archive copies of everything. As for hacking, frankly most ECM systems are just too unwieldy for intruders to digest: if it’s big enough to be in this delivery platform, it’s going to be expensive to extract much value out of it.

Advertisement
Advertisement - Article continues below

The two are related. “Intelligent information management” means appraising your digital asset mass and being intelligent about what you get back out of it. Admittedly, that’s a can of worms these days, because while “intelligent” ought to mean transparent and auditable, many decision-makers are AI fans, and prefer their conclusions with a whiff of godlike inscrutability about them. Either way, you can think of ECM as the mechanism that feeds your IIM processes.

Advertisement - Article continues below

ECM doesn’t mean holding onto every scrap of data forever – even if Big Data advocates might suggest you should do that regardless. Most of the questions you’re likely to ask of an ECM system will in any case be time-limited – not by your reserve of cloud credit, but by market conditions, which tend not to last as long as the computers and databases that represent them. Smart asset management can call for an ice sculpture-type approach: shave away what you don’t want to expose what you do want. 

A tool for companies big and small

The question might not be how little your business is, but how digital it is – and who it transacts with, because that will leave a footprint in any number of external digital asset platforms. If you’re just starting out down the ECM path, perhaps the most important lesson comes from BT, which has a person in charge of saying “no” to data-search requests and the like that would be too onerous or time-consuming. Building such a role into your own plans could save you a lot of worry and expenditure in the future.

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement

Most Popular

Visit/operating-systems/ios/355935/apple-confirms-serious-bugs-in-ios-135
iOS

Apple confirms serious bugs in iOS 13.5

4 Jun 2020
Visit/security/ransomware/355945/new-ransomware-uses-java-to-target-software-organisations
ransomware

Tycoon ransomware discovered using Java image files to target software firms

5 Jun 2020
Visit/hardware/355904/picking-the-perfect-multifunction-printer
Hardware

Picking the perfect multifunction printer

4 Jun 2020