skip to main content
Close Icon

In order to deliver a personalized, responsive service and to improve the site, we remember and store information about how you use it. This is done using simple text files called cookies which sit on your computer. By continuing to use this site and access its features, you are consenting to our use of cookies. To find out more about the way Informa uses cookies please go to our Cookie Policy page.

Global Search Configuration

Introduction

When implementing ECM there is no one size fits all. There are a large number of vendors that offer ECM, some providing the full range of technologies, while others specialize on subsets of products.

Highlights

  • ECM has gone through a huge evolution over the past few years, both in terms of the range of technologies that are available, and also the way in which content is delivered.

Features and Benefits

  • Assesses the main features of the core ECM technologies that are expected to be in an ECM portfolio.
  • Learn about the benefits organizations should be getting from ECM platforms.

Key questions answered

  • What are the features that organizations should ensure are in an ECM platform?
  • What type of ECM platform should my organization deploy?

Table of contents

Summary

  • Catalyst
  • Ovum view
  • Key messages

Recommendations

  • Recommendations for enterprises
  • Recommendations for vendors

Content of the report

  • Finding the section most relevant to your organization

ECM execution and business models

  • Ensure that delivery to mobile devices is a core part of the solution's capabilities
  • Exploit enterprise social network capabilities within an ECM solution
  • There are a confusing array of choices available when deciding on an ECM platform

Document management and collaboration

  • Document management is often provided as library services
  • Most document management processes require some degree of collaboration

Records management

  • Organizations should implement records management before they are fined for noncompliance
  • Wherever possible, RM should be invisible to end users

File sync and share

  • File sync and share should be considered for secure access to content

Information rights management

  • Organizations cannot rely solely on access rights and permissions to protect content
  • Organizations need to consider the full lifecycle, and life span, of information
  • Audit logs show all authorized and unauthorized attempts to access content

Search

  • ECM users need enterprise search
  • Content needs to be accurately classified in order to make it searchable
  • Indexing improves searchability

Appendix

  • Methodology
  • Further reading
  • Author

Recommended Articles

;

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700


Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

+44 (0) 207 551 9047 - Operational from 09.00 - 17.00 UK time

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Call us at +44 7770704398 or email us at pr@ovum.com

Contact marketing - marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now