Definition

content-based security (asset-based security)

Contributor(s): Nathan Lamb and Lauren Horwitz

Content-based security, also known as asset-based security, is a gerneral term for security features that are embedded within enterprise content. Content-based security is a departure from traditional enterprise content management security measures that focus on restricting access to a static repository or network, or on securing specific devices or applications. Specific content-based security features include restricting who can open, email, print or edit a piece of content and placing a time limit on how long a user can access a given piece of content. Content can expire from a given repository and no longer be viewable by anyone.

Content-based security enables custodians of enterprise information to define and control the scope of actions available for users handling content (such as business records or documents), regardless of the physical location of the content in question. This can be useful for organizations that extensively use cloud computing and enterprise mobility technologies that take company information outside the enterprise firewall.

The increasing prevalence of smartphones and cloud technologies are two key drivers behind the increased demand for content-based security features. While users are now able to access content from remote locations because of the cloud and mobile, that ease of access has opened new doors for data breaches. Locking down data at the content level enables workers to access information from remote locations while having security controls reside within the content itself, rather than on a device or in a content repository.

This was last updated in February 2016

Continue Reading About content-based security (asset-based security)

Dig Deeper on Cloud-SaaS content management (ECM)

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

How does content-based security fit within your company's information governance strategy?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchBusinessAnalytics

SearchDataManagement

SearchERP

SearchOracle

SearchSAP

SearchSQLServer

Close