Securing content and access with smart management techniques

Balance content access with security and ID management

On one hand, content management executives have the tough task of evangelizing to an organization's employees what content resources are available to support their daily work, where they are, how to access them and why they should be used. That's a tall task, considering front-liners, marketing staff, sales and service are just some of the disparate user groups.

On the other hand, content management executives are also tasked with securing content. They're accountable to keep those assets, including intellectual property, marketing strategies and long-range plans, safe from the wrong people inside and outside the organization. It's an especially important task when some popular content management tools like WordPress are vulnerable to hacks.

It may be extremely difficult to find that sweet data-security spot among appropriate identity management, data encryption and login processes that keeps the bad guys out but creates open access so content is usable. It may even be impossible to resolve, especially when content is typically spread across self-hosted and cloud-based applications and services.

This handbook can help content managers tasked with accomplishing these seemingly conflicting goals by exploring best practices and discussing how concepts such as single sign-on can help simplify logins to numerous tools. Adding two-factor authentication can create a more secure environment without making it onerous for end users to the point where they create workarounds or skip using content assets.

Ultimately, each enterprise must find its own path when it comes to securing content. The blend of devices, number of users spread across geographies, on-premises vs. cloud storage, sensitivity and regulatory control required over the content must all be taken into account, as well as customer privacy. But with best practices as a guide, you can arrive at that complete custom plan more efficiently.