Professional Documents
Culture Documents
Content Manager
ControlPoint Software
Structured Data Manager (SDM)
Global Regulations are Driving spreadsheets and documents that may be left The Challenge of Balancing
Complex Requirements ungoverned in less secure environments such Collaboration and Compliance
With an increasing number of publicized data as SharePoint sites, files shares and exchange In addition to the challenges of identifying and
breaches for organizations around the world, must be identified, analyzed and protected to protecting sensitive information, you need to
information security and data privacy are rap- reduce risk of loss or theft. balance the requirements of compliance with
idly growing priorities. The complexity of ad- your business goals around productivity and
dressing these needs has increased with the Difficulties in Addressing Data efficient collaboration. Today most organiza-
creation of global regulations such as GDPR Privacy Regulations tions (not just highly regulated industry) have
that require compliance across multiple juris- Sensitive and confidential information can compliance as a high priority. While they need
dictions and many types of content. reside in many different business systems in- to put essential systems and processes in
cluding; databases for HR, Finance, Customer place to protect and govern their data they
The risk of exposing sensitive data increases and Sales as well as file shares, SharePoint also need to improve productivity, collabora-
when applications are retired, databases are sites and email servers. These systems don’t tion and efficiency to grow their business in
duplicated for development and training envi- have to be active either, they may be retired ap- an increasingly competitive market. It’s easy
ronments or SharePoint sites and File Shares plications or abandoned SharePoint sites. The to forget collaboration extends well beyond
are abandoned at the conclusion of a proj- problem is, if you don’t know what information the ability to work simultaneously on a docu-
ect. For retired applications with no suitable resides in these systems and you don’t have ment. Efficient and effective collaboration is
upgrade or migration path, this inactive but the tools to identify PII, PCI, PHI and corpo- dependent on staff having access to the right
sensitive data often needs to be maintained rate records you run the very real risk of this content, in context when and where they need
for regulatory and business continuity reasons information being exposed, lost or stolen and it. You need to have tools that facilitate the
so must be secure, accessible and usable. your organization being in breach of various governance, protection and authorized shar-
Similarly unstructured content such as email, regulations including privacy. ing of content without negatively impacting the
Solution Flyer
Reduce Risk and Protect Privacy Across Enterprise Systems
2
Redundant, Obsolete and Trivial (ROT) Lower data security and privacy risks
with data identification, masking, access
controls, redaction and defensible disposal
Apply policy to manage in place
Manage-in-place Reduce the cost of managing applications
Declare content and and data by
Active system File Analysis records
repositories— Connect Identify Analyze Auto classify – Removing the need for legacy
unstructured Categorize Policy applications to provide secure access
data Curate Enterprise
Content
Security and reporting on data
Redaction Defensibly
Identify PII, PCI, PHI Management dispose – Simplifying the process for reporting
Lifecycle— Encryption
management across archived data
Intelligent Authorized access
Legacy Structured Data archiving
Management
Validate Reporting – Centralizing control and access to
databases— Extract data
structured App retirement Audit logs archived data
Data extraction
data Data masking Reduce the cost and complexity of
Legacy data and ROT
securely managing unstructured content
with automation and integration
Figure 2. Secure Content Management components. In simple terms the Secure Content Management
suite allows you to get control, enhance com-
Both the structured and unstructured data is Authorized access, reporting and ongoing use of pliance, improve productivity and lower cost for
managed by Content Manager (governance- content from business applications such as MS structured and unstructured content in both
based enterprise content management), in a Outlook and SharePoint/O365 and database active and inactive systems.
unified and policy driven manner across the applications such as PeopleSoft and SAP ERP
lifecycle to facilitate authorized access, re-use is managed in a uniform manner with reduced Learn More At
and reporting. To optimize system performance risk, complexity and cost. microfocus.com/securecontent
and infrastructure costs, redundant, obsolete
and trivial (ROT) data is defensibly disposed Secure Content Management can help you:
while storage is tiered and the remaining Preserve data and security through
content allocated according to its value and application retirement
activity levels.
Balance requirements for collaboration,
productivity, security and privacy at a
What are the Advantages of Secure
lower total cost by leveraging existing
Content Management? investments through
Secure Content Management suite helps you
balance the requirements for collaboration and – Interoperability with business systems
productivity with information security, privacy – Integration with MS SharePoint/O365
and compliance across enterprise systems. – Automation
www.microfocus.com 3
www.microfocus.com
Micro Focus
UK Headquarters
United Kingdom
+44 (0) 1635 565200
U.S. Headquarters
Rockville, Maryland
301 838 5000
877 772 4450
361-000010-001 | 4AA6-8608 | H | 10/17 | © 2017 Micro Focus. All rights reserved. Micro Focus and the Micro Focus logo, among others, are trademarks or
registered trademarks of Micro Focus or its subsidiaries or affiliated companies in the United Kingdom, United States and other countries. All other marks are the property of
their respective owners.