Professional Documents
Culture Documents
Seclore For IBM ECM
Seclore For IBM ECM
Seclore For IBM ECM
IBM ECM
Extending the security of IBM and governance to files travelling through These controls are applied on the file itself
public and partner networks, stored on the and are independent of the computer,
ECM beyond its perimeter cloud or file-sharing services, or accessed device, network, storage, or transmission
Documents stored within an IBM on mobile devices. technology used. The permissions are
Enterprise Content Management system completely dynamic: any change in the
are often highly confidential – ranging WHO can access the file? IBM ECM permissions is instantly applied
from invoices to Intellectual Property. User or Groups Within or Outside to all previously downloaded files as well.
User-specific access permissions can be the Organisation
defined on IBM ECM folders to mitigate
WHAT can they do with it?
security risks. However, what happens View, Edit, Print, Copy Content,
when files are checked out of ECM? And Take Screen Grabs, Work Offline
then shared outside your organizational
network to vendors or contractors? Or WHEN can they do it?
Automatic File Expiry, Date and
accessed on mobile devices?
Time Ranges, Number of Days
from First Access