Page 18 - Cyber Warnings
P. 18







Another benefit of an ECM platform: built-in version control and workflow capabilities ensure
that employees have easy access to up-to-date information when they need it.

Employees don’t have to waste time searching for and reconciling multiple files and versions.
What’s more, these systems also provide audit trails and granular, metadata-driven access
controls that can help IT admins know who accessed what and when – and even block user
accounts, if needed.

ECM platforms can also be integrated with common identity providers, such as Active Directory
or Google Accounts.

Users get a convenient single sign-on experience and do not have to memorize a new user
name and password to yet another system.

Furthermore, IT departments can centrally enforce password policies, security groups, multi-
factor authentication and account lockout policies.

Companies today face diverse challenges and they must always be open to new ways to
become more efficient while balancing security considerations.

Given how droves of people continue to sign up for file-sharing sites, it’s clear that organizations
need a better, more proactive strategy for sharing information.

Modern ECM solutions can provide an easy, effective solution that balances flexible access with
greatly improved content security to simultaneously satisfy employees and ensure business
content is strictly controlled and protected.



About the Author


Mika Javanainen is Senior Director of Product Management at M-Files
Corporation. Javanainen is in charge of managing and developing M-Files
product portfolio, roadmaps and pricing globally.

Prior to his executive roles, Javanainen worked as a systems specialist,
where he integrated document management systems with ERP and CRM
applications.

A published author, Javanainen has an executive MBA in International Business and Marketing.
Follow Mika on Twitter at @mikajava and at the M-Files web site: https://www.m-files.com











18 Cyber Warnings E-Magazine February 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   13   14   15   16   17   18   19   20   21   22   23