SlideShare a Scribd company logo
1 of 18
Download to read offline
ISSA North Texas
October 2, 2015
Why Enterprise
Information Management
is the Key To GRC
Definition of GRC
GRC is a discipline that aims to synchronize
information and activity across governance,
risk management and compliance in order to
operate more efficiently, enable effective
information sharing, more effectively report
activities and avoid wasteful overlaps.
Why GRC Strategies Fail…
How can you have an Effective GRC Strategy when you have
an Information Silos Disconnect?
Let's Break it down…
Synchronize information and activity across GRC
WHY:
• In order to operate more efficiently
• enable effective information sharing
• more effectively report activities
• avoid wasteful overlaps
• Unstructured file based content
 Word documents
 Excel spreadsheets
 Images
 Videos and PDFs (Big Content)
The Information silo Disconnect
Structured data (Big Data) resides in various
business systems across the enterprise, such
as:
 CRM'S
 ERP's
 Project Mgt software
 Accounting
 HR
 Quality
The Information silo Disconnect
Traditional BI is for Structured Data
New possibilities
 Documents become an information asset to lead the business
Challenges
 BI tools work only against structured data
 Documents are unstructured but metadata is structured
 The new technologies enable structuring unstructured data in backend systems
 Collaboration
 Business processes are mostly customer-centric
 Processes must support the presence of subcontractors and partners
 Employees are mobile too
 Consumerization
 My own devices to workplace
 Mobile IT
BRIDGING THE GAP BETWEEN
CORE BUSINESS SYSTEMS AND CONTENT
STRUCTURED UNSTRUCTURED
CRMERP
CORE BUSINESS
INFORMATION OBJECTS
ProductPROJECT services
DOCS
IMAGES MEDIA
FROM UNSTRUCTURED TO STRUCTURED
M-Files structures all content, including documents - with
metadata
 Structured data is easier to find, visualize and analyze with BI tools
M-Files builds conceptual hierarchies between objects
automatically
 Connects Proposal to Customer Record to Agreement
M-Files shows all content in the same view
 Data (documents and structured data)
 Relationships between items
Native Mobile Apps
iPhone/iPad
Android
Windows Phone
Capture
Manage Workflows
Complete assignments remotely
Initiate digital signatures
Offline Access
MOBILE ACCESS
Empower your mobile workforce
v2
Install the apps now from:
No Folders, just metadata
Users do not save files to any folder
 They just describe the content with metadata
 The system lists the content in all relevant views (virtual folders) and users can
create new views at any time
Documents sorted by projects.
Documents sorted by customers.
Proposal.docx
MAGIC QUADRANT FOR ENTERPRISE
CONTENT MANAGEMENT
2012 & 2013
FORRESTER RESEARCH ECM WAVE
2013
DELOITTE TECHNOLOGY FAST 500 EMEA
- FINALIST 2010, 2011 & 2013
TREND-SETTING PRODUCT OF
THE YEAR
2012
CONTENT MANAGEMENT FOR
KNOWLEDGE WORKERS VENDOR
LANDSCAPE REPORT- ”MARKET PILLAR”
2012
100 GLOBAL FINALIST
2010
recognitionAND AWARDS
what if YOU COULD ACCESS ANYTHING
?AT ANY TIME
INSTANTLY
DYNAMICCONTENT MANAGEMENT
organized by
WHAT WHERESOMETHING IS IT'S BEEN STORED
vs
DOCUMENT TYPE
CUSTOMER
DATE
PERMISSIONS
PLAYLIST
ARTIST
GENRE
ALBUM
iPhoneit's as simple as an
Search results are ranked by
relevancy
How recently the document was
created
How many times the document has
been edited or updated
Search includes file metadata &
contents
Locates documents quickly no
matter how many items are in the
vault
Find Documents Instantly
integratingTHIRD PARTY SOFTWARE
M-FILES INTEGRATES WITH:
 Microsoft Dynamics
 Microsoft Sharepoint
 Microsoft Office
 SAP
 Oracle
 Salesforce
 NetSuite
 AutoCAD
 PSIGEN
THE M-FILES API CONNECTS TO
VIRTUALLY ANY DATABASE
we play niceWITH OTHERS
m-files.com
STAY IN TOUCH.
YOU CAN FIND US
let's
here
robyn.dixon@m-files.com
Robyn Dixon
Account Manager

More Related Content

What's hot

Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
DATAVERSITY
 
Data Governance for the Executive
Data Governance for the ExecutiveData Governance for the Executive
Data Governance for the Executive
DATAVERSITY
 
DAMA International Symposium San Diego CA 03-17-2008
DAMA International Symposium San Diego CA 03-17-2008DAMA International Symposium San Diego CA 03-17-2008
DAMA International Symposium San Diego CA 03-17-2008
Robert J. Abate, CBIP, CDMP
 

What's hot (20)

ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
 
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced AnalyticsADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
 
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
Slides: Beyond Metadata — Enrich Your Metadata Management with Deep-Level Dat...
 
RWDG Slides: Operationalize Data Governance for Business Outcomes
RWDG Slides: Operationalize Data Governance for Business OutcomesRWDG Slides: Operationalize Data Governance for Business Outcomes
RWDG Slides: Operationalize Data Governance for Business Outcomes
 
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...
Webinar: Decoding the Mystery - How to Know if You Need a Data Catalog, a Dat...
 
Convincing Stakeholders Data Governance Is Essential
Convincing Stakeholders Data Governance Is EssentialConvincing Stakeholders Data Governance Is Essential
Convincing Stakeholders Data Governance Is Essential
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
Data Architecture - The Foundation for Enterprise Architecture and Governance
Data Architecture - The Foundation for Enterprise Architecture and GovernanceData Architecture - The Foundation for Enterprise Architecture and Governance
Data Architecture - The Foundation for Enterprise Architecture and Governance
 
DMBOK - Chapter 1 Summary
DMBOK - Chapter 1 SummaryDMBOK - Chapter 1 Summary
DMBOK - Chapter 1 Summary
 
Data Governance Strategies - With Great Power Comes Great Accountability
Data Governance Strategies - With Great Power Comes Great AccountabilityData Governance Strategies - With Great Power Comes Great Accountability
Data Governance Strategies - With Great Power Comes Great Accountability
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best Practices
 
Data Quality Strategies
Data Quality StrategiesData Quality Strategies
Data Quality Strategies
 
Data Governance for the Executive
Data Governance for the ExecutiveData Governance for the Executive
Data Governance for the Executive
 
Data-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful Swan
Data-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful SwanData-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful Swan
Data-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful Swan
 
Slides: Data Governance Reality Check
Slides: Data Governance Reality CheckSlides: Data Governance Reality Check
Slides: Data Governance Reality Check
 
Data Management vs Data Strategy
Data Management vs Data StrategyData Management vs Data Strategy
Data Management vs Data Strategy
 
DAMA International Symposium San Diego CA 03-17-2008
DAMA International Symposium San Diego CA 03-17-2008DAMA International Symposium San Diego CA 03-17-2008
DAMA International Symposium San Diego CA 03-17-2008
 
ADV Slides: How to Improve Your Analytic Data Architecture Maturity
ADV Slides: How to Improve Your Analytic Data Architecture MaturityADV Slides: How to Improve Your Analytic Data Architecture Maturity
ADV Slides: How to Improve Your Analytic Data Architecture Maturity
 
RWDG Slides: Glossaries, Dictionaries, and Catalogs Result in Data Governance
RWDG Slides: Glossaries, Dictionaries, and Catalogs Result in Data GovernanceRWDG Slides: Glossaries, Dictionaries, and Catalogs Result in Data Governance
RWDG Slides: Glossaries, Dictionaries, and Catalogs Result in Data Governance
 
RWDG Slides: Stay Non-Invasive in Your Data Governance Approach
RWDG Slides: Stay Non-Invasive in Your Data Governance ApproachRWDG Slides: Stay Non-Invasive in Your Data Governance Approach
RWDG Slides: Stay Non-Invasive in Your Data Governance Approach
 

Similar to NTXISSACSC3 - Why Enterprise Information Management is the Key to GRC by Mika Javanainen

Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Zia Consulting
 
Impulser la digitalisation et modernisation de la fonction Finance grâce à la...
Impulser la digitalisation et modernisation de la fonction Finance grâce à la...Impulser la digitalisation et modernisation de la fonction Finance grâce à la...
Impulser la digitalisation et modernisation de la fonction Finance grâce à la...
Denodo
 
IP&A109 Next-Generation Analytics Architecture for the Year 2020
IP&A109 Next-Generation Analytics Architecture for the Year 2020IP&A109 Next-Generation Analytics Architecture for the Year 2020
IP&A109 Next-Generation Analytics Architecture for the Year 2020
Anjan Roy, PMP
 
Lotus Strategy 2008
Lotus Strategy 2008Lotus Strategy 2008
Lotus Strategy 2008
Ofer Guetta
 
Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)
Nathan Bijnens
 

Similar to NTXISSACSC3 - Why Enterprise Information Management is the Key to GRC by Mika Javanainen (20)

Making Informed Business Decisions with an Enterprise Information Management ...
Making Informed Business Decisions with an Enterprise Information Management ...Making Informed Business Decisions with an Enterprise Information Management ...
Making Informed Business Decisions with an Enterprise Information Management ...
 
Down to Business: Taking Action Quickly with Linked Data Services
Down to Business: Taking Action Quickly with Linked Data ServicesDown to Business: Taking Action Quickly with Linked Data Services
Down to Business: Taking Action Quickly with Linked Data Services
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
 
Rethink Your 2021 Data Management Strategy with Data Virtualization (ASEAN)
Rethink Your 2021 Data Management Strategy with Data Virtualization (ASEAN)Rethink Your 2021 Data Management Strategy with Data Virtualization (ASEAN)
Rethink Your 2021 Data Management Strategy with Data Virtualization (ASEAN)
 
Data Virtualization: An Introduction
Data Virtualization: An IntroductionData Virtualization: An Introduction
Data Virtualization: An Introduction
 
SharePoint Securely Moblized - webinar with Colligo and Bitzer Mobile
SharePoint Securely Moblized - webinar with Colligo and Bitzer MobileSharePoint Securely Moblized - webinar with Colligo and Bitzer Mobile
SharePoint Securely Moblized - webinar with Colligo and Bitzer Mobile
 
Impulser la digitalisation et modernisation de la fonction Finance grâce à la...
Impulser la digitalisation et modernisation de la fonction Finance grâce à la...Impulser la digitalisation et modernisation de la fonction Finance grâce à la...
Impulser la digitalisation et modernisation de la fonction Finance grâce à la...
 
Laserfiche Empower 2017 information managementaas
Laserfiche Empower 2017 information managementaasLaserfiche Empower 2017 information managementaas
Laserfiche Empower 2017 information managementaas
 
Organising the Data Lake - Information Management in a Big Data World
Organising the Data Lake - Information Management in a Big Data WorldOrganising the Data Lake - Information Management in a Big Data World
Organising the Data Lake - Information Management in a Big Data World
 
NYC Sem Web Meetup 20090219
NYC Sem Web Meetup 20090219NYC Sem Web Meetup 20090219
NYC Sem Web Meetup 20090219
 
IP&A109 Next-Generation Analytics Architecture for the Year 2020
IP&A109 Next-Generation Analytics Architecture for the Year 2020IP&A109 Next-Generation Analytics Architecture for the Year 2020
IP&A109 Next-Generation Analytics Architecture for the Year 2020
 
Creating an Exceptional Customer Experience with Master Data Management and B...
Creating an Exceptional Customer Experience with Master Data Management and B...Creating an Exceptional Customer Experience with Master Data Management and B...
Creating an Exceptional Customer Experience with Master Data Management and B...
 
Business analytics tool power bi
Business analytics tool power biBusiness analytics tool power bi
Business analytics tool power bi
 
DataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder AtwalDataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
 
Latest trends in Business Analytics
Latest trends in Business AnalyticsLatest trends in Business Analytics
Latest trends in Business Analytics
 
Huddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File SyncHuddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File Sync
 
meta360 - enterprise data governance and metadata management
meta360 - enterprise data governance and metadata managementmeta360 - enterprise data governance and metadata management
meta360 - enterprise data governance and metadata management
 
Cognos BI Training Orientation
Cognos BI Training Orientation Cognos BI Training Orientation
Cognos BI Training Orientation
 
Lotus Strategy 2008
Lotus Strategy 2008Lotus Strategy 2008
Lotus Strategy 2008
 
Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)Data Mesh in Azure using Cloud Scale Analytics (WAF)
Data Mesh in Azure using Cloud Scale Analytics (WAF)
 

More from North Texas Chapter of the ISSA

Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
North Texas Chapter of the ISSA
 

More from North Texas Chapter of the ISSA (20)

Purple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcuttPurple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcutt
 
Ntxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cepNtxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cep
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
 
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5  gold 1 mimecast e mail resiliencyNtxissacsc5  gold 1 mimecast e mail resiliency
Ntxissacsc5 gold 1 mimecast e mail resiliency
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
 
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersenNtxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
 
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykesNtxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
 
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompsonNtxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompson
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florerNtxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
 
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
 
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_muellerNtxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

NTXISSACSC3 - Why Enterprise Information Management is the Key to GRC by Mika Javanainen

  • 1. ISSA North Texas October 2, 2015 Why Enterprise Information Management is the Key To GRC
  • 2. Definition of GRC GRC is a discipline that aims to synchronize information and activity across governance, risk management and compliance in order to operate more efficiently, enable effective information sharing, more effectively report activities and avoid wasteful overlaps.
  • 3. Why GRC Strategies Fail… How can you have an Effective GRC Strategy when you have an Information Silos Disconnect? Let's Break it down… Synchronize information and activity across GRC WHY: • In order to operate more efficiently • enable effective information sharing • more effectively report activities • avoid wasteful overlaps
  • 4. • Unstructured file based content  Word documents  Excel spreadsheets  Images  Videos and PDFs (Big Content) The Information silo Disconnect
  • 5. Structured data (Big Data) resides in various business systems across the enterprise, such as:  CRM'S  ERP's  Project Mgt software  Accounting  HR  Quality The Information silo Disconnect
  • 6. Traditional BI is for Structured Data New possibilities  Documents become an information asset to lead the business Challenges  BI tools work only against structured data  Documents are unstructured but metadata is structured  The new technologies enable structuring unstructured data in backend systems  Collaboration  Business processes are mostly customer-centric  Processes must support the presence of subcontractors and partners  Employees are mobile too  Consumerization  My own devices to workplace  Mobile IT
  • 7. BRIDGING THE GAP BETWEEN CORE BUSINESS SYSTEMS AND CONTENT STRUCTURED UNSTRUCTURED CRMERP CORE BUSINESS INFORMATION OBJECTS ProductPROJECT services DOCS IMAGES MEDIA
  • 8.
  • 9. FROM UNSTRUCTURED TO STRUCTURED M-Files structures all content, including documents - with metadata  Structured data is easier to find, visualize and analyze with BI tools M-Files builds conceptual hierarchies between objects automatically  Connects Proposal to Customer Record to Agreement M-Files shows all content in the same view  Data (documents and structured data)  Relationships between items
  • 10. Native Mobile Apps iPhone/iPad Android Windows Phone Capture Manage Workflows Complete assignments remotely Initiate digital signatures Offline Access MOBILE ACCESS Empower your mobile workforce v2 Install the apps now from:
  • 11. No Folders, just metadata Users do not save files to any folder  They just describe the content with metadata  The system lists the content in all relevant views (virtual folders) and users can create new views at any time Documents sorted by projects. Documents sorted by customers. Proposal.docx
  • 12. MAGIC QUADRANT FOR ENTERPRISE CONTENT MANAGEMENT 2012 & 2013 FORRESTER RESEARCH ECM WAVE 2013 DELOITTE TECHNOLOGY FAST 500 EMEA - FINALIST 2010, 2011 & 2013 TREND-SETTING PRODUCT OF THE YEAR 2012 CONTENT MANAGEMENT FOR KNOWLEDGE WORKERS VENDOR LANDSCAPE REPORT- ”MARKET PILLAR” 2012 100 GLOBAL FINALIST 2010 recognitionAND AWARDS
  • 13. what if YOU COULD ACCESS ANYTHING ?AT ANY TIME INSTANTLY
  • 14. DYNAMICCONTENT MANAGEMENT organized by WHAT WHERESOMETHING IS IT'S BEEN STORED vs DOCUMENT TYPE CUSTOMER DATE PERMISSIONS
  • 16. Search results are ranked by relevancy How recently the document was created How many times the document has been edited or updated Search includes file metadata & contents Locates documents quickly no matter how many items are in the vault Find Documents Instantly
  • 17. integratingTHIRD PARTY SOFTWARE M-FILES INTEGRATES WITH:  Microsoft Dynamics  Microsoft Sharepoint  Microsoft Office  SAP  Oracle  Salesforce  NetSuite  AutoCAD  PSIGEN THE M-FILES API CONNECTS TO VIRTUALLY ANY DATABASE we play niceWITH OTHERS
  • 18. m-files.com STAY IN TOUCH. YOU CAN FIND US let's here robyn.dixon@m-files.com Robyn Dixon Account Manager