Well it has been very, very busy here at Open World and i've not been able to get my blogs written as fast as I would like and I resisted the urge to write rubbish into the pages in a desperate attempt to get content up. The DEMOgrounds have also been very busy, quite a lot of people have been making the association with the True Delete demonstration inside Beehive with the Oracle IRM technology that drives the functionality. I'm just getting chance now to spare an hour and put up some of what we've captured during the past few days.
On Tuesday I sat through Thomas Kurian's keynote speech. Thomas is the senior vice president of Oracle Fusion Middleware, the technology organization Oracle IRM is aligned with. His presentation covered information integration using Oracle Data Integrator, business intelligence, performance management and then onto content management (ECM and related technologies) and collaboration (Portals and technologies from the BEA acquisition). This space is now under the new category of Enterprise 2.0, and we will be seeing a lot more activity in this space from Oracle over the coming year. Oracle IRM is the E2.0 technology which will provide security for your content, no matter where it came from (database, application, portal) when stored in documents and emails, no matter where they reside.
"Oracle IRM enforces security permissions on documents, even when they've been sent out of the repository."
Thomas Kurian, SVP Oracle Fusion Middleware
With regards to content management, Thomas's main message was of the ability to "Capture, Store, Manage, and Secure
all forms of Content". Security is my key focus here and Thomas led into content security with Oracle's Secure Enterprise Search
. This technology, combining your access rights from the identitiy management system, allows for the ability to search across the enterprise returning only information to which the user legitimately has access. SES is now integrated into the content management system and is being integrated with many of the middleware technologies.
A natural progression from this is, if you can only search for content to which you have rights, security should also apply when you actually attempt to open that information. I'll let Thomas, in his words, describe how IRM fits in...
"Documents live within the repository for very short periods of time, most people take a document that's checked into the repository where it is secure, download it, attach it to email and send it to other people. Oracle IRM enforces security permissions on documents, even when they've been sent out of the repository. So only authorized people can see documents no matter where they access the information from..."
This highlights a very important point, if you use an encryption technology, such as IRM, to protect your most valuable content, you MUST also allow for authorized users to be able to use full text search methods
to find the information whilst it is still encrypted. Oracle IRM is the only technology
which exposes this ability and has been integrated not only with the content management repositories but also with the Windows Explorer on your desktop.
And following all of this, was once again, the message that these technologies are all integrated into Oracle BeeHive as well as other Oracle applications such as Siebel. Even more great exposure for Oracle IRM during OpenWorld, i'll be getting the chance to speak with the VP of IRM Development, Ryan Carroll, later on this week... watch this space (umm blog).