You are here

Share

How to Protect Workflows When They Cross Enterprise Boundaries

Posted by Andy Feit
How to Protect Workflows When They Cross Enterprise Boundaries

This article originally appeared on CMSWire.

Back in the day, content-driven workflows were easy. Your collaborators were all part of your organization and editing rights were determined by a user’s application credentials or LDAP profile. 

The people involved in your business workflow had a secure local connection to your network, or came in using a VPN while remote. If roles changed or users left the company, their accounts were deleted and they could no longer access the information. 

It was a simpler time.

Today, by contrast, it is common practice to provide non-employees involved in your core business processes with access to content, including highly sensitive information. So, the challenge becomes providing access to multiple outside parties without compromising information security and availability — and without stretching your IT department’s resources and budget too thin...


Click here to continue reading

This article originally appeared on CMSWire.