Keeping Content Management in Check
One way of defining content management is the process of moving Web content through all phases, ultimately toward the production of an actual Web site. A centralized storage area holds materials that will be used to construct the site. A content management system ensures that all Web page content has been reviewed and approved before it is published. From a security standpoint, securing the content that enters and leaves the organization is essential to affirm that the organization has comprehensive coverage against inappropriate, malicious or viral content, and that it is in compliance with company security policies and privacy regulations. Luckily, there is a plethora of content management solutions (CMSs) available:
- Pilot CMS: This powerful content management system is available from Automatic Corp. With its user-friendly interface, Pilot CMS was developed to aid organizations in the process of creating, managing and delivering content-focused Web sites. Its key features include file and image repositories, asset and document management, a WYSIWYG XHRML editor and standards-based administrative interface. For more information, visit www.automaticlabs.com.
- Rhythmyx: Another content management solution, this one from Percussion Software Inc., manages Web content, documents, portals, digital assets and scanned images. Via their Rhythmyx FastForward feature sets, Rhythmyx allows your organization to put in place and use the functionality you require now with the added benefit of an extensible, standards-based architecture that can be used to meet the functionality you may require in the future. For more information, visit www.percussion.com/products/rhythmyx/index.htm.
- SAPID: If money is tight, your organization may wish to look into SAPID, which is available at no cost. SAPID is a content management solution for those developing and managing personal or subject Web sites. Easy to use and install, SAPID features drag-and-drop site structure management. Because of its XML Sapiens technology support, SAPID’s functionality is far-reaching. The SAPID package includes a gallery, guest book, survey and personification, in addition to RSS channels, news channels, and the ability to manage sites for HTML, Flash, WML and XML/XSL. For more information, visit sapid.sourceforge.net.
- Business Card Web Builder: BCWB is a WYSIWYG CMS for all manner of Web sites and small Web projects, including personal sites, visit cards, promo sites and VIP sites. This WCM system requires little from your system—not even a database presence because W3C XML/XSLT technology is applied in the system. A Web site assembled in BCWB presents in any form via XSLT full functionalities, including vector-graphical representation in SVG format. For more information, visit cmsdevelopment.com/bcwb_en/.
When content management becomes burdensome to your in-house staff, your organization may benefit by outsourcing this task. Management will have to decide exactly what content will remain under in-house control and what content will be outsourced. Most often, reference data is acceptable for outsourcing, while business-critical data—the data needed to run your business on a day-to-day basis—should be kept within the organization.
As with any outsourcing work, content management included, security risks must be kept to a minimum. Outside vendors are being entrusted to handle your organization’s content.
On the bright side, vendors are proving themselves worthy as they stand the test of time, providing their services to an ever-growing number of clients over a long period of time. Their specialization makes them an attractive alternative for the harried personnel of larger organizations, especially when these vendors often offer stronger security than what may already exist in-house. Finally, outsourcing of content management may be the best choice simply by virtue of expense: It reduces up-front capital costs and can be paid out of operating budgets as opposed to capital budgets.
Douglas Schweitzer, A+, Network+, i-Net+, CIW, is an Internet security specialist and the author of “Securing the Network From Malicious Code” and “Incident Response: Computer Forensics Toolkit.” He can be reached at firstname.lastname@example.org.