Using a five-step process, this tool will assist you in creating a comprehensive roadmap that will address improvement opportunities and realize your visions for the...
|
|
Use this tool to conduct a content audit as part of your ECM strategy. The content audit will prepare you for the next stages of your information architecture planning:...
|
|
Use the ECM Information Governance Policy Templates when executing policies for site design, taxonomy and naming, metadata, folksonomy, content asset design,...
|
|
Use this tool to document sources of change and identify approaches to change management for change initiatives relating to each ECM capability when building your ECM roadmap.
|
|
The purpose of this template is to assist in the creation of your ECM capability governance charter. The template will help you identify and define the capability...
|
|
Ensure proper project management and stakeholder support from the start of your project by properly planning and scoping your identity and access management solution.
|
|
This tool asks a series of targeted questions that will help you determine the use-case scenarios that align with your organization's specific requirements for identity...
|
|
This tool allows enterprises to profile their identity and access management requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors.
|
|
A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...
|
|
A key component of any evaluation is a request for proposal (RFP). Gathering and scoring the various responses to an RFP can be difficult and time consuming. This tool...
|
|