1. Knowing your business performance and planning ahead —Users dealing with objectively slow content retrieval are ill-equipped to perform optimally. Managing and under- standing the transaction times for processing payments and loan documents, accessing design specifications, and viewing lab reports are critical for business. User response time, of course, impacts service-level agreements (SLAs). Knowing real user response time with document context allows organizations to identify and resolve service-level issues.
2. Dramatically reducing MTTD (mean time to detection)— Proper insight into the ECM system and user activity allows for quicker identification of issues. The ability to have a snapshot of the ECM user, repository, and infrastructure when a threshold is passed dramatically reduces the time of an investigation.
3. Insider threat detection—One of the most significant security challenges modern organizations face is insider threats and identifying the location of malicious activity. Understanding whether documents are being improperly accessed, how users consume them, and whether irregular login patterns are occurring is essential for high-value regulated content.
Conclusion
Obtaining contextual knowledge about how users create and interact with unstructured data is an essential business practice to plan for data storms effectively. Enterprises need to understand that it’s not enough to know these user activities but also must take remediation action when necessary.
Turning to standard web application monitoring tools to understand web transactions at the HTTP protocol level will not provide the needed context. What is needed is deep ECM business transaction visibility, understanding, and management. This insight drives better storage decisions when managing unstructured content. The user activity data gathered also fuels license management and chargeback capabilities, providing comprehensive insight into user activity with context.