Gartner: Shared-Services Can Cut Enterprise Content Management Costs

According to a new report from Gartner, organizations can cut their enterprise content management (ECM) costs by 10 percent to 20 percent by moving to a shared services model. The shared services approach is a model in which an enterprise purchases ECM functions centrally and governs the types of services offered, while granting users a degree of ownership. The report, "Use Shared Services to Control Enterprise Content Management Costs," states that the organization can offer the functions themselves or contract with a cloud-based service provider.

"Enterprises have long struggled with multiple ECM deployments which have, in turn, created information silos and caused enterprises to pay for separate sets of software licenses, maintenance and support skills for too many ECM vendors," said Mark Gilbert, research vice president at Gartner. "The troubled economy has forced many IT organizations to cut ECM costs, but traditional approaches to consolidating are slow, complex, and costly. The shared services--or ECM as a service--approach promises at least a partial solution."

Gilbert said the benefits of shared services include economies of scale, reuse of infrastructure, interoperability across the enterprise, speed of deployment, information sharing, and improved credibility for the IT organization among users and managers.

He also pointed out that the shared service approach has limitations, including an inability to integrate existing information silos or reduce expense for advanced ECM functions needed by individual departments.

The research company said shared services make sense if planners can identify basic functions that almost every department uses or needs--for example, secure repository services and content-centric workflows.

Gartner advised the IT organization and functional units to work together to implement shared services. It has identified five broad steps for implementation:

  1. Assess whether shared services make sense;
  2. Standardize on a single ECM product or vendor platform;
  3. Define packages of ECM functions, based on the specific needs of departments and the potential user base;
  4. Establish a governance model for service and support; and
  5. Form a competency center for ECM.

Additional details can be found here.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • data professionals in a meeting

    Data Fluency as a Strategic Imperative

    As an institution's highest level of data capabilities, data fluency taps into the agency of technical experts who work together with top-level institutional leadership on issues of strategic importance.

  • stylized AI code and a neural network symbol, paired with glitching code and a red warning triangle

    New Anthropic AI Models Demonstrate Coding Prowess, Behavior Risks

    Anthropic has released Claude Opus 4 and Claude Sonnet 4, its most advanced artificial intelligence models to date, boasting a significant leap in autonomous coding capabilities while simultaneously revealing troubling tendencies toward self-preservation that include attempted blackmail.

  • university building with classical architecture is partially overlaid by a glowing digital brain graphic

    NSF Invests $100 Million in National AI Research Institutes

    The National Science Foundation has announced a $100 million investment in National Artificial Intelligence Research Institutes, part of a broader White House strategy to maintain American leadership as competition with China intensifies.

  • black analog alarm clock sits in front of a digital background featuring a glowing padlock symbol and cybersecurity icons

    The Clock Is Ticking: Higher Education's Big Push Toward CMMC Compliance

    With the United States Department of Defense's Cybersecurity Maturity Model Certification 2.0 framework entering Phase II on Dec. 16, 2025, institutions must develop a cybersecurity posture that's resilient, defensible, and flexible enough to keep up with an evolving threat landscape.