socialware overview with screenshots

Post on 14-Jul-2015

283 Views

Category:

Business

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

© Copyright Socialware, Inc. Proprietary and Confidential

PRESENTER

Cuyler Owens, Sales Director

© Copyright Socialware, Inc. Proprietary and Confidential 2

52%

Online Social Technologies Drive Measurable Benefit

INCREASE

MARKETING

EFFECTIVENESS

43%INCREASE

CUSTOMER

SATISFACTION 38%DECREASE

MARKETING COST

32%REDUCTION

SUPPORTING COSTS

Source: McKinsey & Company, How Companies are Benefiting from Web 2.0, June 2009

© Copyright Socialware, Inc. Proprietary and Confidential 3

Enterprise typically manage access one of two ways

61%WRITTEN

POLICIES

54%BLOCK

ACCESS

INDUSTRY

GAP

Source: Deloitte, Social networking & reputational risk in the workplace, 2009, Robert Half Technology, 2009

© Copyright Socialware, Inc. Proprietary and Confidential 4

Social Middleware bridges the gap

PROCESS

SYSTEMSPEOPLE

SOCIAL MIDDLEWARE

Social Media Applications

Enterprise

© Copyright Socialware, Inc. Proprietary and Confidential 5

Socialware platform and business applications

PROCESS

SYSTEMSPEOPLE

RISK MANAGER | SOCIAL MARKETER | COLLABORATOR

SECURITY CONTROL REPORTING INTEGRATION

Enterprise

© Copyright Socialware, Inc. Proprietary and Confidential 6

Social media is a new channel, not new content

INDUSTRY

REGULATORS

“You have to find a way to supervise this activity”

– FINRA

Email

Instant Messages

eDocuments

Social Media Posts

Web Sites

Sales Literature

Videos

Photos

CONTENT

TYPES

© Copyright Socialware, Inc. Proprietary and Confidential 7

Socialware: Risk Manager

FEATURE LEVEL

ACCESS CONTROL

eDISCOVERY

WORKFLOW

MODERATION

ARCHIVE MESSAGES

& META DATARISK MANAGER

Monitor, route & archive enterprise social messages

© Copyright Socialware, Inc. Proprietary and Confidential 8

Feature Level Access Contol – Admin View

© Copyright Socialware, Inc. Proprietary and Confidential 9

LinkedIn feature level access control – user experience

© Copyright Socialware, Inc. Proprietary and Confidential 10

Twitter Moderation Workflow – user experience

© Copyright Socialware, Inc. Proprietary and Confidential 11

Moderation Workflow – Admin View

© Copyright Socialware, Inc. Proprietary and Confidential 12

Archiving and Discovery – Only Viewed by administrator

© Copyright Socialware, Inc. Proprietary and Confidential 13

Capitalize on social in a secure & compliant manner

Cost avoidance

> Compliance fines

> Discovery costs

> Data leakage

Increased productivity

> Automated data retention

> Automated moderation

Increased revenue

> Increased marketing reach

> Improved customer service

> Increased sales

FEATURE LEVEL

ACCESS CONTROL

eDISCOVERY

WORKFLOW

MODERATION

ARCHIVE MESSAGES

& META DATARISK MANAGER

© Copyright Socialware, Inc. Proprietary and Confidential 14

Socialware: Social Marketer

Tag, embed & optimize your social messages

© Copyright Socialware, Inc. Proprietary and Confidential 15

Example Social Marketer implementation

© Copyright Socialware, Inc. Proprietary and Confidential 16

Multiply the value of your social investment

Increased engagement

> Increased time-on-site

> Increased word-of-mouth

Increased traffic

> Increased fresh content

> Improved page rank

Increased revenue

> Increased marketing reach

> Improved customer service

> Increased sales

© Copyright Socialware, Inc. Proprietary and Confidential 17

Socialware: Collaborator

Communicate privately & securely on social networks

© Copyright Socialware, Inc. Proprietary and Confidential 18

Twitter Collaboration message/Private internal message

© Copyright Socialware, Inc. Proprietary and Confidential 19

Communication & collaboration that works

Improved communication

> Increased knowledge mgmt.

> Improved collaboration

> Increased productivity

Decreased costs

> Hardware/software

> Customization

> Training

© Copyright Socialware, Inc. Proprietary and Confidential 20

Customer Success Manager

Tap our experience to ensure social media success

© Copyright Socialware, Inc. Proprietary and Confidential 21

Enterprise

ACTIVE DIRECTORY

eDISCOVERY

DLP SYSTEM

VPN

SERVER

ENTERPRISE

PROXY

Flexible implementation and management

1

23

41. Social network requests routed

through enterprise proxy

2. Direct integration for access control, DLP, eDiscovery, etc

3. Off network devices routed through enterprise proxy or directly through Socialware

4. Socialware hosted service provides for greatest implementation flexibility

© Copyright Socialware, Inc. Proprietary and Confidential 22

Deployment timeline, approach

1-2 WEEKS 1-2 WEEKS

ApplicationProvisioning

User Setup

ProxyConfiguration

*SystemIntegration(as needed)

PolicyConfiguration

AdministrativeTraining

Go Live

MeasureImpact

© Copyright Socialware, Inc. Proprietary and Confidential 23

Summary & next steps

Assess your current situation

> What is the opportunity cost from not leveraging these tools?

> How will you manage the process to ensure security & compliance?

> What are the risks of opening access and how will you manage them?

> How else would you use these social tools if you had social middleware?

What is the desired timing around engaging with social media?

Which groups will get access?

How will you use it?

top related