socialware overview with screenshots
TRANSCRIPT
© Copyright Socialware, Inc. Proprietary and Confidential
PRESENTER
Cuyler Owens, Sales Director
© Copyright Socialware, Inc. Proprietary and Confidential 2
52%
Online Social Technologies Drive Measurable Benefit
INCREASE
MARKETING
EFFECTIVENESS
43%INCREASE
CUSTOMER
SATISFACTION 38%DECREASE
MARKETING COST
32%REDUCTION
SUPPORTING COSTS
Source: McKinsey & Company, How Companies are Benefiting from Web 2.0, June 2009
© Copyright Socialware, Inc. Proprietary and Confidential 3
Enterprise typically manage access one of two ways
61%WRITTEN
POLICIES
54%BLOCK
ACCESS
INDUSTRY
GAP
Source: Deloitte, Social networking & reputational risk in the workplace, 2009, Robert Half Technology, 2009
© Copyright Socialware, Inc. Proprietary and Confidential 4
Social Middleware bridges the gap
PROCESS
SYSTEMSPEOPLE
SOCIAL MIDDLEWARE
Social Media Applications
Enterprise
© Copyright Socialware, Inc. Proprietary and Confidential 5
Socialware platform and business applications
PROCESS
SYSTEMSPEOPLE
RISK MANAGER | SOCIAL MARKETER | COLLABORATOR
SECURITY CONTROL REPORTING INTEGRATION
Enterprise
© Copyright Socialware, Inc. Proprietary and Confidential 6
Social media is a new channel, not new content
INDUSTRY
REGULATORS
“You have to find a way to supervise this activity”
– FINRA
Instant Messages
eDocuments
Social Media Posts
Web Sites
Sales Literature
Videos
Photos
CONTENT
TYPES
© Copyright Socialware, Inc. Proprietary and Confidential 7
Socialware: Risk Manager
FEATURE LEVEL
ACCESS CONTROL
eDISCOVERY
WORKFLOW
MODERATION
ARCHIVE MESSAGES
& META DATARISK MANAGER
Monitor, route & archive enterprise social messages
© Copyright Socialware, Inc. Proprietary and Confidential 8
Feature Level Access Contol – Admin View
© Copyright Socialware, Inc. Proprietary and Confidential 9
LinkedIn feature level access control – user experience
© Copyright Socialware, Inc. Proprietary and Confidential 10
Twitter Moderation Workflow – user experience
© Copyright Socialware, Inc. Proprietary and Confidential 11
Moderation Workflow – Admin View
© Copyright Socialware, Inc. Proprietary and Confidential 12
Archiving and Discovery – Only Viewed by administrator
© Copyright Socialware, Inc. Proprietary and Confidential 13
Capitalize on social in a secure & compliant manner
Cost avoidance
> Compliance fines
> Discovery costs
> Data leakage
Increased productivity
> Automated data retention
> Automated moderation
Increased revenue
> Increased marketing reach
> Improved customer service
> Increased sales
FEATURE LEVEL
ACCESS CONTROL
eDISCOVERY
WORKFLOW
MODERATION
ARCHIVE MESSAGES
& META DATARISK MANAGER
© Copyright Socialware, Inc. Proprietary and Confidential 14
Socialware: Social Marketer
Tag, embed & optimize your social messages
© Copyright Socialware, Inc. Proprietary and Confidential 15
Example Social Marketer implementation
© Copyright Socialware, Inc. Proprietary and Confidential 16
Multiply the value of your social investment
Increased engagement
> Increased time-on-site
> Increased word-of-mouth
Increased traffic
> Increased fresh content
> Improved page rank
Increased revenue
> Increased marketing reach
> Improved customer service
> Increased sales
© Copyright Socialware, Inc. Proprietary and Confidential 17
Socialware: Collaborator
Communicate privately & securely on social networks
© Copyright Socialware, Inc. Proprietary and Confidential 18
Twitter Collaboration message/Private internal message
© Copyright Socialware, Inc. Proprietary and Confidential 19
Communication & collaboration that works
Improved communication
> Increased knowledge mgmt.
> Improved collaboration
> Increased productivity
Decreased costs
> Hardware/software
> Customization
> Training
© Copyright Socialware, Inc. Proprietary and Confidential 20
Customer Success Manager
Tap our experience to ensure social media success
© Copyright Socialware, Inc. Proprietary and Confidential 21
Enterprise
ACTIVE DIRECTORY
eDISCOVERY
DLP SYSTEM
VPN
SERVER
ENTERPRISE
PROXY
Flexible implementation and management
1
23
41. Social network requests routed
through enterprise proxy
2. Direct integration for access control, DLP, eDiscovery, etc
3. Off network devices routed through enterprise proxy or directly through Socialware
4. Socialware hosted service provides for greatest implementation flexibility
© Copyright Socialware, Inc. Proprietary and Confidential 22
Deployment timeline, approach
1-2 WEEKS 1-2 WEEKS
ApplicationProvisioning
User Setup
ProxyConfiguration
*SystemIntegration(as needed)
PolicyConfiguration
AdministrativeTraining
Go Live
MeasureImpact
© Copyright Socialware, Inc. Proprietary and Confidential 23
Summary & next steps
Assess your current situation
> What is the opportunity cost from not leveraging these tools?
> How will you manage the process to ensure security & compliance?
> What are the risks of opening access and how will you manage them?
> How else would you use these social tools if you had social middleware?
What is the desired timing around engaging with social media?
Which groups will get access?
How will you use it?