2. 52% Online Social Technologies Drive Measurable Benefit 43% INCREASE INCREASE SUPPORTING COSTS MARKETING COST 32% 38% MARKETINGEFFECTIVENESS CUSTOMERSATISFACTION REDUCTION DECREASE Source: McKinsey & Company, How Companies are Benefiting from Web 2.0, June 2009
3. Enterprise typically manage access one of two ways 54% 61% BLOCKACCESS WRITTENPOLICIES INDUSTRYGAP Source: Deloitte, Social networking & reputational risk in the workplace, 2009, Robert Half Technology, 2009
4. Social Middleware bridges the gap Social Media Applications SOCIAL MIDDLEWARE SYSTEMS PEOPLE PROCESS Enterprise
5. Socialware platform and business applications RISK MANAGER | SOCIAL MARKETER | COLLABORATOR SECURITY CONTROL REPORTING INTEGRATION SYSTEMS PEOPLE PROCESS Enterprise
20. Capitalize on social in a secure & compliant manner Cost avoidance Compliance fines Discovery costs Data leakage Increased productivity Automated data retention Automated moderation Increased revenue Increased marketing reach Improved customer service Increased sales FEATURE LEVELACCESS CONTROL WORKFLOWMODERATION ARCHIVE MESSAGES& META DATA eDISCOVERY RISK MANAGER
26. Communication & collaboration that works Improved communication Increased knowledge mgmt. Improved collaboration Increased productivity Decreased costs Hardware/software Customization Training
28. Social network requests routed through enterprise proxy Direct integration for access control, DLP, eDiscovery, etc Off network devices routed through enterprise proxy or directly through Socialware Socialware hosted service provides for greatest implementation flexibility 4 2 3 VPNSERVER ENTERPRISEPROXY DLP SYSTEM 1 eDISCOVERY ACTIVE DIRECTORY Enterprise Flexible implementation and management
29. Deployment timeline, approach 1-2 WEEKS 1-2 WEEKS ApplicationProvisioning ProxyConfiguration PolicyConfiguration Go Live User Setup *SystemIntegration(as needed) AdministrativeTraining MeasureImpact
30. Summary & next steps Assess your current situation What is the opportunity cost from not leveraging these tools? How will you manage the process to ensure security & compliance? What are the risks of opening access and how will you manage them? How else would you use these social tools if you had social middleware? What is the desired timing around engaging with social media? Which groups will get access? How will you use it?