Presentation
Download
Report
Transcript Presentation
ID8 TEAM 2012
Caroline Amaba
Ryan Gavin
Mike Hegadorn
Greg McLeod
John Scire
Nirmal Rajan
INTRO
• ID8 Marketing And Sales Tool
• IMAST
o
o
o
o
ID8 Systems used third-party, open-source software to
manage customers
IMAST is a custom set of tools that works in conjunction
with ID8 systems
Better organization and management within the
company; no need for third-party software
Four major modules: Blog management, Pipeline
management, Customer management, and Emailnewsletter management
TERMINOLOGY
•
•
•
•
•
•
Pipeline - ID8's way of visualizing Leads and
Opportunities as to what stage of the sales process
they're in
Lead - A potential customer who has interest in ID8
Opportunity - A customer who is going through the
sales stages of ID8's marketing plan (the Pipeline).
Marketing Administrator (MA) - An ID8 employee that
has access to all modules except user management
System Administrator (SA) - All MA permissions +
User Management access
Blogger - An ID8 employee that has access to only the
Blog Management module
BLOG
MANAGEMENT
• Allows ID8 marketing representatives to post
valuable sales information and create
marketing presence.
•Posts in rich-text format including images
o Support for dynamic tabular data
o Populate a table by pulling related info from a
database
o Open commenting with admin approval system
o Extra administration features for controlling content
PIPELINE
MANAGEMENT
• Tracks potential leads to streamline sales.
o
o
o
o
Simple single page solution
Create and manage leads
Move leads through the pipeline
Screenshot
CUSTOMER
MANAGEMENT
• Allows the administrator to keep track of all
the customers.
o Ability to see all the accounts
o Defining a Customer Satisfaction Index
o Custom Reports for Account Activity
EMAIL NEWSLETTER
MANAGEMENT
o Ability to send newsletters to customers,
interested clients
o Subscribe Users and Others
o Includes 1x1 pixel to gather newsletter
statistics
Newsletters opened, links clicked, etc.
USER
MANAGEMENT
•
Users are directly related to IMAST system
o
•
Addition of Users
o
•
Marketing Admins, Bloggers, Super Admins
Username, Password, Confirm Password
Deletion of Users
o
List and Choose to Delete
SECURITY
o SSL/TLS encrypted sessions between
browser and server
o Protection against SQL Injection Attacks
o Passwords are hashed (a.k.a., encrypted)
before being stored in the database
o
Hash is salted with random number to discourage
rainbow table attacks