SlideShare une entreprise Scribd logo
1  sur  42
Intelligent Notification ™ Software platform for important message delivery BY:  TINA WILLIAMS  |  ACCOUNT MANAGER © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Company Profile ,[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Who is MIR3? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The pioneer of enterprise notification  and response software © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
EUROPE London Headquarters of MIR3 UK Ltd. Datacenters in London and Zurich AMERICAS San Diego Headquarters Datacenters in San Diego, Denver,  Chicago, Washington, DC and Toronto MID-EAST/AFRICA Bahrain Headquarters of  MIR3 Middle East SAN DIEGO, CA Corporate Headquarters A Growing, Global Company © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Intelligent Notification for… © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential. CUSTOMER SERVICE MARKETING EVENT MANAGEMENT HUMAN RESOURCES SUPPLY CHAIN LOGISTICS SALES MANAGEMENT BUSINESS CONTINUITY DISASTER RECOVERY STAKEHOLDER COMMUNICATION EMPLOYEE SAFETY MASS ABSENTEEISM EMPLOYEE LOGISTICS IT SERVICE MANAGEMENT IT SERVICE CALL IT SERVICE DESK  INCIDENT MANAGEMENT INCIDENT RESPONSE CRISIS MANAGEMENT PANDEMIC PLANNING FACILITY PLANNING AND MANAGEMENT EMPLOYEE ACCOUNTABILITY PUBLIC SAFETY
Intelligent Notification Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential. Why Customers Choose MIR3 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
inEnterprise  Intelligent Notification Platform ,[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Deliver important messages… … and receive meaningful responses. to anyone… anywhere… at any time… © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Launching Notifications is Easy © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential. CREATE NOTIFICATION SELECT RECIPIENTS SEND!
Full-featured Notification Platform REACH PEOPLE ON ANY NUMBER OF DEVICES EASILY MANAGE  RECIPIENT CONTACT DATA CHOICE OF  RESPONSE OPTIONS LAND LINE SMARTPHONE SMS BLACKBERRY PIN-TO-PIN EMAIL PAGER FAX TTY CSV LDRPS LDAP FLAT FILE USER-ENTERED VIA WEB PORTAL CALL BRIDGE FREE FORM TEXT MULTIPLE CHOICE TEXT TO SPEECH RECORDED CASCADE NOTIFICATION © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Customized Message Options TEXT TO SPEECH RECORDED RESPONSE © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential. SMS EMAIL
Multiple Devices, Multiple Networks,  No Single Point of Failure © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Flexible Deployment Options ON-DEMAND (SaaS) ON-PREMISE (LICENSED) HYBRID ANYTIME/ANYWHERE ACCESS “ ALWAYS ON” SCALABLE USE THE MIR3 TELEPHONY INFRASTRUCTURE MAINTENANCE-FREE SEAMLESS INTEGRATIONS YOUR DATA BEHIND  YOUR FIREWALL USE YOUR OWN TELEPHONY INFRASTRUCTURE REQUIRES TELEPHONY INFRASTRUCTURE REQUIRES MAINTENANCE  AND HARDWARE YOUR DATA BEHIND YOUR FIREWALL ON PREMISE SOFTWARE USE THE MIR3 TELEPHONY INFRASTRUCTURE REQUIRES MAINTENANCE  AND HARDWARE © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Why Choose inEnterprise? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Full Audit Reporting ,[object Object],[object Object],[object Object],[object Object],[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
With Multiple Notification Platforms ,[object Object],[object Object],[object Object],[object Object],[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential. CRISIS  MANAGEMENT CORPORATE COMMUNICATIONS BUSINESS  OPERATIONS CUSTOMER  RELATIONS INFORMATION  TECHNOLOGY HUMAN RESOURCES
With Platform Consolidation ,[object Object],[object Object],[object Object],CRISIS  MANAGEMENT CORPORATE COMMUNICATIONS BUSINESS  OPERATIONS CUSTOMER  RELATIONS INFORMATION  TECHNOLOGY HUMAN RESOURCES © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Only with inEnterprise © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Optional Enhancements ,[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Location-based Notification: inGIS ,[object Object],[object Object],[object Object],[object Object],[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Data Management Solution: inConnect © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Integration Solution: inSDK ,[object Object],[object Object],[object Object],[object Object],[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Integration Solution: inSDK © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Integration Solution: Enterprise Service Bus (ESB) ,[object Object],[object Object],[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Integration Solution: Enterprise Service Bus (ESB) ON-PREMISE ON-DEMAND © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential. Easily add  notification capabilities  to  legacy applications
Support Services ,[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Support & Maintenance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Managed Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential. Professional Services
Vertical Markets ,[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Targeted Vertical Markets © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Intelligent Notification in Action ,[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY  BREACH SCENARIO:  A bank’s website experiences a security breach and sensitive customer data may have been compromised. SOLUTION: inEnterprise IMPORTANT  NEWS SCENARIO:  While travelling, the CSO of a financial company receives information that could greatly influence company policy. SOLUTION: inEnterprise OPPORTUNITY  KNOCKS SCENARIO:  A stock opportunity presents itself; a firm wants to contact potential investors quickly in order to take advantage of the situation. SOLUTION: inEnterprise CABLE  DAMAGED SCENARIO:  A construction crew cuts the fiber optic cable to a credit union; extra staff must be called in to manually help customers until the cable is repaired. SOLUTION: inEnterprise © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Intelligent Notification in Action ,[object Object],[object Object],[object Object],[object Object],[object Object],BUSINESS  CONTINUITY SCENARIO:  A  hurricane disrupts business in a region with multiple branch offices. Confirm employee availability and  facility  functionality. SOLUTION: inEnterprise © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential. IMPORTANT  NEWS SCENARIO:  While travelling, the CSO of a financial company receives information that could greatly influence company policy. SOLUTION: inEnterprise WEATHER  ALERT SCENARIO:  A snow storm makes the daily commute dangerous. Should employees report to the office? Provide  office updates. SOLUTION: inEnterprise CABLE  DAMAGED SCENARIO:  A construction crew cuts the fiber optic cable to a credit union; extra staff must be called in to manually help customers until the cable is repaired. SOLUTION: inEnterprise
Intelligent Notification in Action ,[object Object],[object Object],[object Object],[object Object],[object Object],POWER  OUTAGE SCENARIO:  A power company prepares to conduct mainten-ance; customers must be alerted of impending outages. SOLUTION: inEnterprise WEATHER  THREAT SCENARIO:  A Gulf Coast refinery is threatened by a hurricane; dispersed employees must be alerted and directed. SOLUTION: inEnterprise SYSTEM  UPDATES SCENARIO:  An energy company is about to migrate over to a new networking system; employees, suppliers and customers must be alerted. SOLUTION: inEnterprise EARTHQUAKE  STRIKES SCENARIO:  An earthquake strikes; an energy company needs to check in with employees at various plants to assess damages. SOLUTION: inEnterprise © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Intelligent Notification in Action ,[object Object],[object Object],[object Object],[object Object],[object Object],CONTAGIOUS  DISEASE SCENARIO:  The health department gets reports of a highly contagious disease outbreak; action must be taken quickly to prevent transmission. SOLUTION: inEnterprise EARTHQUAKE  STRIKES SCENARIO:  An earthquake strikes and thousands are injured; local hospitals must quickly staff up to deal with the influx of patients. SOLUTION: inEnterprise DISASTER  OVERWHELMS SCENARIO:  A major disaster overwhelms a large hospital; they need an immediate bed, staff  and supply count to ensure care standards. SOLUTION: inEnterprise INFECTIOUS  OUTBREAK SCENARIO:   A clinic is faced with an infectious disease outbreak; they must tap into their network for additional vaccine supplies. SOLUTION: inEnterprise © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Intelligent Notification in Action ,[object Object],[object Object],[object Object],[object Object],[object Object],CAMPUS  EVACUATION SCENARIO:  A bomb threat is called into campus offices; emergency services must act quickly to protect students. SOLUTION: inEnterprise EMERGENCY  RESPONSE SCENARIO:  Large wildfires rage out of control and firefighters are stretched to their limits. The state government has been asked to assist in handling the situation. SOLUTION: inEnterprise FLEXIBLE  STAFFING SCENARIO:   An advanced calculus teacher calls in sick one hour before the start of a university class; a substitute must be found as quickly as possible. SOLUTION: inEnterprise AREA  EVACUATION SCENARIO:  A flood is raging; emergency response crews must quickly locate residents that are stranded and need help. SOLUTION: inEnterprise © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Intelligent Notification in Action ,[object Object],[object Object],[object Object],[object Object],[object Object],NETWORK  DOWN S CENARIO:  The network goes down over a holiday weekend; on-call IT staff must be quickly mobilized to fix the situation. SOLUTION: inEnterprise HEAT WAVE SCENARIO:  A manufacturer of sensitive IT equipment is suffering a heat wave; experts need to join a call to discuss amelioration plans. SOLUTION: inEnterprise NETWORK  FAILURE SCENARIO:  A large shipping hub experiences a network failure; IT staff needs to be alerted and the system must get back online quickly. SOLUTION: inEnterprise HELPDESK  ISSUES SCENARIO:  A large tech company is having problems tracking helpdesk tickets through to completion; they need a reliable feedback system. SOLUTION: inEnterprise © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Intelligent Notification in Action DELAYED  FLIGHTS SCENARIO:  Flights have been delayed due to foul weather; the airline must notify large numbers of travelers of the situation. SOLUTION: inEnterprise TRAIN  DERAILMENT SCENARIO:  A train has derailed, resulting in injuries. Law enforcement, emergency response and railroad officials must be contacted immediately. SOLUTION: inEnterprise EMERGENCY  REPAIR SCENARIO:  An airplane experiences difficulty just prior to takeoff; it must taxi back to the terminal to have the problem Addressed. SOLUTION: inEnterprise NETWORK  FAILURE SCENARIO:  A large shipping hub experiences a network failure; IT staff needs to be alerted and the system must get back on line quickly. SOLUTION: inEnterprise ,[object Object],[object Object],[object Object],[object Object],[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Intelligent Notification in Action CREDIT  INTERRUPTION SCENARIO:  The credit card processing server of an online retailer crashes during the holiday rush; the system must be put back online quickly. SOLUTION: inEnterprise PRODUCT  RECALL SCENARIO:  A toy manufacturer discovers that a popular toy presents a choking hazard to children; a recall must begin before the press turns negative. SOLUTION: inEnterprise DELAYED  SHIPMENT SCENARIO:  A major electronics retailer is told a shipment for next-day sales has been delayed by four hours; schedules must quickly be adapted. SOLUTION: inEnterprise CHEMICAL  SPILL SCENARIO:  A chemical spill occurs in a manufacturing plant; the facilities manager needs to evacuate workers and clean up the mess to avoid injury and loss. SOLUTION: inEnterprise ,[object Object],[object Object],[object Object],[object Object],[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
Intelligent Notification in Action CASINO  MONITORING SCENARIO:  The security department of a major casino is experiencing difficulties with the cameras that monitor the main blackjack area. SOLUTION: inEnterprise HOTEL  DISRUPTION SCENARIO:  A fight breaks out in the parking lot of a hotel; a guest sees the fight and calls the front desk to alert staff. SOLUTION: inEnterprise BOMB  THREAT SCENARIO:  A bomb threat is called into a resort hotel; both staff and emergency responders must act quickly to evacuate guests and staff. SOLUTION: inEnterprise CONCERT  INTERRUPTED SCENARIO:  A performer is  taken ill, disrupting the schedule for a two-day concert; somehow the show must go on. SOLUTION: inEnterprise ,[object Object],[object Object],[object Object],[object Object],[object Object],© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
© 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential. TINA WILLIAMS [email_address] 858-724-1224

Contenu connexe

Tendances

How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic KeyIBM Security
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkIBM Security
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
Afaria Technical White Paper
Afaria Technical White PaperAfaria Technical White Paper
Afaria Technical White PaperSybase Türkiye
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with WatsonSylvia Low
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the CrimeIBM Security
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseIBM Security
 

Tendances (18)

How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic Key
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
 
EMM Product Sales Deck
EMM Product Sales DeckEMM Product Sales Deck
EMM Product Sales Deck
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
mobile application security
mobile application securitymobile application security
mobile application security
 
Afaria Technical White Paper
Afaria Technical White PaperAfaria Technical White Paper
Afaria Technical White Paper
 
Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
 

Similaire à 2011 Sales Presentation V6

Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Steven Williams
 
Mir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE PresentationMir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE PresentationSinglewire Software
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Intel IT annual report
Intel IT annual report Intel IT annual report
Intel IT annual report Low Hong Chuan
 
Solution Centric Architectural Presentation - Denodo as a Growth Enabler
Solution Centric Architectural Presentation - Denodo as a Growth EnablerSolution Centric Architectural Presentation - Denodo as a Growth Enabler
Solution Centric Architectural Presentation - Denodo as a Growth EnablerDenodo
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaDeivid Toledo
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Javaterrencebarr
 
Presentation des assets PS associés au marché banquaire
Presentation des assets PS associés au marché banquairePresentation des assets PS associés au marché banquaire
Presentation des assets PS associés au marché banquaireAlcatel-LucentEnterpriseMEA
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of thingsChristian Milde
 
Data is Big - Ensure it's Resilient
Data is Big - Ensure it's ResilientData is Big - Ensure it's Resilient
Data is Big - Ensure it's ResilientIBM Services
 
Company Presentation
Company PresentationCompany Presentation
Company Presentationwebhostingguy
 
Equipment Solution Footprint
Equipment Solution Footprint Equipment Solution Footprint
Equipment Solution Footprint Merino Services
 
Using Hardware Security with Android Apps
Using Hardware Security with Android AppsUsing Hardware Security with Android Apps
Using Hardware Security with Android AppsAbhijeet Rane
 

Similaire à 2011 Sales Presentation V6 (20)

Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013
 
Mir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE PresentationMir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE Presentation
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Intel IT annual report
Intel IT annual report Intel IT annual report
Intel IT annual report
 
Solution Centric Architectural Presentation - Denodo as a Growth Enabler
Solution Centric Architectural Presentation - Denodo as a Growth EnablerSolution Centric Architectural Presentation - Denodo as a Growth Enabler
Solution Centric Architectural Presentation - Denodo as a Growth Enabler
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE Tecnologia
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
 
Presentation des assets PS associés au marché banquaire
Presentation des assets PS associés au marché banquairePresentation des assets PS associés au marché banquaire
Presentation des assets PS associés au marché banquaire
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Data is Big - Ensure it's Resilient
Data is Big - Ensure it's ResilientData is Big - Ensure it's Resilient
Data is Big - Ensure it's Resilient
 
Company Presentation
Company PresentationCompany Presentation
Company Presentation
 
Equipment Solution Footprint
Equipment Solution Footprint Equipment Solution Footprint
Equipment Solution Footprint
 
Introducing MSite Mobile for Lenel (Feb14)
Introducing MSite Mobile for Lenel (Feb14)Introducing MSite Mobile for Lenel (Feb14)
Introducing MSite Mobile for Lenel (Feb14)
 
Oracle Cloud Café IOT 12 avril 2016
Oracle Cloud Café IOT 12 avril 2016Oracle Cloud Café IOT 12 avril 2016
Oracle Cloud Café IOT 12 avril 2016
 
Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016
 
Using Hardware Security with Android Apps
Using Hardware Security with Android AppsUsing Hardware Security with Android Apps
Using Hardware Security with Android Apps
 

2011 Sales Presentation V6

  • 1. Intelligent Notification ™ Software platform for important message delivery BY: TINA WILLIAMS | ACCOUNT MANAGER © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
  • 2.
  • 3.
  • 4. EUROPE London Headquarters of MIR3 UK Ltd. Datacenters in London and Zurich AMERICAS San Diego Headquarters Datacenters in San Diego, Denver, Chicago, Washington, DC and Toronto MID-EAST/AFRICA Bahrain Headquarters of MIR3 Middle East SAN DIEGO, CA Corporate Headquarters A Growing, Global Company © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
  • 5. Intelligent Notification for… © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential. CUSTOMER SERVICE MARKETING EVENT MANAGEMENT HUMAN RESOURCES SUPPLY CHAIN LOGISTICS SALES MANAGEMENT BUSINESS CONTINUITY DISASTER RECOVERY STAKEHOLDER COMMUNICATION EMPLOYEE SAFETY MASS ABSENTEEISM EMPLOYEE LOGISTICS IT SERVICE MANAGEMENT IT SERVICE CALL IT SERVICE DESK INCIDENT MANAGEMENT INCIDENT RESPONSE CRISIS MANAGEMENT PANDEMIC PLANNING FACILITY PLANNING AND MANAGEMENT EMPLOYEE ACCOUNTABILITY PUBLIC SAFETY
  • 6.
  • 7.
  • 8.
  • 9. Deliver important messages… … and receive meaningful responses. to anyone… anywhere… at any time… © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
  • 10. Launching Notifications is Easy © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential. CREATE NOTIFICATION SELECT RECIPIENTS SEND!
  • 11. Full-featured Notification Platform REACH PEOPLE ON ANY NUMBER OF DEVICES EASILY MANAGE RECIPIENT CONTACT DATA CHOICE OF RESPONSE OPTIONS LAND LINE SMARTPHONE SMS BLACKBERRY PIN-TO-PIN EMAIL PAGER FAX TTY CSV LDRPS LDAP FLAT FILE USER-ENTERED VIA WEB PORTAL CALL BRIDGE FREE FORM TEXT MULTIPLE CHOICE TEXT TO SPEECH RECORDED CASCADE NOTIFICATION © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
  • 12. Customized Message Options TEXT TO SPEECH RECORDED RESPONSE © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential. SMS EMAIL
  • 13. Multiple Devices, Multiple Networks, No Single Point of Failure © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
  • 14. Flexible Deployment Options ON-DEMAND (SaaS) ON-PREMISE (LICENSED) HYBRID ANYTIME/ANYWHERE ACCESS “ ALWAYS ON” SCALABLE USE THE MIR3 TELEPHONY INFRASTRUCTURE MAINTENANCE-FREE SEAMLESS INTEGRATIONS YOUR DATA BEHIND YOUR FIREWALL USE YOUR OWN TELEPHONY INFRASTRUCTURE REQUIRES TELEPHONY INFRASTRUCTURE REQUIRES MAINTENANCE AND HARDWARE YOUR DATA BEHIND YOUR FIREWALL ON PREMISE SOFTWARE USE THE MIR3 TELEPHONY INFRASTRUCTURE REQUIRES MAINTENANCE AND HARDWARE © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Only with inEnterprise © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Integration Solution: inSDK © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
  • 25.
  • 26. Integration Solution: Enterprise Service Bus (ESB) ON-PREMISE ON-DEMAND © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential. Easily add notification capabilities to legacy applications
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. Targeted Vertical Markets © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. © 2011 MIR3, Inc. All Rights Reserved. Proprietary and confidential. TINA WILLIAMS [email_address] 858-724-1224

Notes de l'éditeur

  1. You should adapt the customer bullet points on this slide to your customer audience. Customized bullet points to come. FORTUNE client list accurate as of 12/1/2010 Account Name GLOBAL US Shell Energy - North America Inc 2   Exxon Mobil Oil Corporation 3 2 Chevron Corporation 11 3 ING Reliastar Financial Corp. 12   GE Capital Finance Australasia Pty Ltd 13 4 GE Global Research 13 4 GE Healthcare 13 4 GE Money 13 4 Total Petrochemicals 14   Bank of America 15 5 Volkswagen Credit Inc 16   ConocoPhillips 17 6 AT&T Headquarters 21 7 JPMorgan Chase & Co 25 9 Hewlett Packard (HP) 26 10 Daimler Chrysler Financial 30   McKesson 34 14 Verizon 35 13 HSBC 39   Siemens Corporation 40   Lloyds Banking Group 42   Cardinal Health Headquarters 43 17 Nestle USA 44   Wells Fargo (was Wachovia) 46 19 IBM 48 20 Dexia Credit Local New York Agency 49   RBS Global Banking & Markets 55   Metro AG 57   Tesco PLC 58   Societe General 62   Procter & Gamble 66 22 Deutsche Post DHL AG 86   Barclays Bank GRCB PLC 96   AmerisourceBergen   24 Valero Corporate Services Co   26 Walgreens Headquarters   32 Medco Health Solutions Headquarters   35 Pfizer Canada Inc   40 Pfizer/Wyeth Pharmaceuticals   40 Lockheed Martin   44 Dow Chemical   46 Supervalu Headquarters   47 PepsiCo, Inc.   50 Safeway Headquarters   52 Kraft Foods Inc.   53 Apple Inc.   56 Disney Worldwide Services   57 Northrop Grumman Corp   61 Intel Corporation   62 Aetna Financial Services   63 Caterpillar   66 Sprint   67 Allstate Corporation   68 Coca-Cola   72 Abbott Laboratories   75 Ingram Micro Inc.   80 Fannie Mae/  81 Johnson Controls   83 Delta Air Lines, Inc.   84 TIAA-CREF   90 Enterprise Products Partners L.P.   92 Raytheon   95 Express Scripts   96
  2. Reach people on any number of devices Smartphone, SMS, pager, land line, email, fax, BlackBerry PIN-to-PIN and TTY Fast simple loading of recipients to the contact database CSV, LDRPS, LDAP, flat file or user-entered via web portal Provide flexible response options Call bridge Follow-up (free form, multiple choice, recorded) Cascade notification
  3. Reach people on any number of devices Smartphone, SMS, pager, land line, email, fax, BlackBerry PIN-to-PIN and TTY Fast simple loading of recipients to the contact database CSV, LDRPS, LDAP, flat file or user-entered via web portal Provide flexible response options Call bridge Follow-up (free form, multiple choice, recorded) Cascade notification
  4. Reach people on any number of devices Smartphone, SMS, pager, land line, email, fax, BlackBerry PIN-to-PIN and TTY Fast simple loading of recipients to the contact database CSV, LDRPS, LDAP, flat file or user-entered via web portal Provide flexible response options Call bridge Follow-up (free form, multiple choice, recorded) Cascade notification
  5. MIR3 is the only notification solution provider who gives this choice of deployment options. Only the customer knows which solution is right for them, and no matter what the requirements, MIR3 has a deployment option that fits. There are pros and cons of each: SaaS: easy to get set up, easy to operate, always on service that puts data securely in the cloud, using the MIR3 redundant telephony architecture for Intelligent Notification for the ultimate in always-on/always available service with no maintenance and guaranteed uptime. Licensed/Installed: This offers customers complete control over their solution, keeping their data behind their firewall, but it requires maintenance and hardware. Customers can choose their own telephony infrastructure which may result in telephony savings depending on where their recipients are. Hybrid: Customers keep data behind their firewall, requiring maintenance and hardware, but uses the MIR3 redundant telephony architecture for Intelligent Notification for the ultimate in always-on/always available service with no maintenance and guaranteed uptime.
  6. Divisions – Divisions, subdivisions or departments can be established/maintained for security purposes. Dynamic Groups – Groups can be created on the fly with information from recipient file. Incident Management module – Complete access to use the Incident Management as a bulletin board for minor/major incidents. Topic Subscription – Topics can be subscribed to or Opt-In for certain areas of interest. Rotational Scheduler – Scheduler application can be used for On-call schedules with Escalation tiers which are tied to groups or recipients. Integration/Webservices – Integrations to IT solutions(Remedy, Tivoli, HP, CA etc.) WS can automate the notification process. Multi-language(Spanish, French, English-UK & German) $5,000 telephony credit EACH YEAR.  Telephony credit would apply to Voice($.10/minute & SMS $.08/message) charges.
  7. Implementation Services While inEnterprise is the most feature-rich notification tool available, you may have additional requirements for your rapid mass communication platform. The MIR3 Professional Services team can tailor inEnterprise to meet your unique notification and response needs with custom programming, integration and installation. MIR3 Professional Services can also provide comprehensive technical consultation for your in-house development effort. Here’s how the MIR3 team will help you with: Programming Custom interface design Custom application development using inEnterprise as the notification back end Custom report generation for your unique data presentation needs Integration Add the inEnterprise robust, automated mass notification and response capability to your organization’s software tools, easily accessible within the interface you already use—including CRM, ERP and IT Service Management Installation Assist you with more complex, enterprise installations of inEnterprise to work seamlessly with your IT infrastructure
  8. SECURITY BREACH SCENARIO: A bank’s website experiences a security breach and sensitive customer data may have been compromised. SOLUTION: Once the breach is detected, an alert is automatically launched to on-call IT staff using inEnterprise. At the same time, the bank’s director of Internet security is alerted to the incident. The notification includes cascade features so that, depending on the director and staff responses, a second, separate notification can be automatically launched to the FBI’s Cyber Crime Division if warranted. IMPORTANT NEWS SCENARIO: While travelling, the CSO of a financial services company receives information that could greatly influence company policy. SOLUTION: Using a smartphone, the CSO launches a notification to all necessary personnel, calling a meeting with key decision makers. The inEnterprise notification includes an explanation of the situation, sets a time for a conference call, and includes options to allow recipients to accept, decline, or record a message. The CSO is able to view replies in a clear, simple format while far away from the office OPPORTUNITY KNOCKS SCENARIO: A stock opportunity presents itself; a firm wants to contact potential investors quickly in order to take advantage of the situation. SOLUTION: Typically all the brokers in the investment firm would start dialing investors and explaining the opportunity. Using inEnterprise, initiators are able to contact all potential investors through a single message. Notifications can offer response options so recipients can say yes or no to the opportunity. The call bridge feature can connect clients directly to a broker for questions or to move forward. CABLE DAMAGE SCENARIO: A construction crew cuts the fiber optic cable to a credit union; extra staff must be called in to manually help customers until the cable is repaired. SOLUTION: An inEnterprise notification is sent to all off-duty credit union staff, no matter where they are, requesting the attendance of five additional tellers. As replies are received, the staffing manager can clearly see when enough tellers have agreed to come in. The notification is terminated, with a final alert telling remaining off-duty staff that the situation has been covered.
  9. SECURITY BREACH SCENARIO:A bank’s website experiences a security breach and sensitive customer data may have been compromised. SOLUTION:Once the breach is detected, an alert is automatically launched to on-call IT staff using inEnterprise. At the same time, the bank’s director of Internet security is alerted to the incident. The notification includes cascade features so that, depending on the director and staff responses, a second, separate notification can be automatically launched to the FBI’s Cyber Crime Division if warranted. IMPORTANT NEWS SCENARIO:While travelling, the CSO of a financial services company receives information that could greatly influence company policy. SOLUTION:Using a smartphone, the CSO launches a notification to all necessary personnel, calling a meeting with key decision makers. The inEnterprise notification includes an explanation of the situation, sets a time for a conference call, and includes options to allow recipients to accept, decline, or record a message. The CSO is able to view replies in a clear, simple format while far away from the office OPPORTUNITY KNOCKS SCENARIO: A stock opportunity presents itself; a firm wants to contact potential investors quickly in order to take advantage of the situation. SOLUTION: Typically all the brokers in the investment firm would start dialing investors and explaining the opportunity. Using inEnterprise, initiators are able to contact all potential investors through a single message. Notifications can offer response options so recipients can say yes or no to the opportunity. The call bridge feature can connect clients directly to a broker for questions or to move forward. CABLE DAMAGE SCENARIO: A construction crew cuts the fiber optic cable to a credit union; extra staff must be called in to manually help customers until the cable is repaired. SOLUTION: An inEnterprise notification is sent to all off-duty credit union staff, no matter where they are, requesting the attendance of five additional tellers. As replies are received, the staffing manager can clearly see when enough tellers have agreed to come in. The notification is terminated, with a final alert telling remaining off-duty staff that the situation has been covered.