ID8 TEAM 2012 Caroline Amaba Ryan Gavin Mike Hegadorn Greg McLeod John Scire Nirmal Rajan
INTRO ID8 Marketing And Sales Tool IMAST o ID8 Systems used third-party, open-source software to manage customers o IMAST is a custom set of tools that works in conjunction with ID8 systems o Better organization and management within the company; no need for third-party software o Four major modules: Blog management, Pipeline management, Customer management, and - newsletter management
TERMINOLOGY Pipeline - ID8's way of visualizing Leads and Opportunities as to what stage of the sales process they're in Lead - A potential customer who has interest in ID8 Opportunity - A customer who is going through the sales stages of ID8's marketing plan (the Pipeline). Marketing Administrator (MA) - An ID8 employee that has access to all modules except user management System Administrator (SA) - All MA permissions + User Management access Blogger - An ID8 employee that has access to only the Blog Management module
BLOG MANAGEMENT Allows ID8 marketing representatives to post valuable sales information and create marketing presence. Posts in rich-text format including images o Support for dynamic tabular data o Populate a table by pulling related info from a database o Open commenting with admin approval system o Extra administration features for controlling content
PIPELINE MANAGEMENT Tracks potential leads to streamline sales. o Simple single page solution o Create and manage leads o Move leads through the pipeline o Screenshot
CUSTOMER MANAGEMENT Allows the administrator to keep track of all the customers. o Ability to see all the accounts o Defining a Customer Satisfaction Index o Custom Reports for Account Activity
NEWSLETTER MANAGEMENT o Ability to send newsletters to customers, interested clients o Subscribe Users and Others o Includes 1x1 pixel to gather newsletter statistics Newsletters opened, links clicked, etc.
USER MANAGEMENT Users are directly related to IMAST system o Marketing Admins, Bloggers, Super Admins Addition of Users o Username, Password, Confirm Password Deletion of Users o List and Choose to Delete Only done by Super Administrators
SECURITY o SSL/TLS encrypted sessions between browser and server o Protection against SQL Injection Attacks o Passwords are hashed (a.k.a., encrypted) before being stored in the database o Hash is salted with random number to discourage rainbow table attacks