13
Using Technology to Protect & Grow Your Business… Could Your Business Survive a Disaster? Presented by Dan Jenkins, Vice President, eAgency Systems

Using Technology to Protect

Embed Size (px)

Citation preview

Page 1: Using Technology to Protect

Using Technology

to Protect & Grow Your Business…

Could Your Business Survive a Disaster?

Presented by

Dan Jenkins, Vice President, eAgency Systems

Page 2: Using Technology to Protect

© 2006 eAgency, Inc. All Rights Reserved.

> There are 25,000,000 small businesses in the United States.

> 70% of new jobs are created by small business owners & entrepreneurs

> Small business is the fastest growing segment of the economy.1

But only a minority use technology to protect & grow their small business into bigger business…

Are YOU Prepared?

The Small Business The Small Business Challenge…Challenge…

1. www.whitehouse.gov

Page 3: Using Technology to Protect

© 2006 eAgency, Inc. All Rights Reserved.

Challenge # 1: Challenge # 1: Disaster Disaster Recovery!Recovery!A Common Scenario …

> You keep all data on computers in your office

> You periodically back up, or have good intentions to back up, client data on another office computer

> You take great care to file & store all of your critical paper documents

Unfortunately, a 7.1 earthquake just occurred... Your computers & office were destroyed

in the ensuing fire...NOW WHAT???

Page 4: Using Technology to Protect

© 2006 eAgency, Inc. All Rights Reserved.

• Contacts• Tasks• Calendar• 100 tailored fields• Email • Client data• Documents• Activities• Leads• Sales• Reports

Because it was automatically backed up!

What if YOU could access YOUR business data…even if your office and PCs were destroyed?

Page 5: Using Technology to Protect

© 2006 eAgency, Inc. All Rights Reserved.

Challenge #2: Challenge #2: Business Business Continuity!Continuity!

A Common Scenario > You hire three more TOP salespeople to

support your expanding business!

> You spend thousands of dollars on leads & marketing to drive sales!

> You secure several major accounts & become profitable!

Unfortunately, your top two salespeople quit, take your

account data with them, and steal your best customers

Page 6: Using Technology to Protect

© 2006 eAgency, Inc. All Rights Reserved.

YOUR contacts (imported from Outlook, ACT or Goldmine)

YOUR unique business data

YOUR records of calls, emails & activities

What if YOU could access YOUR client data …just by connecting to the Internet?

Page 7: Using Technology to Protect

© 2006 eAgency, Inc. All Rights Reserved.

Challenge #3: Challenge #3: Security!Security!

A Common Scenario > You landed a government contract to supply services to thousands of people

> You purchased a high-end laptop and now take your critical business data with you everywhere

> You installed an office security system to protect your business data & equipment

Unfortunately, your laptop was stolen … … you lose the contract because your laptop was

hacked & government data was compromised!

Page 8: Using Technology to Protect

© 2006 eAgency, Inc. All Rights Reserved.

+ Track deals using YOUR selling process

+ Drill down on prospects to monitor progress

+ Retain all your data when employees leave!

What if YOU could protect YOUR data automatically … using a secure data center?

- Password protected - SSL encryption - Remote wipe - GLB compliant

Page 9: Using Technology to Protect

© 2006 eAgency, Inc. All Rights Reserved.

The Final Challenge: The Final Challenge: Leveraging Technology for Success Leveraging Technology for Success

……Take advantage of software that utilizes an off-site data center to store your crucial business information …

… and remain unaffected by unforeseen events!

Leverage software that captures & automatically backs up client records …

… and retain them in the event of employee turnover!

Secure your client data with software that meets strict security standards …

… and access it anywhere via the internet or wireless device

Derive these and other benefits

that will protect and grow your business

into BIGGER business…

Page 10: Using Technology to Protect

© 2006 eAgency, Inc. All Rights Reserved.

Access YOUR forms, documents & product data … from the Internet or a wireless device

Page 11: Using Technology to Protect

© 2006 eAgency, Inc. All Rights Reserved.

1 > Choose a document to send from your list

2 > Choose a group of recipients from your list

3 > Choose a method of delivery…email, fax or hardcopy

Create Marketing Campaigns … in 3 simple steps

Page 12: Using Technology to Protect

You Can Survive

& Thrive!

Page 13: Using Technology to Protect

© 2006 eAgency, Inc. All Rights Reserved.

Prepare NOW!Prepare NOW!

Visit the Nice Office booth and begin to access free technology services that can help you protect your critical data…

Protect & Grow your small business into BIGGER business!