IDS-Emergency Management 2004 How Voice Communication Affects Your Business Continuity Strategy !

Slides:



Advertisements
Similar presentations
Aspire Vertical Markets Executive Suite Solution.
Advertisements

Aspire Vertical Markets Banking, Finance and Insurance.
Introduction to SimpleSignals Call Center Solution.
Innovative Telephone Solutions --- ACD Information Services 211 Nebraska Hall (402)
Hosted Communications Product Brochure. Voice Applications as a Service Our hosted voice applications, delivered from highly-resilient, telephony- grade.
University of Baltimore Telecommunications Technology
Communications Solutions for Health Care Providers
Communications Solutions for Hotels/Motels
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. MY.
Using Asterisk to Implement Intelligent Call Center Solutions James Kleckner AMTELCO.
9,825,461,087,64 10,91 6,00 0,00 8,00 Information and Communication Networks HiPath ProCenter Compact Supervisor.
Panasonic Professional Call Centre Solution - Poltys CC Series -
COMMUNICATION TECHNOLOGY 7th GRADE Special communication technology skills are needed for success in schooling and the workplace.
MXIE overview 5/4/ Update1. MXIE Media Exchange Interface for End Users 5/4/ Update2.
Safety Update Kevin Murphy Manager, Gas Distribution Safety and Technical Training Page 1.
Revision from last week  Assumptions are potential failure points in a project. They need to be monitored and managed. At the start of the project they.
Presentation of GemaTech’s Product Portfolio. Company Background GemaTech is an established company with a proven track record in designing, developing.
How to keep your kids safe online
Utilize AITech’s UC Technology to Differentiate your Voice Service Offering Greg Lohrenz - CEO Nashville FISPA LIVE.
Remote On-line Backup Service. How safe is your business data?
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Saving Your Business from a Data Loss Randy Clark.
Call Center – What Really Makes Sense? Call Center – ce este cu adevarat important?
Mohammed Alqahtani. What is the disaster?  A disaster is An event suddenly and unpredictably happened and caused huge damage, loss or destruction in.
About AloTech…  Established in 2007, AloTech is a technology company aiming to provide all functions of a contact center as online “services” to businesses.
Sales Force Automation and Automated Customer Service Centers
Protecting your Employees and Securing your Mail Center.
Continuity Planning & Disaster Recovery ( BRPASW Workshop)
What is SMART NETWORK? SMART NETWORK is a centralized system providing intelligent communications, real-time data analysis and optimized management for.
ENP Study Group Disaster Planning Session #6 BROUGHT TO YOU BY: THE FLORIDA NENA EDUCATION COMMITTEE.
Avaya IP Office Contact Center
AS Level ICT Mrs. Ghazaal. In the past, when a customer wanted to talk to someone in a company they would usually be able to telephone and be put through.
Information Assurance... Smart Card Interoperability Steve Haynes Phone
IT Business Continuity Briefing March 3,  Incident Overview  Improving the power posture of the Primary Data Center  STAGEnet Redundancy  Telephone.
Real Time ACD Package DIGITAL COMMUNICATIONS PLATFORM Digital Communications Platform.
AITech’s UC Voice Technology for FISPA CLECs and ISPs Welcome to FISPALIVE Atlanta 2014.
eTRAN Proprietary Technology The Telecom & Communications Industry.
Effectively Managing Transit Emergencies. Nature of Emergencies and Disasters Overview What Is an Emergency? What Is a Disaster? Differences What Is Emergency.
9,825,461,087,64 10,91 6,00 0,00 8,00 Information and Communication Networks HiPath ProCenter Compact.
Business Continuity Management For Project Managers.
Appendix C: Designing an Operations Framework to Manage Security.
By Anthony W. Hill & Course Technology 1 Help Desk Operation Beisse.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
SECURITY CONSULTING /DISASTER RECOVERY SERVICE The “Must Have Plans” for a Business in the World of Tomorrow.
Hosted Voice & Hosted Contact Center
Prepared Exclusively for Women’s Network Working From Home: Exploring the Options Professional Women Leaders In The Collection Industry.
MX Groups. Page 2 Multiple Sites – What Most are Offering Centralized Intelligence Survivable Gateways at remote sites DISASTER AT MAIN SITE ONLY BASIC.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Communication Methods
Research Direction Introduction
MiVoice Office Eight parties per conference Max 20 parties / single conference Total of 40 parties Dial able Conference Assistant and conference.
EPIC Connections® is a leading provider of contact center consulting, outsourcing and managed infrastructure services. Our highly qualified teams deliver.
Avaya Contact Center Select Avaya Contact Center Select Customer Presentation 11/24/14.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
© 2012 NASDAQ-LISTED: EGHT. l 8x8 Inc. NASDAQ-LISTED: EGHT 2 Surviving the Business Equivalent of the Zombie Apocalypse Why You Need Business Continuity.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
CallFire & Real Estate Marketing. CallFire is a Santa Monica based technology company, dedicated to providing Real Estate firms innovative communication.
Use Live Chat Software As An Effective Customer Support Tool.
Nortel Contact Center: An Overview
One Talk When opportunity calls, answer it.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
USB Based Voice Logger ARIA TELECOM SOLUTIONS PVT. LTD.
ALOTECH Cloud Call Center Solutions
ALOTECH Cloud Call Center Solutions
CRITICAL INFRASTRUCTURE CYBERSECURITY
Contact Center Security Strategies
Presentation transcript:

IDS-Emergency Management 2004 How Voice Communication Affects Your Business Continuity Strategy !

How long could your business survive without a phone?

 Irate Customers  Lost Business  Poor Corporate Image  Financial Losses What will happen to your Business when nobody can talk to you? How long could your business survive without a phone?

“Executives recognize their company’s vulnerabilities, as well as potential threats to their company’s ability to access business-critical information systems without interruption”. Most say that a breakdown in telecommunications is the biggest threat to business continuity. Harris Poll

Telecommunications breakdown Natural disaster, such as flood or earthquake Computer hackers Power failures A terrorist attack Other Which of the following do you consider to be the biggest threat to your company’s ability to access business-critical information without interruption?

What’s Needed?  Uninterrupted communication with your customers  Instant control to change how you respond as circumstances change  A Managed route back to normality

 Divert on Failure Services - takes all the calls on any individual trunk and diverts them to the same location, regardless of the individual number that the caller dialed  Changes to the pre-programmed Services difficult  Limited Flexibility What Your Telecommunications Service Provider Can Offer

Business Continuity Manager (BCM) Worlds first cost effective solution for the intelligent management of telecommunications services during a business interruption  Flexible ACD functionality allowing a manager to monitor an invocation ‘real time’ and to manage the situation by making changes to the Call Plan – all as the ‘interruption’ unfolds  Ability to effectively and seamlessly distribute 100% of incoming calls to 100% of employees who may be re-located anywhere to work (probably at home) in times of invocation.  Individual End User management, removing the need for a conventional (and complex) PABX to have to be re-programmed to effect Call Plan changes  Call Center Magazine 2002 “Product of the Year”

GemaTech’s Business Continuity Manager Offers  Compliments Divert On Failure - Accepts DoF calls and reroutes individual calls in an intelligent manner  Uses a database of Contacts, Contact Numbers (DID’s) and preliminary call plans  Allows on-the-fly changes to call routing and call priorities – all as the disaster unfolds  Continuous live performance statistics are available for remotely located supervisors so they can monitor call traffic and available personnel  All this from anywhere in the world!

Prepared for the Business Interruption

Manage the Business Interruptions

Business Continuity Manager’s Tools  Live monitoring of the situation  On-line updates of the response system  Complete logging of what happened  Flexible tool to respond to any type of interruption

Live Monitoring  Who is calling?  Who is waiting?  Who is available?

On-Line Updates  What agents are available?  When are they available?  In what Services are they available?

Post-disaster Analysis  Who called?  Who answered?  Who was missed?

The end result