• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Yammer presentation

Yammer presentation






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment
  • Yammer is an enterprise solution to social networking. It is used by more than 100,000 businesses across technology, financial services, healthcare, education, manufacturing and government. Some of the organizations who use Yammer include Mashable, AAA, Nationwide Insurance, GroupOn, Kinetic Worldwide, Smithsonian Institution and UNICEF. Yammer asks the question: What are you working on? (similar to Twitter asking “What are you doing?”)
  • Enterprise Microblogging - Start a conversation, read posts, and actively collaborate with your coworkers in real-time. Files, Links, and Images - Upload and share documents with co-workers, groups, or your entire company. Communities - Create communities for working with partners who are outside of your network . Leadersboards - Find out who the most influential Yammers are in your network. Groups - Create and join private or public groups and collaborate in small teams within your network. Company Directory - Use Yammer to connect with employees in other departments. Knowledge Base - Each conversation is archived and fully searchable so you can find what you need from your company's knowledge base. Topics - Tag content and messages in your network to make content easy to organize and discover. Mobile Applications - Connect to your network anywhere, any time. Download free iPhone, BlackBerry, Android and Windows Mobile applications. Users can also install third-party applications into Yammer to increase the functionality of your network. Security - Message privately and securely in the cloud. Your security is Yammer's top priority.
  • Yammer facilitates spontaneous, real-time discussions, helps teams stay up to date on the latest projects, priorities and developments. It enables ongoing relationship building by facilitating frequent exchanges amongst employees.
  • Yammer serves as a company directory in which every employee has a profile.
  • Yammer serves as a knowledge base where past conversations can be easily accessed and referenced.
  • Yammer Integrates with Twitter: Users can now import Twitter updates into Yammer, using the #yam tag. Connect to your network anywhere, any time. Download free iPhone, BlackBerry, Android and Windows Mobile applications.
  • Low-level logical Barriers between Networks Your network's data is private, secure, and completely separate from other Yammer networks. Low-level logical separation ensures that your data cannot be leaked between networks, even in the event of a programming error. Data Center Security Yammer stores your information on hardened Linux servers in our enterprise-grade data center. We employ 24/7/365 video surveillance, strict personnel access controls, on-site security, and audits to keep your information safe. Any visitor to our premises must be authorized, and further authorization is required to access areas with servers, workstations, or networking equipment. As part of our strict visitor policy, a visitor log is kept to maintain a physical audit trail of activity. Data Backup and Disaster Recovery Yammer has equipped its data center with redundant load balancers and core switches to ensure the integrity and availability of your data. Customer data is automatically backed up to a geographically separate site, and is immediately bulk encrypted (AES - Advanced Encryption Standard). Anti-Virus Security Yammer deploys anti-virus software across all vulnerable systems to vigilantly protect against newly discovered threats and malware. Internal and 3rd Party Testing Yammer thoroughly tests its source code for vulnerabilities. It runs weekly internal and external network vulnerability scans, quarterly 3rd party penetration tests, as well as tests after any significant network change. We also employ file integrity monitoring software to alert personnel to unauthorized modification of critical system or content files. Logical Firewall You can restrict access to your Yammer network to a specific IP range, so that Yammer is only accessible at designated physical locations. Password Policies Set password policies for members of your Yammer network that require a specific length and designate the required combination of numbers, letters, and special characters. You may also require that users change their passwords at regular and recurring intervals. Strong Authentication Yammer's authentication protects against "phishing attacks" and any potential compromise of secondary email accounts. Single Sign-on
  • Yammer recently surveyed users to better understand the effect Yammer is having on organizations. 10,000 users participated in the survey, and the vast majority of respondents found that Yammer helps people collaborate more easily and better engage with their coworkers.

Yammer presentation Yammer presentation Presentation Transcript