Marketing Hub and Brand Library are built on the ‘Canopy’ marketing automation software platform, and it’s designed to be different. Not just different to other marketing software, but different for each client. Core functions are separated from the user experience layer, allowing us to innovate our core platform plus each and every client implementation. This allows us to deliver to your unique marketing automation requirements without compromise, and create a device responsive design based on your goals, identity and tone-of-voice, delivering a beautiful brand platform that people want to use.
User experience is often overlooked in technology for internal business use, but experience tells us that it is perhaps the biggest single determining factor of the success of marketing automation software. If it’s not nice to use, your people simply won’t come back. We implement to the latest standards in web design and usability through every stage of a workflow automation. Every pixel has a point and each page element exists for a purpose.
Our scoping process engages your team with ‘best practice’ wireframes that show how we turn complex processes into simple steps that encourage confidence and reduce the need for costly training and support.
Our infrastructure is the key to the solidity of our marketing automation software. We run our servers in a dedicated and secure 365/24/7 monitored environment. Each server is fully virtualised and redundant, keeping our clients served at the fastest possible pace. We utilise cloud-based content delivery and storage networks (like Amazon cloudfront and S3) to serve pages and move assets at a lightning pace to your users in every corner of the globe.
Every bit and byte of your data is valuable, so we’re continuously monitoring our systems and create hourly data snapshots of your digital world. Should the unthinkable happen, we’re able to restore your systems in real time, with virtually no data loss. All backups are mirrored in multiple secure locations to keep them safe.
When a user logs in, they’re giving away personal information. It’s our job to keep that safe, irrespective of how sensitive the application is. They may only be accessing a public facing logo or creating a poster, but their login required a password, and research shows that we re-use passwords on average 30-50% of the time.
Our security policies keep the stable door firmly shut. Our applications transmit data over 128 bit encryption, and use best practices when handling personal data. We undertake regular testing by independent CREST approved security specialists. Our hosting environment is physically locked down and is regularly audited. Our live environments are served from an SSAE-16/SAS-70 Type 2 certified facility.
Chances are you’re already using a whole host of other platforms, systems and websites. It’s a pain to ask users to remember yet another set or URLs, usernames and passwords. We support common industry-wide authentication standards and protocols (such as SAML) that allow us to implement a Single Sign On (SSO) using standard SAML enabled directories that you’re probably already using. If you’re not there yet, we can support a number of simpler, third party authentication (TPA) approaches to get your users logged in.