SlideShare une entreprise Scribd logo
1  sur  21
©2015 Gainsight. All Rights Reserved.
Customer Success and Security
Technology
Moderator: Sonam Dabholkar, Gainsight
Dennis Reno, VP CSM at ProofPoint
Dean Thomas, VP of Customer Success at Sumo Logic
©2015 Gainsight. All Rights Reserved.
VP Customer Success
Dean Thomas
Sumo LogicSumo Logic
©2015 Gainsight. All Rights Reserved.
Customer Success and Security Technology
•Provides cloud-native machine data analytics and search
•Many security use-cases, including audit, compliance and SIEM capabilities
•Security is just one of our use-cases, so we have Security and non-Security
buyers and users
•Customer Success includes
• Customer Enablement (Services)
• Technical Support
• Proactive Customer Success team
©2015 Gainsight. All Rights Reserved.
Customer Success and Security Technology – Unique Challenges
Five Key Things I’ve Learned about CS for Security Technology Customers
1.Domain expertise is very important
• You need more than just great customer skills
• Specific domain training is important
2.Keep your team’s knowledge current
• The pace of change is tremendous
• Customers want to learn from you, not educate you
3.Coach the team to be precise in communication
• Technical buyers and users
• Their job requires incredible attention to detail
• Compliance requirements are often inflexible
©2015 Gainsight. All Rights Reserved.
Customer Success and Security Technology – Unique Challenges
Five Key Things I’ve Learned about CS for Security Technology Customers
4.Always talk about your own Security practices
• Practice what you preach
• Higher expectations for security – it’s their business
4.Lean in to well known threats – Don’t be silent!
• Treat widespread threats as a Customer Service moment
• Acknowledge your own vulnerability mitigation
• Teach them how to use your products to mitigate their own
©2015 Gainsight. All Rights Reserved.
THANK YOU
©2015 Gainsight. All Rights Reserved.
Vice President,
Customer Success
DENNIS RENO
INSERT
YOUR
PHOTO
HERE
INSERT
YOUR
PHOTO
HERE
Proofpoint, Inc.Proofpoint, Inc.
Data outside
the firewall is
not protected
Can’t keep
pace with
advanced
threats & end-
user needs
Signature-
based
approaches
are ineffective
Systems
don’t scale &
are expensive
to operate
Security and ComplianceSecurity and Compliance
Solutions HavenSolutions Haven’t’t
Protecting your People,
Information and Brand:
Everywhere
Comprehensive
Protection
BetterBetter
EffectivenesEffectivenes
ss
FasterFaster
InnovationInnovation
LowerLower
TCOTCO
Social Accounts
Who can create
them?
Are they legit?
Social Accounts
Who can create
them?
Are they legit?
Social Accounts
What happens when
abusers hijack the
conversation with
abuse, hate, and
porn?
Social Accounts
What happens when
abusers hijack the
conversation with
abuse, hate, and
porn?
Social Accounts
Are social media
accounts regulated?
How do you give the
business what they
want but stay
compliant?
Social Accounts
Are social media
accounts regulated?
How do you give the
business what they
want but stay
compliant?
SPAM
Spammers have
discovered social
media. New
techniques to detect
spam need to be
deployed.
SPAM
Spammers have
discovered social
media. New
techniques to detect
spam need to be
deployed.
Mass Protest
Social Media is the
perfect breeding
ground for groups to
vent their anger
against a brand
Every company is
vulnerable
Mass Protest
Social Media is the
perfect breeding
ground for groups to
vent their anger
against a brand
Every company is
vulnerable
©2015 Gainsight. All Rights Reserved.
Unique Challenges in the Industry
• Customers come to us “after” a security incident
• Buyers unfamiliar with technology
• Cyber criminals continue to advance their techniques
• Good customer training becoming increasingly important
• Customer Success role becoming more technical in
nature
• Communication “style” is evolving quickly to meet
customer needs
©2015 Gainsight. All Rights Reserved.
Working with the Technical Buyer
• Consider all of the risks:
• Targeted attacks
• Consequences of a breach
• Compliance challenges
• Litigation risk
• What happens when a social account is hijacked?
©2015 Gainsight. All Rights Reserved.
Structure
• CSM’s part of larger customer facing organization:
• Technical Support & Customer Service
• Professional Services
• Technical Account Managers (TAM’s)
• Customer Success Managers (CSM’s)
Smooth hand-off’s are critical to customer experience
©2015 Gainsight. All Rights Reserved.
CSM Goals
• Trusted security advisor
• Various aspects of security and risk are front of the
customer’s mind
• Proactive customer communication
• Seamless on-boarding process
• Support case deflection
• Service differentiation
• Churn prevention
• Customer satisfaction
©2015 Gainsight. All Rights Reserved.
How its Evolved & Learnings
• Being a trusted security advisor is a good thing
• Proactive steps are more important than ever
• Every company has a unique spin on the CSM role
• The ability of the CSM to work with other customer
facing teams is critical to success
• CSM’s are critical to our customers’ success!
©2015 Gainsight. All Rights Reserved.
THANK YOU

Contenu connexe

En vedette

Proofpoint Outbound/DLP Survey Results
Proofpoint Outbound/DLP Survey ResultsProofpoint Outbound/DLP Survey Results
Proofpoint Outbound/DLP Survey Resultsshapetech
 
Compliant Practices for Social Media in Financial Services
Compliant Practices for Social Media in Financial ServicesCompliant Practices for Social Media in Financial Services
Compliant Practices for Social Media in Financial ServicesLinkedIn Sales Solutions
 
Governança de Dados nas empresas - BI Summit 2017
Governança de Dados nas empresas - BI Summit 2017Governança de Dados nas empresas - BI Summit 2017
Governança de Dados nas empresas - BI Summit 2017BLRDATA
 
Tecnoset curitiba printing services
Tecnoset curitiba   printing servicesTecnoset curitiba   printing services
Tecnoset curitiba printing servicesFernando Misato
 
Webinar: Proofpoint, a pioneer in security-as-a-service protects people, info...
Webinar: Proofpoint, a pioneer in security-as-a-service protects people, info...Webinar: Proofpoint, a pioneer in security-as-a-service protects people, info...
Webinar: Proofpoint, a pioneer in security-as-a-service protects people, info...DataStax
 
Institucional proofpoint
Institucional proofpointInstitucional proofpoint
Institucional proofpointvoliverio
 
Periodismo transmedia
Periodismo transmediaPeriodismo transmedia
Periodismo transmediaaolaizola
 
Periodismo Transmedia. Guía Práctica
Periodismo Transmedia. Guía PrácticaPeriodismo Transmedia. Guía Práctica
Periodismo Transmedia. Guía PrácticaMontecarlo -
 
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Proofpoint
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALMichael Bunn
 
The Human Factor Report 2015
The Human Factor Report 2015The Human Factor Report 2015
The Human Factor Report 2015Michael Bunn
 
General Motors Case Analysis
General Motors Case AnalysisGeneral Motors Case Analysis
General Motors Case Analysisandreaberga
 

En vedette (14)

Proofpoint Outbound/DLP Survey Results
Proofpoint Outbound/DLP Survey ResultsProofpoint Outbound/DLP Survey Results
Proofpoint Outbound/DLP Survey Results
 
Compliant Practices for Social Media in Financial Services
Compliant Practices for Social Media in Financial ServicesCompliant Practices for Social Media in Financial Services
Compliant Practices for Social Media in Financial Services
 
Governança de Dados nas empresas - BI Summit 2017
Governança de Dados nas empresas - BI Summit 2017Governança de Dados nas empresas - BI Summit 2017
Governança de Dados nas empresas - BI Summit 2017
 
Tecnoset curitiba printing services
Tecnoset curitiba   printing servicesTecnoset curitiba   printing services
Tecnoset curitiba printing services
 
Webinar: Proofpoint, a pioneer in security-as-a-service protects people, info...
Webinar: Proofpoint, a pioneer in security-as-a-service protects people, info...Webinar: Proofpoint, a pioneer in security-as-a-service protects people, info...
Webinar: Proofpoint, a pioneer in security-as-a-service protects people, info...
 
06 narrativa transmedia y periodismo (clase)
06 narrativa transmedia y periodismo (clase)06 narrativa transmedia y periodismo (clase)
06 narrativa transmedia y periodismo (clase)
 
Institucional proofpoint
Institucional proofpointInstitucional proofpoint
Institucional proofpoint
 
Periodismo transmedia
Periodismo transmediaPeriodismo transmedia
Periodismo transmedia
 
Periodismo Transmedia. Guía Práctica
Periodismo Transmedia. Guía PrácticaPeriodismo Transmedia. Guía Práctica
Periodismo Transmedia. Guía Práctica
 
1.1.1. Narrativas Transmedia - U01
1.1.1. Narrativas Transmedia - U011.1.1. Narrativas Transmedia - U01
1.1.1. Narrativas Transmedia - U01
 
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
 
The Human Factor Report 2015
The Human Factor Report 2015The Human Factor Report 2015
The Human Factor Report 2015
 
General Motors Case Analysis
General Motors Case AnalysisGeneral Motors Case Analysis
General Motors Case Analysis
 

Similaire à Customer Success and Security Technology

Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Sal Abramo
 
Agile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky BusinessAgile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky BusinessITpreneurs
 
Beyond identity soft choice tech you oughta know 03042022
Beyond identity soft choice tech you oughta know 03042022Beyond identity soft choice tech you oughta know 03042022
Beyond identity soft choice tech you oughta know 03042022Philip Moroni
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...
Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...
Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...Authentic Vision
 
"How to Create a Practical and Profitable Personalization Strategy" - Brooks ...
"How to Create a Practical and Profitable Personalization Strategy" - Brooks ..."How to Create a Practical and Profitable Personalization Strategy" - Brooks ...
"How to Create a Practical and Profitable Personalization Strategy" - Brooks ...Tealium
 
Limton Group of Companies. Marketing Plan Analysis
Limton Group of Companies. Marketing Plan AnalysisLimton Group of Companies. Marketing Plan Analysis
Limton Group of Companies. Marketing Plan AnalysisAdnan Abdullah
 
The Customer Success Nuances of On Premise Solutions
The Customer Success Nuances of On Premise SolutionsThe Customer Success Nuances of On Premise Solutions
The Customer Success Nuances of On Premise SolutionsGainsight
 
Balancing Success Priorities at a Startup
Balancing Success Priorities at a Startup Balancing Success Priorities at a Startup
Balancing Success Priorities at a Startup Gainsight
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professionalBen Rothke
 
The keys to scaling your customer success program
The keys to scaling your customer success programThe keys to scaling your customer success program
The keys to scaling your customer success programGainsight
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
Digital insurance trends in Asia - Presentation to Allianz regional conferen...
Digital insurance trends in Asia  - Presentation to Allianz regional conferen...Digital insurance trends in Asia  - Presentation to Allianz regional conferen...
Digital insurance trends in Asia - Presentation to Allianz regional conferen...The Digital Insurer
 
Importance Of 24.7 IT Support Why Business Need It.pptx
Importance Of 24.7 IT Support Why Business Need It.pptxImportance Of 24.7 IT Support Why Business Need It.pptx
Importance Of 24.7 IT Support Why Business Need It.pptxBluechip Gulf IT Services
 
Earley Executive Roundtable - Making Sense of Marketing Technology
Earley Executive Roundtable - Making Sense of Marketing TechnologyEarley Executive Roundtable - Making Sense of Marketing Technology
Earley Executive Roundtable - Making Sense of Marketing TechnologyEarley Information Science
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesJohn Rapa
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 

Similaire à Customer Success and Security Technology (20)

Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1
 
Agile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky BusinessAgile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky Business
 
Beyond identity soft choice tech you oughta know 03042022
Beyond identity soft choice tech you oughta know 03042022Beyond identity soft choice tech you oughta know 03042022
Beyond identity soft choice tech you oughta know 03042022
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...
Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...
Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...
 
"How to Create a Practical and Profitable Personalization Strategy" - Brooks ...
"How to Create a Practical and Profitable Personalization Strategy" - Brooks ..."How to Create a Practical and Profitable Personalization Strategy" - Brooks ...
"How to Create a Practical and Profitable Personalization Strategy" - Brooks ...
 
Limton Group of Companies. Marketing Plan Analysis
Limton Group of Companies. Marketing Plan AnalysisLimton Group of Companies. Marketing Plan Analysis
Limton Group of Companies. Marketing Plan Analysis
 
The Customer Success Nuances of On Premise Solutions
The Customer Success Nuances of On Premise SolutionsThe Customer Success Nuances of On Premise Solutions
The Customer Success Nuances of On Premise Solutions
 
Balancing Success Priorities at a Startup
Balancing Success Priorities at a Startup Balancing Success Priorities at a Startup
Balancing Success Priorities at a Startup
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
The keys to scaling your customer success program
The keys to scaling your customer success programThe keys to scaling your customer success program
The keys to scaling your customer success program
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Digital insurance trends in Asia - Presentation to Allianz regional conferen...
Digital insurance trends in Asia  - Presentation to Allianz regional conferen...Digital insurance trends in Asia  - Presentation to Allianz regional conferen...
Digital insurance trends in Asia - Presentation to Allianz regional conferen...
 
Importance Of 24.7 IT Support Why Business Need It.pptx
Importance Of 24.7 IT Support Why Business Need It.pptxImportance Of 24.7 IT Support Why Business Need It.pptx
Importance Of 24.7 IT Support Why Business Need It.pptx
 
Earley Executive Roundtable - Making Sense of Marketing Technology
Earley Executive Roundtable - Making Sense of Marketing TechnologyEarley Executive Roundtable - Making Sense of Marketing Technology
Earley Executive Roundtable - Making Sense of Marketing Technology
 
Securing the Digital Enterprise
Securing the Digital EnterpriseSecuring the Digital Enterprise
Securing the Digital Enterprise
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 
Confidis-Briefing-Web
Confidis-Briefing-WebConfidis-Briefing-Web
Confidis-Briefing-Web
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 

Plus de Gainsight

Customer Success - Why and How of Gainsight's 14 Elements
Customer Success - Why and How of Gainsight's 14 ElementsCustomer Success - Why and How of Gainsight's 14 Elements
Customer Success - Why and How of Gainsight's 14 ElementsGainsight
 
How to Evolve Your Health Score From Reactive to Predictive
How to Evolve Your Health Score From Reactive to PredictiveHow to Evolve Your Health Score From Reactive to Predictive
How to Evolve Your Health Score From Reactive to PredictiveGainsight
 
How to Better Align Professional Services to Customer Success
How to Better Align Professional Services to Customer SuccessHow to Better Align Professional Services to Customer Success
How to Better Align Professional Services to Customer SuccessGainsight
 
How Box Scaled to Millions of Engagements Using Tech Touch
 How Box Scaled to Millions of Engagements Using Tech Touch How Box Scaled to Millions of Engagements Using Tech Touch
How Box Scaled to Millions of Engagements Using Tech TouchGainsight
 
How to Design a Value-Based Renewal Management Process
 How to Design a Value-Based Renewal Management Process How to Design a Value-Based Renewal Management Process
How to Design a Value-Based Renewal Management ProcessGainsight
 
How to Build an End-to-End Process for Defining and Delivering on Outcomes
How to Build an End-to-End Process for Defining and Delivering on OutcomesHow to Build an End-to-End Process for Defining and Delivering on Outcomes
How to Build an End-to-End Process for Defining and Delivering on OutcomesGainsight
 
How to Institutionalize Feedback at Every Stage of Your Customer Journey Beyo...
How to Institutionalize Feedback at Every Stage of Your Customer Journey Beyo...How to Institutionalize Feedback at Every Stage of Your Customer Journey Beyo...
How to Institutionalize Feedback at Every Stage of Your Customer Journey Beyo...Gainsight
 
The Science of Customer Success
The Science of Customer SuccessThe Science of Customer Success
The Science of Customer SuccessGainsight
 
How to Build a Customer Journey That's Outside-In not Inside-Out
How to Build a Customer Journey That's Outside-In not Inside-OutHow to Build a Customer Journey That's Outside-In not Inside-Out
How to Build a Customer Journey That's Outside-In not Inside-OutGainsight
 
How to Turbocharge Your Customer Insights While Making Them More Digestible f...
How to Turbocharge Your Customer Insights While Making Them More Digestible f...How to Turbocharge Your Customer Insights While Making Them More Digestible f...
How to Turbocharge Your Customer Insights While Making Them More Digestible f...Gainsight
 
The Age of the Customer, 2018
The Age of the Customer, 2018The Age of the Customer, 2018
The Age of the Customer, 2018Gainsight
 
How to Create Healthy Customers in Healthcare IT: Inside Imprivata’s Customer...
How to Create Healthy Customers in Healthcare IT: Inside Imprivata’s Customer...How to Create Healthy Customers in Healthcare IT: Inside Imprivata’s Customer...
How to Create Healthy Customers in Healthcare IT: Inside Imprivata’s Customer...Gainsight
 
How to Build the Ultimate Customer Success Board Presentation
How to Build the Ultimate Customer Success Board PresentationHow to Build the Ultimate Customer Success Board Presentation
How to Build the Ultimate Customer Success Board PresentationGainsight
 
Customer Success = Customer Outcomes + Customer Experience
Customer Success = Customer Outcomes + Customer ExperienceCustomer Success = Customer Outcomes + Customer Experience
Customer Success = Customer Outcomes + Customer ExperienceGainsight
 
How to leverage customer marketing to drive sales
How to leverage customer marketing to drive salesHow to leverage customer marketing to drive sales
How to leverage customer marketing to drive salesGainsight
 
Aligning Sales and Customer Success
Aligning Sales and Customer SuccessAligning Sales and Customer Success
Aligning Sales and Customer SuccessGainsight
 
How to Unleash the Hidden Value of a Best Practices Voice of the Customer Pro...
How to Unleash the Hidden Value of a Best Practices Voice of the Customer Pro...How to Unleash the Hidden Value of a Best Practices Voice of the Customer Pro...
How to Unleash the Hidden Value of a Best Practices Voice of the Customer Pro...Gainsight
 
SaaS.City 2017 Customer Success Bootcamp
SaaS.City 2017 Customer Success BootcampSaaS.City 2017 Customer Success Bootcamp
SaaS.City 2017 Customer Success BootcampGainsight
 
Customer Success Showcase: How IBM Exponentially Increased Customer Adoption ...
Customer Success Showcase: How IBM Exponentially Increased Customer Adoption ...Customer Success Showcase: How IBM Exponentially Increased Customer Adoption ...
Customer Success Showcase: How IBM Exponentially Increased Customer Adoption ...Gainsight
 
How to Budget for Customer Success
How to Budget for Customer SuccessHow to Budget for Customer Success
How to Budget for Customer SuccessGainsight
 

Plus de Gainsight (20)

Customer Success - Why and How of Gainsight's 14 Elements
Customer Success - Why and How of Gainsight's 14 ElementsCustomer Success - Why and How of Gainsight's 14 Elements
Customer Success - Why and How of Gainsight's 14 Elements
 
How to Evolve Your Health Score From Reactive to Predictive
How to Evolve Your Health Score From Reactive to PredictiveHow to Evolve Your Health Score From Reactive to Predictive
How to Evolve Your Health Score From Reactive to Predictive
 
How to Better Align Professional Services to Customer Success
How to Better Align Professional Services to Customer SuccessHow to Better Align Professional Services to Customer Success
How to Better Align Professional Services to Customer Success
 
How Box Scaled to Millions of Engagements Using Tech Touch
 How Box Scaled to Millions of Engagements Using Tech Touch How Box Scaled to Millions of Engagements Using Tech Touch
How Box Scaled to Millions of Engagements Using Tech Touch
 
How to Design a Value-Based Renewal Management Process
 How to Design a Value-Based Renewal Management Process How to Design a Value-Based Renewal Management Process
How to Design a Value-Based Renewal Management Process
 
How to Build an End-to-End Process for Defining and Delivering on Outcomes
How to Build an End-to-End Process for Defining and Delivering on OutcomesHow to Build an End-to-End Process for Defining and Delivering on Outcomes
How to Build an End-to-End Process for Defining and Delivering on Outcomes
 
How to Institutionalize Feedback at Every Stage of Your Customer Journey Beyo...
How to Institutionalize Feedback at Every Stage of Your Customer Journey Beyo...How to Institutionalize Feedback at Every Stage of Your Customer Journey Beyo...
How to Institutionalize Feedback at Every Stage of Your Customer Journey Beyo...
 
The Science of Customer Success
The Science of Customer SuccessThe Science of Customer Success
The Science of Customer Success
 
How to Build a Customer Journey That's Outside-In not Inside-Out
How to Build a Customer Journey That's Outside-In not Inside-OutHow to Build a Customer Journey That's Outside-In not Inside-Out
How to Build a Customer Journey That's Outside-In not Inside-Out
 
How to Turbocharge Your Customer Insights While Making Them More Digestible f...
How to Turbocharge Your Customer Insights While Making Them More Digestible f...How to Turbocharge Your Customer Insights While Making Them More Digestible f...
How to Turbocharge Your Customer Insights While Making Them More Digestible f...
 
The Age of the Customer, 2018
The Age of the Customer, 2018The Age of the Customer, 2018
The Age of the Customer, 2018
 
How to Create Healthy Customers in Healthcare IT: Inside Imprivata’s Customer...
How to Create Healthy Customers in Healthcare IT: Inside Imprivata’s Customer...How to Create Healthy Customers in Healthcare IT: Inside Imprivata’s Customer...
How to Create Healthy Customers in Healthcare IT: Inside Imprivata’s Customer...
 
How to Build the Ultimate Customer Success Board Presentation
How to Build the Ultimate Customer Success Board PresentationHow to Build the Ultimate Customer Success Board Presentation
How to Build the Ultimate Customer Success Board Presentation
 
Customer Success = Customer Outcomes + Customer Experience
Customer Success = Customer Outcomes + Customer ExperienceCustomer Success = Customer Outcomes + Customer Experience
Customer Success = Customer Outcomes + Customer Experience
 
How to leverage customer marketing to drive sales
How to leverage customer marketing to drive salesHow to leverage customer marketing to drive sales
How to leverage customer marketing to drive sales
 
Aligning Sales and Customer Success
Aligning Sales and Customer SuccessAligning Sales and Customer Success
Aligning Sales and Customer Success
 
How to Unleash the Hidden Value of a Best Practices Voice of the Customer Pro...
How to Unleash the Hidden Value of a Best Practices Voice of the Customer Pro...How to Unleash the Hidden Value of a Best Practices Voice of the Customer Pro...
How to Unleash the Hidden Value of a Best Practices Voice of the Customer Pro...
 
SaaS.City 2017 Customer Success Bootcamp
SaaS.City 2017 Customer Success BootcampSaaS.City 2017 Customer Success Bootcamp
SaaS.City 2017 Customer Success Bootcamp
 
Customer Success Showcase: How IBM Exponentially Increased Customer Adoption ...
Customer Success Showcase: How IBM Exponentially Increased Customer Adoption ...Customer Success Showcase: How IBM Exponentially Increased Customer Adoption ...
Customer Success Showcase: How IBM Exponentially Increased Customer Adoption ...
 
How to Budget for Customer Success
How to Budget for Customer SuccessHow to Budget for Customer Success
How to Budget for Customer Success
 

Dernier

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 

Dernier (20)

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 

Customer Success and Security Technology

  • 1. ©2015 Gainsight. All Rights Reserved. Customer Success and Security Technology Moderator: Sonam Dabholkar, Gainsight Dennis Reno, VP CSM at ProofPoint Dean Thomas, VP of Customer Success at Sumo Logic
  • 2. ©2015 Gainsight. All Rights Reserved. VP Customer Success Dean Thomas Sumo LogicSumo Logic
  • 3. ©2015 Gainsight. All Rights Reserved. Customer Success and Security Technology •Provides cloud-native machine data analytics and search •Many security use-cases, including audit, compliance and SIEM capabilities •Security is just one of our use-cases, so we have Security and non-Security buyers and users •Customer Success includes • Customer Enablement (Services) • Technical Support • Proactive Customer Success team
  • 4. ©2015 Gainsight. All Rights Reserved. Customer Success and Security Technology – Unique Challenges Five Key Things I’ve Learned about CS for Security Technology Customers 1.Domain expertise is very important • You need more than just great customer skills • Specific domain training is important 2.Keep your team’s knowledge current • The pace of change is tremendous • Customers want to learn from you, not educate you 3.Coach the team to be precise in communication • Technical buyers and users • Their job requires incredible attention to detail • Compliance requirements are often inflexible
  • 5. ©2015 Gainsight. All Rights Reserved. Customer Success and Security Technology – Unique Challenges Five Key Things I’ve Learned about CS for Security Technology Customers 4.Always talk about your own Security practices • Practice what you preach • Higher expectations for security – it’s their business 4.Lean in to well known threats – Don’t be silent! • Treat widespread threats as a Customer Service moment • Acknowledge your own vulnerability mitigation • Teach them how to use your products to mitigate their own
  • 6. ©2015 Gainsight. All Rights Reserved. THANK YOU
  • 7. ©2015 Gainsight. All Rights Reserved. Vice President, Customer Success DENNIS RENO INSERT YOUR PHOTO HERE INSERT YOUR PHOTO HERE Proofpoint, Inc.Proofpoint, Inc.
  • 8.
  • 9. Data outside the firewall is not protected Can’t keep pace with advanced threats & end- user needs Signature- based approaches are ineffective Systems don’t scale & are expensive to operate Security and ComplianceSecurity and Compliance Solutions HavenSolutions Haven’t’t
  • 10. Protecting your People, Information and Brand: Everywhere Comprehensive Protection BetterBetter EffectivenesEffectivenes ss FasterFaster InnovationInnovation LowerLower TCOTCO
  • 11. Social Accounts Who can create them? Are they legit? Social Accounts Who can create them? Are they legit?
  • 12. Social Accounts What happens when abusers hijack the conversation with abuse, hate, and porn? Social Accounts What happens when abusers hijack the conversation with abuse, hate, and porn?
  • 13. Social Accounts Are social media accounts regulated? How do you give the business what they want but stay compliant? Social Accounts Are social media accounts regulated? How do you give the business what they want but stay compliant?
  • 14. SPAM Spammers have discovered social media. New techniques to detect spam need to be deployed. SPAM Spammers have discovered social media. New techniques to detect spam need to be deployed.
  • 15. Mass Protest Social Media is the perfect breeding ground for groups to vent their anger against a brand Every company is vulnerable Mass Protest Social Media is the perfect breeding ground for groups to vent their anger against a brand Every company is vulnerable
  • 16. ©2015 Gainsight. All Rights Reserved. Unique Challenges in the Industry • Customers come to us “after” a security incident • Buyers unfamiliar with technology • Cyber criminals continue to advance their techniques • Good customer training becoming increasingly important • Customer Success role becoming more technical in nature • Communication “style” is evolving quickly to meet customer needs
  • 17. ©2015 Gainsight. All Rights Reserved. Working with the Technical Buyer • Consider all of the risks: • Targeted attacks • Consequences of a breach • Compliance challenges • Litigation risk • What happens when a social account is hijacked?
  • 18. ©2015 Gainsight. All Rights Reserved. Structure • CSM’s part of larger customer facing organization: • Technical Support & Customer Service • Professional Services • Technical Account Managers (TAM’s) • Customer Success Managers (CSM’s) Smooth hand-off’s are critical to customer experience
  • 19. ©2015 Gainsight. All Rights Reserved. CSM Goals • Trusted security advisor • Various aspects of security and risk are front of the customer’s mind • Proactive customer communication • Seamless on-boarding process • Support case deflection • Service differentiation • Churn prevention • Customer satisfaction
  • 20. ©2015 Gainsight. All Rights Reserved. How its Evolved & Learnings • Being a trusted security advisor is a good thing • Proactive steps are more important than ever • Every company has a unique spin on the CSM role • The ability of the CSM to work with other customer facing teams is critical to success • CSM’s are critical to our customers’ success!
  • 21. ©2015 Gainsight. All Rights Reserved. THANK YOU

Notes de l'éditeur

  1. If your customer doesn’t see value from your product or service, there low switching costs, lots of options Low Barrier To Entry Fast customer acquisition Revenue growth potential You know so much more about your customer Speed of innovation Lower barrier to exit Large customer volumes Revenue growth expectations Multiple sources of data to manage Competitive landscape & fickle customer base ----- Meeting Notes (3/26/15 16:06) ----- Try to find a good slide to quantify the impact. Got to address this now. ----- Meeting Notes (3/26/15 16:32) ----- Change to circles Pay as you go pricing
  2. Protesters don’t have to meet in a physical place anymore Protests can spring up quickly and with little provocation