Take Products To Top In Crowded Markets
Take products to top either by accelerating existing momentum or by executing precise pivots.
Skills Summary
With both a Stanford engineering and a development background, able to rapidly master a new product and assess its true value versus competitive offerings to prospect segments. Leveraging MBA marketing research focus, can help determine best land and expand path or help pivot to the right approach. Proven skills with leveraging bundles, solutions, pricing, services, and use cases that maximize value while minimizing development investment.
Scenario 1: Axiad was transitioning from a custom application provider to a SaaS provider of a powerful platform and standardized SaaS products. Response:
– Wrote nearly the entire website – exception is the partner section (www.axiad.com), including all products, solutions, etc.
- Created the core explainer video to articulate the problem space and Axiad differentiators https://www.axiad.com/resources/#video-1
– Created Use Cases (differentiated solutions for targeted prospect needs that only Axiad can provide). Sample:
- Authentication Lifecycle Management: https://www.axiad.com/blog/pdfviewer/use-case-authentication-at-scale
- Articulates key differentiator of being able to manage authenticators at scale
- Pragmatic Phishing Resistance for Enterprises: https://www.axiad.com/blog/pdfviewer/use-case-pragmatic-phishing-resistant-authentication-for-enterprises/
- Presents a quandary in the authentication technology landscape and how Axiad provides a range of solution
- PKI Modernization: https://www.axiad.com/blog/pdfviewer/use-case-public-key-infrastructure-pki-modernization/
- Presents a quandary in the Enterprise authentication technology landscape and how Axiad provides a range of solution
– Innovated Demand Gen Awareness “Top 5” collateral set for campaigns
- Top 5 Reasons to Leapfrog to Phishing Resistant Authentication: https://www.axiad.com/asset_top5_leapfrog_pra/
- Articulates why skipping interim technologies is a good idea
Scenario 2: Axiad pivoted to Government / Critical Infrastructure verticals. Response:
– Created Use Cases (differentiated solutions for targeted prospect needs that only Axiad can provide). Sample:
- Passwordless for Air Gapped and Critical Infrastructure: https://www.axiad.com/blog/pdfviewer/use-case-air-gapped-environments/
- Illustrates how a unique environment has unique attacks and so needs a different type of authentication
- Interim & Non-PIV Authentication: https://www.axiad.com/blog/pdfviewer/use-case-federal-interim-and-non-piv-authentication/
- Solves an issue where a new Federal employee can be without authentication for up to 6 months
- Pragmatic Phishing Resistance for Government: https://www.axiad.com/blog/pdfviewer/use-case-pragmatic-phishing-resistant-authentication-for-government/
- Presents a quandary in the Government authentication technology landscape and how Axiad provides a range of solutions
Scenario 3: Axiad needs to provide thought leadership and to sway organizations to "leapfrog" to passwordless authentication. Response:
– Blogs with a unique spin (since I left, another marketing team member is credited):
- The Top Attack Frontier is People: https://www.axiad.com/blog/top-attack-frontier-is-people/
- Analyzes current attack trends and makes conclusions that they will be a constant moving forward
- Roadmap blog: https://www.axiad.com/blog/phishing-resistant-authentication-for-everyone/
- Discusses how to efficiently transition to the best approach
- Technology tradeoffs: https://www.axiad.com/blog/cba-and-fido-one-other-or-both/
- Presents a contrarian approach – only a combination of technologies will work (that only Axiad provides, BTW)
Proof point: have led over 20 products and companies to market and thought leadership versus larger, entrenched competition.