Vitally Labs logo
Close icon

First Call Custom Brief

Here are some prompts to help you better understand your customer before jumping on that first call.

Illustration of a report and a phone surrounded by chat bubbles

Keep this handy!
Save your report now.

Print & Save
Icon of a key

Pain Points & Priorities

Based on your inputs, these are pain points your customer may be experiencing:

  1. Implementing a new security software solution can be complex and time-consuming, so your contact may be looking for guidance on best practices for deployment and onboarding.
  2. With the increasing number of cyber threats, your contact may be concerned about the security of their organization's data and looking for ways to strengthen their cybersecurity defenses.
  3. Collaboration between different teams and departments may be a challenge, so your contact may be interested in tools and strategies to improve communication and coordination within the organization.
  4. Visibility into the effectiveness of the security software and the impact it has on the organization's overall security posture may be important to your contact, so they may be seeking metrics and reporting capabilities to monitor their progress.
  5. As the primary point of contact for the security software within their organization, your contact may need support in demonstrating the value of the solution to upper management and securing buy-in for continued investment in security measures.
Icon of a key

Objectives & Key Results

Use these OKRs (objectives and key results) to help your customer find success:

  1. Understand the current pain points and challenges they are facing in terms of productivity, collaboration, and visibility within their organization. This will help tailor the solution to their specific needs.
  2. Identify the key stakeholders and decision-makers within the organization who will be involved in the implementation and adoption of the solution. Building relationships with them will be crucial for successful deployment.
  3. Gather insights on their current processes and workflows to assess where improvements can be made using the software. This will help in setting realistic expectations and planning for successful implementation.
  4. Educate the customer on best practices and potential use cases for the software to maximize its effectiveness and ROI. Providing training and resources can help ensure successful adoption and utilization by their team.
  5. Set clear goals and KPIs for the implementation of the software, such as increased efficiency, reduced manual work, or improved collaboration metrics. These objectives will serve as benchmarks to measure success and track progress over time.
Icon of a board with tactical drawings

Tactical Considerations

Consider these tactics and strategic initiatives your customer may be planning:

  1. Dealing with the challenge of managing and securing sensitive data in the digital age
  2. Need for better visibility into user activity and potential security threats within the organization
  3. Striving to streamline and automate security processes to improve efficiency and reduce human error
  4. Balancing the need for robust security measures with the desire to enable seamless collaboration and productivity among employees
  5. Constantly evolving threat landscape, requiring proactive measures to stay ahead of cyber threats and data breaches
Icon of 2 chat bubbles

Building Rapport

Suggestions for an effective first call and any future calls:

  1. Learn about your customer's current security software stack and any pain points they may have with their existing setup.
  2. Understand how they currently handle productivity, collaboration, and visibility within their organization and identify areas for improvement.
  3. Research their industry trends and challenges to speak knowledgably about how your software can help address those specific needs.

Keep this handy!
Save your report now.

Print & Save
Powered by ChatGPT Badge