Configuration Repository

While, Zluri and Nurturev have already been collaborating on mitigating churn, carving out a whitespace analysis is instrumental to land expansion deals from customers.

Expansion and Churn Qualifiers Proposed

These are insights that may directly influence revenue and hence are highlighted as key insights whenever there are any expansion opportunities or churn risks.
Insight
Type of Whitespace
Description
Need expressed in Jobs New
Surge in jobs that mention needs that align with the offering or jobs that match key roles
Online Research
Surge in research (done by employees of an account) about specific topics aligned with the offering. This might indicate churn if the account has already purchased an offering and is still researching about the same offering.
Tool that can be replaced
Identified competing tool being used by an account that can be replaced
Team growth
Increase in more than 10% of the team size since the last renewal or sell, indicating an increase in need of licenses or volumes of usage
Price arbitrage
If the ARR of an account is considerably lesser than the ARR of other accounts that are comparable in team size
Usage surge
If the usage is consistently very close to the purchased usage limits (in terms of users or volume of usage)
Competitive research
Surge in research (done by employees of an account) about a competing tool or service
Change in “Specific Important Roles” Coming Up
If there are any new entrants or exits in the specific roles
Low Product Usage
If the usage for the key features sharply declines or stays consistently low.
There are no rows in this table

Configurations Needed


1. Product Line Overview

This table highlights what all products does Zluri sell and their associated pricing. This has two major benefits
a) What all whitespaces can possible arise ? (Via Product Lines)
b) Estimating the opportunity size/expansion potential (Via Pricing)
Product Line
Pricing Per User
Comments
$8/User/Month
$4/User/Month
$4/User/Month
$4/User/Month
There are no rows in this table

2. Research Topics - Product Line Mapping

This table maps the research topics to the respective product lines. Consequently, whenever online research around a topic takes place, we can attribute to the correct line.
Topic
SaaS Management
Access Management
Access Reviews
Access Request
There are no rows in this table

3. Account Purchased Product Lines

This is perhaps the most critical table where we establish what all products has an account already purchased. This helps us gauge the expansion potential of an account.
Account Product Line Map

4. Key Inputs for Relevant Jobs Identification

Value Type
SaaS Management
Access Management
Access Reviews
Description
Centralized control and optimization of SaaS applications.
Unified management for enterprise access control.
Automated tool for efficient and risk-reducing access reviews.
Specific Roles
IT Managers Finance Directors SaaS Operations Managers Procurement Officers Chief Technology Officers IT Procurement Managers
IT Security Managers System Administrators Network Administrators HR Managers Chief Information Security Officers IT Operations Managers
Compliance Officers IT Security Teams Audit Managers Risk Management Professionals Chief Compliance Officers Data Privacy Officers
Key Phrases
Enterprise software management Reduce SaaS expenditure SaaS contract management Software license optimization Cloud application tracking SaaS vendor evaluation Manage SaaS renewals SaaS application tracking Software expense control SaaS vendor management Cloud software analytics SaaS portfolio optimization SaaS usage metrics Application usage analytics Cost-saving software solutions Cloud service monitoring Software renewal management SaaS consolidation strategies License utilization analysis
Secure access control User access governance Identity management solutions Onboard/offboard automation Enterprise access security User authentication systems Access rights monitoring Secure access protocols Single sign-on solutions Employee access control Credential management Enterprise security policies IT access security Network access automation Privileged access management Identity governance Access rights automation User role management Data access security Centralized access setup
Security access reviews Audit compliance management Risk assessment automation IT compliance audits Review user permissions Automated policy enforcement Compliance management systems IT audit preparation Access verification processes User permissions auditing Risk assessment tools Regulatory compliance software Internal controls evaluation Audit trail systems Compliance reporting tools Access control reviews Security audit tools Automated review processes Risk mitigation strategies Periodic review schedules
There are no rows in this table

Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.