Comprehensive software reviews to make better IT decisions
Ensure Your Customer Experience Is Awesome, Not Off-Putting
A proliferation of customer interaction channels and applications has brought new opportunities for the systematic collection and analysis of customer data. Many organizations are turning to artificial intelligence and machine learning to rapidly parse meaningful insights from voluminous customer data sets. Vendors are more than happy to oblige – from Salesforce’s Einstein to Adobe’s Sensei, customer experience vendors are baking powerful capabilities for customer intelligence into their platforms.
Big data and powerful analytics engines are quickly allowing the dream of “micro-segmentation” to be realized; this approach allows for ever-more granular segmentation, targeting, and positioning of product offerings to individual consumers. In a world where dynamic personalization and mass customization reigns supreme, the ability to target highly relevant offers to customers based on unique attributes offers a new frontier in value delivery.
However, micro-segmentation and customer analytics has a dark side: if not done properly, customers will perceive hyper-targeted offers as creepy rather than considerate. Consumer-centric organizations need to use customer data to drive effective decision making, but also need to be mindful of treading a fine line that ensures marketing campaigns seem genuine…and not akin to a data-driven stalker. For example, a campaign that targets customers using social media data collected from a Twitter handle can quickly have a chilling effect if the prospect was unaware their feed was not private. Alternatively, image analysis algorithms can be used to parse the age, gender and ethnicity of a customer posting on Instagram – but this too can make prospects raise eyebrows when the data is used to then target marketing messages towards them.
To use customer data effectively but avoid being perceived as intrusive, Info-Tech recommends reviewing the following considerations:
- Is the data being used to target customers in a manner that’s compliant with industry regulations? Certain industries (such as finance and healthcare) have stringent restrictions on the collection, use, and disposition of customer data. While firms in these industries may use aggregate data sets for trend analysis and forecasting, using data to target individual customers is often curtailed. If you’re in an industry with significant red tape, review the applicable legislation (such as HIPAA) to understand how you can – and can’t – use customer data.
- Do unto others as you would have done unto you. A simple but effective rule of thumb: ask yourself – if you (or a loved one) had marketing messages targeted at you based on the proposed segmentation approach, would you be comfortable with it? If the answer is anything less than “yes, absolutely,” you should re-consider the optics of the targeting approach.
- Use data to create differentiated service experiences, but judiciously apply it to outbound marketing. Product and service customization is a proven approach to generating repeat customers: rather than targeting potentially intrusive marketing messages using detailed customer data, use it for service delivery customization (for example, use it to tailor the experience that a customer has when signed into a portal). Customers are less likely to perceive a “creepiness” factor when micro-segmentation is used by companies they already have a pre-existing relationship with.
- If in doubt…ask. Many organizations fail to establish a voice of the customer (VoC) program. A VoC program involves having a customer advisory panel that can provide feedback on marketing, sales, and customer service initiatives. When considering new ways of using captured data to target your customers, vet your approach with a VoC panel – if they have reservations about how you intend to use customer data, they will surface concerns before you roll the program out more broadly.
By keeping these considerations in mind, you will help ensure that customer segmentation and targeting uses data in a helpful way that won’t hinder the company’s reputation.
- If you’re leveraging customer data to enhance market segmentation and targeting, establish a control point to review if it’s being used in a way that will not be perceived as intrusive by your customers.
- Review and parse regulatory guidelines for potential constraints on how you can target customers using captured data.
- Ask yourself “would I feel uncomfortable if customers reached out me using the types of data analysis that we plan to use?”
- Differentiate service experiences based on data first and foremost, rather than driving hyper-targeting for marketing campaigns.
- Establish a voice of the customer program to solicit feedback on proposed segmentation and targeting approaches.
Using data should help – not hinder – your customer segmentation and targeting programs. A common yet avoidable pitfall results when customer data is used in a way that’s considered inappropriate or “creepy” by your prospects and existing customers. Ensure you’re checking yourselves against a set of established criteria to prevent targeting efforts from being viewed pejoratively by your customer base.
Q headlines a bevy of announcements at AWS re:Invent 2023 in Las Vegas that shed more light on the cloud service provider’s AI strategy and where its differentiation from other vendors lies.
This note outlines some tips and tricks that you should be aware of when embarking on the installation and configuration of a Kubernetes cluster. Such an endeavor should only be attempted if the need for an enterprise-grade container orchestration solution is required.
It’s simply not enough today to pit your traditional application security toolkit against today’s advanced threats, especially those attacks that target APIs or mobile platforms. Bolstering your CI/CD pipeline by introducing more advanced and accurate SAST, SCA, IAST, and DAST will most certainly improve your security posture, but the journey does not end there. There are attacks and use cases that need careful consideration for how you approach security. Appdome believes it has those unknown challenges addressed and can significantly improve your application security program with very little effort from your development and security team, a welcome change from solutions that required a good bit of work to introduce problem-free into your code base four years ago.
This post provides a review of Zoom’s 2023 conference, Zoomtopia 2023. Core aspects covered include what major product releases and upgrades Zoom announced at Zoomtopia 2023, and what these announcements mean for Zoom’s market positioning in 2024.
Contact center as a service (CCaaS) enterprise providers are steamrollering ahead with embedding generative AI functionality in their platforms – whether organizations are prepared for it or not. In this post, I explore a positive outlook for how generative AI can be used to enhance organizations' customer experience capabilities while generating ROI. This includes: 1. Listing the major use cases for generative AI in the contact center. 2. Discussing how we might calculate ROI from utilizing generative AI in the contact center. 3. Considering what organizations can do to prepare for CCaaS vendors’ release of generative AI functionality.
In June 2023, I decided to remove the password on my primary email account as well as the one used to log-in to all of my devices. Did I wait too long? Am I too optimistic this will work without issue? Are there kinks that still need to be worked out? I recently attended Identiverse 2023 and got a FIDO2 hardware token intending at some point in the future to go passwordless. Why wait though? I was pumped up with all the passkey and passwordless sessions I attended and was eager to try this out and share my experience.
If you’re in the market for a password manager or are interested in secrets management, Bitwarden has a powerful platform for you. This unified platform is delivered via a thoughtful and intuitive UI, which Bitwarden Password Manager users will recognize. Bitwarden ranks as top of the Leader Quadrant in SoftwareReviews under the Password Management category, and the company believes its optimized, wide-range passwordless solution set will address most organizations’ needs.
Next-generation firewalls were smarter than previous firewalls, able to deeply analyze traffic and integrate with complementary security solutions. Today our needs are more complex, however, with a 742% increase in software supply chain attacks over the past three years. Sonatype Nexus Firewall has been paying attention and claims its firewall product is smarter about these attacks.
Have you ever thought of what else you could do to take your security operations center (SOC) to the next level and focus on prevention? Look no further – external attack surface management (EASM) was a popular managed service and topic of discussion at Rivest–Shamir–Adleman (RSA) Conference 2023, named after a popular public-key cryptosystem.