table of Contents
Overview
- Anniversary/Double Eleven projects, found more business problems;
- The customer’s team is small in size, lack of staff (one supervisor and two engineers), many business loopholes, frequent security issues, and promotional activities
- There is also competition, and the influence of some other security companies
Program
- Different focus content for technology and procurement
- Advanced blue penetration, well-known white hats, offensive and defensive laboratories [outstanding advantages]
- Vulnerability rating, vulnerability severity [delivery report]
- Training vulnerability principles, repair suggestions, closed-loop processing
- Layout the safety development project as a follow-up project
Ideas
- Key person: high-level talks about operation, internal talks about business, procurement talks about technology, middle-level people are opposed
- Key node: enter the procurement phase to control the pace of business, strengthen contact with internal supporters, and collect intelligence
- Middle-level supporters: reverse the attitude of the middle-level [price]
- High-level recognition: layout follow-up projects
Gain and Loss Analysis
- What does the customer want?
- Where is my position?
- How to identify the key person?
- How do customers comment on me & the company?
- Who has the final say?
- What are the customers thinking?
- How to deal with key people?
- How to use resources effectively?
- What to do in the face of competition?
Good place:
Communicate project information in a timely manner, get stuck in quotation, grasp the purchaser; pave the way for the development of safe projects, and strengthen customer relationships
To be improved:
Intervention time is late, high-level visits are not in place, core advantages are not implemented