B2B Table
Key Considerations:
Criteria | ICP1: High-Growth Startup | ICP2: Large Enterprise |
---|---|---|
Name | ||
Company Size | 50-500 employees | 1000+ employees |
Location | Globally distributed (with a strong presence in US and Europe) | Globally distributed with a significant presence in major tech hubs (e.g., Silicon Valley, New York, London) |
Funding Raised | Series A-C funding | Well-funded with significant revenue streams |
Industry Domain | FinTech, EdTech, SaaS, Healthcare (with strong digital transformation initiatives) | Financial Services, Healthcare, Government, Manufacturing (highly regulated industries) |
Stage of the company | Rapid growth, scaling rapidly, expanding product offerings | Mature organization, established IT infrastructure, complex security needs |
Organization Structure | Agile, decentralized, fast-paced decision-making | Hierarchical, complex approval processes, multiple stakeholders |
Decision Maker | CTO, CISO, Head of Engineering, Security Architect | CISO, CIO, IT Director, Security Manager, multiple departments involved |
Decision Blocker | Budget constraints, competing priorities, fear of disruption | Security concerns, compliance requirements, integration challenges, long procurement cycles |
Frequency of use case | Daily, frequent deployments, continuous integration/continuous delivery (CI/CD) | Regular security assessments, compliance audits, incident response |
Products used in workplace | Cloud platforms (AWS, Azure, GCP), Kubernetes, microservices, DevOps tools (Jenkins, GitLab) | On-premises infrastructure, private/hybrid cloud, legacy systems, complex IT environments |
Organizational Goals | Accelerate innovation, improve time-to-market, enhance security posture, achieve compliance | Maintain data security and privacy, ensure regulatory compliance (e.g., GDPR, HIPAA), reduce risk, improve operational efficiency |
Preferred Outreach Channels | Industry events, online webinars, targeted advertising, social media, referrals | Industry conferences, direct mail, email campaigns, account-based marketing (ABM) |
Conversion Time | Short sales cycle (weeks to months) | Long sales cycle (months to years) |
GMV | High potential for rapid growth in revenue | High potential for significant revenue and long-term customer lifetime value |
Growth of company | High growth trajectory, expanding rapidly | Steady growth, established market presence |
Motivation | Improve security posture, gain a competitive advantage, reduce risk | Meet compliance requirements, mitigate threats, improve operational efficiency, reduce costs |
Organization Influence | Early adopters, willing to experiment with new technologies | Established security practices, may require strong proof of value and ROI |
Tools Utilized in workspace | Collaboration tools (Slack, Microsoft Teams), project management tools (Jira, Asana), communication platforms | Enterprise communication tools, ticketing systems, data loss prevention (DLP) solutions |
Decision Time | Fast decision-making, agile approach | Slower decision-making process, multiple stakeholders involved |
[Use this framework to prioritise your ICP's]
Criteria | Adoption Rate | โ Appetite to Pay | Frequency of Use Case โ | โ Distribution Potential | TAM ( users/currency) โ |
ICP 1 - Clint Health | High | Low | Low | Low | 5000 user |
ICP 2 - Pure Storage | High | High | High | High | 21,000 users |
From the ICP Prioritisation Framework, we can see that ICP 2 can be focused upon since the market for these users is larger enough and the the users have a good use case of the product! Now when we dig deeper into fleshing out the strategies for acquisition we will target them towards ICP 2 and ICP 5.
Goal Priority | Goal Type | ICP | JTBD | Validation Approach | Validation |
---|---|---|---|---|---|
Primary | Functional (Impress my boss and team) | Clint Health |
|
| Clint Health's development teams can deploy code quickly and securely without manual intervention or significant delays. |
Secondary | Functional (Impress my boss and team) | Pure Storage | "I want to simplify and automate my complex security operations while ensuring compliance with industry regulations." |
| My security teams can efficiently manage and respond to threats, meet compliance requirements, and reduce operational overhead. |
Take screenshots of each page of the interface, note each interaction and user touchpoint, and assess based on user empathy:
AccuKnox Onboarding Teardown - JAN'2025.pdf
<<Given that AccuKnox is currently in 10-20 B2B GTM & adoption journey, hence only adding the theoretical explanation for better understanding on Metrics>>
User Segmentation & Analysis
Product Feedback & Analysis
Brand focused courses
Great brands aren't built on clicks. They're built on trust. Craft narratives that resonate, campaigns that stand out, and brands that last.
All courses
Master every lever of growth โ from acquisition to retention, data to events. Pick a course, go deep, and apply it to your business right away.
Explore foundations by GrowthX
Built by Leaders From Amazon, CRED, Zepto, Hindustan Unilever, Flipkart, paytm & more
Crack a new job or a promotion with the Career Centre
Designed for mid-senior & leadership roles across growth, product, marketing, strategy & business
Learning Resources
Browse 500+ case studies, articles & resources the learning resources that you won't find on the internet.
Patienceโyouโre about to be impressed.