For | working professions and families |
---|---|
...who | find online protection overwhelming |
...this solution | helps them feel safer, smarter, and in control of their online protection. |
Unlike | relying on google trends, news, at-risk companies, best judgement |
...this solution | requires them to spend time to second-guess their decisions. |
Feature | Description | How do users experience the value prop? | Natural frequency for engagement with features | Impact/Relatability to core value prop (Experience x Frequency) |
---|---|---|---|---|
3 PCs, Macs, tablets, or phone | Coverage for installing the app upto 3 PCs, Macs, tablets & phone (Android/iOS) | By adding the product to any device they own, and experiencing the features below. | As needed | Low |
Antivirus, malware, ransomware, and hacking protection | Award winning Antivirus, Firewall, Real time threat protection. [Some features will be limited in iOS, Mac] | When they are notified of IP infringement, malwares during download, browsing. | Continues - Real Time Scanning is enabled always, by default, only notifying when there is a risk. | Low |
100% Virus Protection Promise | When Auto-Renewal is turned on, and Norton is unable to remove a malware from your device(s), a full refund will be provided. | When a refund has been provided and the “Promise” is withheld. | Incidental | Medium |
50GB Cloud Backup | Store important files and documents as a preventive measure against data loss due to hard drive failures, stolen devices and even ransomware. | When they realize that they have an additional 50GB of secure storage of their files (additional to their standard iCloud/Drive storage) | Weekly (Customizable) | Medium |
VPN private internet connection | Help protect your data with a no-log virtual private network (VPN) that encrypts your personal information and doesn’t track or store your online activity or location. | Not applicable- Restricted in India | Not applicable- Restricted in India | Not applicable- Restricted in India |
Password Manager | Create and store strong passwords. Login to your accounts with a click of a button. | When they learn that they can create new strong passwords, store their passwords, credit cards, PII, and when are auto-logged in with their username & password. | Every time they need to sign in to a website/account | High |
Dark Web Monitoring | We monitor and notify you if we find your personal information on the Dark Web. | When they see that the PII they are monitoring is found in a breach, and there are recommended next steps on what to do. | Incidental- when their monitored PII is found in a breach. | High |
Parental Control | Manage your children's activities online. Help them explore, learn, and enjoy their connected world more safely on their PCs or smartphones. | When they see that they are able to keep a watch of their child’s online activity and can set policies to restrict usage. | On demand- whenever the customer chooses to | High |
Wifi Security | [Mobile only] Scans every Wi-fi the mobile is connected to and determines if its safe to stay connected to or not. | Lets them know if a Wi-Fi network they are connecting to is safe or not. | Every time their mobile connects to a Wi-Fi network for the first time. | Medium |
App security | [Mobile only] Scans all the apps installed in the mobile to determine if they are malicious, harvests data or are safe. | Lets them know if an app is safe, malicious or harvests data. | First value when they setup their mobile device. Every time an app is installed from play/app store | Low |
Safe Search/Internet Security | Monitors your browsing activity & lets you know if a website is safe or not. | Lets them know if the websites they visit are safe or not. | Every time the customer visits a website | High |
Considering there are a myriad & an eclectic blend of features as part of Norton 360 Deluxe that caters to multiple ICPs, the determination of an active user comes from the actions/outcomes achieved from 3 different features in the product:
Feature | Actions/Outcomes achieved for an active user | Example |
---|---|---|
Dark Web Monitoring | User has is monitoring atleast two different data type/PII apart from the email that is auto-monitored (during onboarding) and is reviewing 65% of the breaches, if applicable. | User has email abc@gmail.comauto-monitored (Not Active) User has manually setup monitoring for their secondary email/phone number/Insurance account/Credit card |
Password Manager | User has stored passwords for ALL of their frequently websites requiring sign-in with +40% of them using the password generator allowing them to auto-sign in to those websites 100% of the time. | User has their username + password stored in the password manager app for https://growthx.cc/—> The password created is using the in-built password manager —> When they visit the website, they choose to auto-sign in with the password manager. NOTE: Auto-Sign in to be excluded for Banking websites & sign-ins requiring OTPs. |
Parental Control | User (Parent) sets up the child’s device with the Norton Family app & restricts usage with the “Time” functionality every week. | Every week, the parent would setup X minutes of usage for the child to use their device with Norton Family app for those X Minutes. |
To determine the best engagement frameworks for our product, subsequently the features, we are only going to consider the features that ranked “High” in the relatability index above because:
Limiting the feature list:
Feature | Description | How do users experience the value prop? | Natural frequency for engagement with features | Impact/Relatability to core value prop (Experience x Frequency) |
---|---|---|---|---|
Password Manager | Create and store strong passwords. Login to your accounts with a click of a button. | When they learn that they can create new strong passwords, store their passwords, credit cards, PII, and when are auto-logged in with their username & password. | Every time they need to sign in to a website/account | High |
Dark Web Monitoring | We monitor and notify you if we find your personal information on the Dark Web. | When they see that the PII they are monitoring is found in a breach, and there are recommended next steps on what to do. | Incidental- when their monitored PII is found in a breach. | High |
Parental Control | Manage your children's activities online. Help them explore, learn, and enjoy their connected world more safely on their PCs or smartphones. | When they see that they are able to keep a watch of their child’s online activity and can set policies to restrict usage. | On demand- whenever the customer chooses to | High |
Safe Search/Internet Security | Monitors your browsing activity & lets you know if a website is safe or not. | Lets them know if the websites they visit are safe or not. | Every time the customer visits a website | High |
For these features, what does the engagement metric look like?
Assumption: Metrics & behavior for Safe Search & Password Manager are clubbed together because engagement and experiencing the value proposition for both occurs while they are browsing.
Engagement Framework | Key Tracking Metric | Selected | Rationale |
---|---|---|---|
Frequency | 1. Password Manager & Safe search- Engagement is atleast every timean user visits a website 2. Parental Control- Anytime a child wants to use a device (PC, mobile) for their leisure across any purposes - playing games, online, videos - daily3. Dark Web Monitoring - Anytime the PII monitored by the user is exposed in the Dark Web. | Not Applicable | While the natural frequency of some features are more, for Dark Web Monitoring it is not very frequent, by design, especially to experience the feature/product’s overall value proposition. |
Depth | 1. P assword Manager & Safe search- Value Proposition is experienced immediatelyupon visiting a website or while signing in. 2. Parental Control- Value Proposition is realized by parents assigning X hours/minutes of usagefor the child in the child’s device. 3. Dark Web Monitoring - PII exposure in Dark Web could include exposure of credit card data, that may or may not result in financial loss. | Secondary | Each of the features have additional action required to follow through. EG: A Dark Web Breach would tell a customer “next steps” to stay safe | Password Manager allows users to store their banking information securely - showing the overall product’s value proposition through depth of engagement in each product will not keep customers retained as they could use competitors for each of the solutions. However, depth of engagement, especially the time taken by customers in using each of the product is a good indicator of usability & understanding of the features themselves. |
Breadth🎇 | 1. Password Manager & Safe search- A websitethat is determined “ safe” by the feature allows and instills confidence in the user to sign-in/sign-upby creating & storing stronger passwords.2. P arental Control- A child browsing the internet will be notified if a website is safeor not by Safe Search, and restrictions(time spent, websites/videos watched) can be enforced by the Parent. 3. Dark Web Monitoring - If there are stronger passwordscreated for each account, only safe/securewebsites are visited (using Safe search, Password Manager), the likelihood of a Dark Web breachoccurring is lesser. | Primary | The most ideal method of engagement to show the overall value proposition of Norton - this is because ensuring that the discovery & engagement of each of the features by making each of the features interoperable with each other lets the customer know that Norton, as a package, meets them at their primary problem statement with solutions that are both relevant & contextual. Additionally, through this engagement model there are opportunities to increase the natural frequency through which each features show their value prop at various “Moment of Need”. |
For retrospection, below are the ICPs from Acquisition & Onboarding stages | Some of the characteristics have been omitted and only the ones relevant are retained.
Before that, what defines our casual, core & power users for the features that have a high relatability index + opportunity to work in tandem?
Breadth of features | How does a Casual user behave? | How does a Core user behave? | How does a Power user behave? |
---|---|---|---|
Dark Web Monitoring | User is monitoring email and another data type includingthe email that is auto-monitored (during onboarding) and is reviewing atleast 40% of the breaches, if applicable. | User is monitoring atleast two different data types excludingthe email that is auto-monitored (during onboarding) and is reviewing atleast 65% of the breaches, if applicable. For eg: One additional email + Phone number OR auto- monitored email (excluded) + phone number + credit card/insurance/gamer tag | User is monitoring atleast two different data types excludingthe email that is auto-monitored (during onboarding) and is reviewing atleast 85% of the breaches, if applicable. - Excluding auto-monitored email - phone number + any other data type (insurance, phone number, credit card) - If they are only monitoring auto-monitored email + phone number, engagement campaignto be sent if they have data types - if they don’t, ask them to share it to family & friends. If they dont want to, they are considered power users. |
Password Manager AND/OR Safe Search | User has stored multiple passwords to their password manager app and auto-sign in into 60% of the time. This excludes banking websites and sites requiring OTP sign-ins. | - User has stored passwords for ALL of their frequently websites requiring sign-in with - 30% of them using the password generator - Auto-signs in into those websites 75% of the time. This excludes banking websites and sites requiring OTP sign-ins. | - User has stored passwords for ALL of their frequently websites requiring sign-in with - 40% of them using the password generator - Auto-signs in into those websites 85% of the time. - Has data stored in either “wallet, address, favorites” section This excludes banking websites and sites requiring OTP sign-ins. |
Parental Control | User (Parent) sets up the child’s device with the Norton Family app & restricts usage with the “Time limit” functionality every week. | User (Parent) sets up with child’s device with the Norton Family app & restricts usage with the “Time limit” + “Parental Supervision” functionalities every week. | User (Parent) sets up with child’s device with the Norton Family app & restricts usage with the “Time limit” + “Parental Supervision” + “School time” functionalities every week. |
How many of these features do they use? | Any one | Any two | 3 features (If parental control is not used, safe search should be used) WHY?: Not everyone will have/want kids 🙂 |
Norton | ICP 1 | ICP 2 |
---|---|---|
Ideal customer profile name | Beatrix Kiddo | Luke Skywalker |
Age | 25-34 | 35-44 |
Goals | I want comprehensive online protection, all from one reputed provider. | It is my responsibility to protect the people I care about from online threats. |
Common/auxiliary goals | I rely on technology to live my best life | Its worth it to spend money upfront to avoid a negative event. | I rely on technology to live my best life | Its worth it to spend time & money upfront to avoid a negative event. |
Online Protection used (lifetime) | VPN, Password Manager, Free online tools for password, dark web monitoring, | Antivirus, Password manager, digital storage, VPN. |
Where do they spend time? (in order) | Social media, OTT, Retail/shopping, Music. | Social Media, Retail/Shopping, OTT, Banking/Financial |
Pain points | I get cold calls/spams constantly; I’m not sure where my data is how its being used; I use alot of online accounts and often re-use passwords as I cannot remember all of them. | I am afraid of my device being infected by a virus; I am very wary about credit card/bank/ID being used to commit fraud; I am unsure of how I can protect my family from online threats. |
Current solution | McAfee, Browser password managers, Trend Micro, Avast, have 15 email addresses with limited information. | Windows defender, Apple devices, McAfee, Trend Micro, Avast, limit internet accessibility, go to a bank for transactions. |
Features they value the most (per the product feature list) | Dark Web Monitoring, Password Manager, Would love VPN. | Dark Web Monitoring, Parental Control, Password Manager |
Time vs. money on product - which is more important? (per the product feature list) | I’m willing to spend the money (except for Antivirus) in very limited time, but this feature list “makes me want more” for the value. (Time < Money) | I’m willing to spend the time and money since it helps me protect other members in my family. (Time > Money) |
How do they prefer to interact with Norton’s features? | Expect to derive value effortlessly and quickly as I primarily use my mobile and I’m always on-the-go. | I am willing to take my time to explore what Norton has to offer, try out each feature that appeals to me. |
Active user type | Core | Core |
What does a “win” with Norton features look like? | Ensure that you give me quick & most relevant “Next steps” considering the money I have paid. | Tell me what I need to do to stay protected and I will follow guidance. |
Jobs to be Done | - Ensure all my online accounts have strong passwords. - Tell me if my PII is at risk of being mis-used. PII includes: Aadhar, PAN, phone number. | - Prevent unauthorized use of my credit cards & banking information. - Allow me to have visibility of my children’s activity online. |
Inclination & conditions to renew | If Norton did what was promised, I would consider renewing. | If my life was more at peace on online threats, I would definitely renew. |
Rules of engagement | I dont want to be spammed by emails or calls everytime to use a feature- I will use it if I like it. | If a feature is important to me, I will always use it; I do not mind if I’m being reminded to use it. |
What makes them Loyalists to Norton? | A product that is easy, gives them a sense of joy and is always one step ahead of the competition. | A product that adds meaning to their lives and others they care about, educates & provides them an avenue them how to tackle difficult situations. |
What makes them Champions to Norton? | The product will also need to be one step ahead of the problem it is trying to solve. | If you meet me exactly where & what I have a problem with, I will talk to others about you. |
What makes them disengaged with Norton? | If I need to perform the same, repetitive tasks then I will probably use the product less often. | While I don’t mind repetitive tasks, I would want some assurance & examples of how the product has helped me. |
What makes them hibernate from Norton? | If I think that the problem the product is trying to solve is never-ending, and something that has no means to an end, does not offer any promise with supplementary functions, then I will stop using it. | If the product doesn’t work at all or if its not something I can share with my family, then I might start looking at other options. |
Goal | User finds out Dark Web Monitoring is not just monitoring the PII they entered, but at relevant, contextual Moment of Needs. |
---|---|
Success Metric | User either/and sets up Password manager and/or Dark Web Monitoring from these hooks | User visits Dark Web Monitoring feature from this hook | Makes a core/casual user to a Power user. |
Current Alternative | Google search, just “knowing” the website is breached, changing passwords for ALL their accounts every week. |
Metrics to track | # of times a website was detected as safe vs. not safe, # of times user hovered over the banner, open rate of the banner, # of times dark web feature was setup, # times password manager was setup, # times user lands to either or both feature if they had already set it up and made a change. |
Ramp up milestones | Since its not a new functionality but just re-purposing an existing one with a new use case:
|
NOTE: If customers have not setup Internet Security, this product hook will run only on converted customers from Engagement Campaign - 3.
User flow
When Internet security/Safe Search is enabled in the browser and the customer visits a website, a scan is run in the background and:
The extension does this by scanning the reputation, security, category that the website belongs to. It also provides an option to ‘dispute’ the reputation, if you’re the website owner.
But, how can this be leveraged to show that Norton is not just showing them the website categories, but more context that truly tells the user if its safe or not?
Once the banner is expanded, they would see a description of the incident with context on what the impact was, the # of accounts exposed & what data has been exposed.
The customer does a quick google search and validates that this is accurate! - LinkedIn data breach. The experience then would differ based on the user segment:
What’s happening here?
Goal | User creates different passwords for each account they are creating irrespective of the websites and the degree of risk for each website would be compelling for them to create stronger passwords using the “password generator” functionality in Password Manager. |
---|---|
Success Metric | Users create passwords using the pwd. Generator X% of the times they read this message | Users setup an additional PII for monitoring in Dark Web Monitoring | Casual → Core users |
Current Alternative | Continue re-using passwords, rely on memory to retain passwords, write down passwords, use (unsecured) browser-saved passwords. |
Metrics to track | # users who organically use pwd generator vs. through this hook, “Time taken to track passwords” have changed from X time → Y time by using pwd generator, # users who setup dark web monitoring (and what data types) organically vs. through this hook. |
Ramp up milestones | Since its not a new functionality but just repurposing an existing one with a new use case: 1.Crawl: Start by showing only the prompt to use password generator to create a habit without any context2.Walk: Show prompt to use password generator using a contextual prompt (like in the example) to create a value-driven habit.3.Run: Show prompt with combination of dark web monitoring + password manager to show max value proposition. |
NOTE: If customers have not setup Password Manager, this product hook will run only on converted customers from Engagement Campaign - 2.
User flow
Today, an user has tries to add in a new account & password in the password manager feature, they are asked to enter the website, username & password.
There is an indicator that tells them the “strength” of the password and how long it would take someone to crack the password - which are great!
However, what product hooks can we implement that will drive engagement, habit & showcase the true value prop of the feature?
By creating a context driven need to create stronger passwords, we are:
Campaign brief:
Goal: Remind parents who have subscribed to Norton 360 Deluxe to setup Parental Control primarily through web via email.
Channel: Email.
Segment:
Frequency:
Once every 3 weeks for 3 months until a customer sets up/unsubscribes. See Engagement campaign-5 for after 3 months.
Success metrics:
Email open rate, CTR%, # unsubscribed, device email was opened in, completed journey (setup feature), journey drop off, customer support calls enquiring on how to setup/unable to setup, continues same level of engagement with the product after opening up the email.
Campaign brief:
Goal: Reminder subscribers that they are entitled for Password Manager by showing them the benefits of the feature and entice by how they can experience the full potential of the feature that compels them to set it up + engage with it frequently.
Channel: Email.
Segment
Frequency:
Once every 2 weeks for 3 months until a customer sets up the feature. See Engagement campaign-5 for after 3 months.
Success metrics:
Email open rate, CTR%, dropped while installing extension, device email was opened in, # of devices password manager ends up being used in, journey drop off, # of visits to the KB article in the email, customer support calls enquiring on how to setup/unable to setup, # of users who have setup and downloaded the recovery key.
Campaign brief:
Goal: Remind users to install the extension that handles safe search that will empower them with knowledge if the site is risky and part of a data breach or not.
Channel: Email.
Segment:
Frequency:
Once every 2 weeks for 2 months until a customer sets up the feature. See Engagement campaign-5 for after 2 months.
Success metrics:
Email open rate, CTR%, dropped while installing extension, device email was opened in, journey drop off, # who setup Dark Web Monitoring- what data types through this flow vs. organic, # risky sites detected vs. not detected (not risky), visits to KB article, # of calls to customer support on dark web monitoring.
Campaign brief:
Goal: Provide customers with awareness that they have Dark Web Monitoring and that they can monitor different data types.
Segment:
Channel: Mobile push notifications; in-app.
Frequency:
Once every month for 6 months until they setup all all data types except Gamer tag. See Engagement campaign-5 for after 6 months.
Success metrics:
Impressions, how many have turned off push notifications, CTR%, journey drop off, # who monitor data types (and which one), # of calls to customer support on dark web monitoring.
Campaign brief:
Goal: Reduce the number of emails & push notifications monthly by creating a report card of how Norton has protected & what actions is needed by the customer.
Segment:
●All paid subscribers
Channel: Mobile push notifications; in-app, email.
Frequency:
Monthly.
Success metrics:
Impressions of push notifications, email open rate, CTR% of notifications & email, # of “recommended actions” taken by customer.
An often overlooked aspect of Engagement in a Customer's lifecycle, especially for Consumer SaaS companies is Customer Support.
What does the engagement experience with Norton's Customer service look like?
Duration | Users | Retention rate% |
---|---|---|
M0 | 684,000 | 100% |
M3 | 451,440 | 66% |
M6 | 437,760 | 64% |
M9 | 424,080 | 62% |
M10 | 270,864 | 60% |
M11 | 403,560 | 59% |
M12 | 403,560 | 59% |
So, what really happens? Based on the pattern of usage and the timeline of curve flattening, and general usage of all features, Norton’s retention typically flattens by M6-M9 because while there are opportunities to create habit forming behaviours with the features available now, some of the other features like Antivirus has no scope and ends up having no value to our ICPs; same with features like Cloud backup. Additionally, time taken to “discover” each feature, even if valuable to customers is much longer and quite tedious.
As the customer reaches M10, they will be informed about Auto-Renewal (that is turned on by default).
But, what are the reasons for churn?
ICP 3 (Luke Skywalker) drives the best retention because:
Users who were acquired & activated from search organic channels, especially through expert reviews in YouTube are expected to drive the best retention because they were acquired through positive reviews from established tech-individuals and had intentionally searched for a specific use case/use case topic.
Users who have engaged with mobile devices more & who received campaigns through mobile are expected to retain more because the feature-wise engagement, interoperability are more robust & has less effort in the mobile app.
The features that drive the best retention, in order, are:
Voluntary Churn Reason | Perceives Inefficacy |
---|---|
Segment | Users who were core/power users initially but eventually hibernated. |
Goal | Reinforce how Norton has protected them despite them not being active. |
Offer | A report card showing customers how Norton heled customers to stay protected when they were active, and how Norton continued to protect them despite of them being inactive. This shows accomplishments from Norton making the user feel valued. |
Content | “Your were doing so well until {MONTH} with Norton, yet we had your back after that! See how we protected you in the last ten months! * Report card, like in the engagement campaigns for the last 10 months distinguishing pre vs. post from when they stopped engaging”” CTA: Take them to mobile/web detailed report card. Month12 can have a discount (optional) |
Frequency | Monthly until they renew |
Timing | M10. M11. M12 |
Channel | In-app notification, Email |
Success Metrics | Hibernate - Casual/Core/Power engagement, CTR%, email open rate, renewed yes/no, month that had the best CTR, engagement conversion, renewal. |
Voluntary Churn Reason | Don’t want to renew |
Segment | Core/Casual/Power Users who are on Auto renewal turning it off. |
Goal | Show the user how Norton has kept them safe since they started using Norton when they are trying to turn off their auto-renewal |
Offer | A report card showing customers how Norton heled customers to stay protected since they installed showing the customers that if they continue with auto-renewal and eventually renew, they can continue to reap these benefits. |
Content | “Before you cancel your Auto-Renewal, see what Norton has done for you! * Report card, like in the engagement campaigns since they started using it” If you keep Auto-Renewal on, you can continue to experience these benefits even after you renew!” CTA: Continue to turn off Auto renewaland Keep Auto-Renewal |
Frequency | When customers turn off their Auto-Renewal |
Timing | When customers click on the CTA “Turn off Renewal” in the app |
Channel | Mobile, Desktop, Web. |
Success Metrics | Customer response on CTA, month in which they wanted to turn it off to appropriately measure cohort retention and enable engagement campaigns. |
Voluntary Churn Reason | Dark Web Breaches not reviewed |
Segment | Core/Casual/Power Users have breaches to their monitored PII but have not taken any effort to review/assess what to do next or haven’t called into support. |
Goal | Reminding customers who have dis-engaged to start reviewing breaches to turn them into casual/core users. |
Offer | Reminding customers who have not reviewed their breaches by either prompting them to do so in their mobile app/web or by calling customer service establishes that Norton prioritizes and promotes users to stay safe. |
Content | “Some of your breaches are yet to be reviewed by you! * Remind users what type of PII breach they have with CTA to the mobile/web app dee-linking them to breach screen so they can view next steps needed. Another CTA to take them to Customer Support so a representative can help them with it”. |
Frequency | When customers leave their breach “open” for more than 2 months |
Timing | Every month until they perform either of the actions from the CTA’s |
Channel | Mobile, Desktop, Web. |
Success Metrics | Customer reviews the breach from the guidance provided in the app, type of PII breach, customer calls customer support (and the type of questions they have there). |
Voluntary Churn Reason | Don’t want to renew |
Segment | Core/Casual/Power Users who have never used AV/Security based products |
Goal | Test if customers who are not inclined to use AV/Security products have an appetite to use a bundle with only Privacy & Identity features. |
Offer | Create a bundle with only Identity & Privacy protection features at a lower price than Norton 360 Deluxe to test if customers that are churning/have already churned. |
Content | “ We have a new offer that might make you think!Introducing Norton Privacy Essentials- this is a all-in-one bundle that has only your favorite Privacy & Identity features that you have used in the past, without Anti Virus. What is better than this? Its only at half the price per year for the price you had paid for Norton 360 Deluxe!” CTA: Buy now |
Frequency | One-time - 2 variations of the message with the same proposed value prop sent bi-weekly |
Timing | Hibernating customers, customers who have not renewed- M13. |
Channel | Email. |
Success Metrics | Email open rate, CTR,%, CVR%, AOV, gross bookings, margin %. |
Voluntary Churn Reason | Not very knowledgeable |
Segment | Casual user who has only setup one feature. |
Goal | Test to see if customers, who are not very knowledgeable about the features offered to them will move from casual --> core --> power users by realizing the core value proposition. |
Offer | Test with a limited cohort of casual users by sending them an email offering a 1:1 onboarding session with a Privacy Advisor who will walk them through how to use the product/feature and set it up for them. If it succeeds, potentially create a new SKU with a bundled onboarding session at another price point. |
Content | “Looking for a masterclass with a Privacy Advisor? Schedule a 1-time call with a Privacy Advisor, at your convenient time, who will walk you through setting up your favorite features & how to use them!” CTA: Schedule a call now. |
Frequency | One-time - 2 variations of the message with the same offer sent bi-weekly |
Timing | Core customers, M4. |
Channel | Email, phone (customer support) |
Success Metrics | Email open rate, CTR,%, # who schedule call, # of features setup and which ones, average handle time for the call, CSAT for the call, renewal rate for cohort at M10-M12. |
Brand focused courses
Great brands aren't built on clicks. They're built on trust. Craft narratives that resonate, campaigns that stand out, and brands that last.
All courses
Master every lever of growth — from acquisition to retention, data to events. Pick a course, go deep, and apply it to your business right away.
Explore foundations by GrowthX
Built by Leaders From Amazon, CRED, Zepto, Hindustan Unilever, Flipkart, paytm & more
Crack a new job or a promotion with the Career Centre
Designed for mid-senior & leadership roles across growth, product, marketing, strategy & business
Learning Resources
Browse 500+ case studies, articles & resources the learning resources that you won't find on the internet.
Patience—you’re about to be impressed.