The cybersecurity market started with long sales cycles, difficult-to-deploy solutions, and unfriendly user experiences. Next-gen players then introduced his AI, automation, and cloud-native solutions. Today, a modern approach built around ease of use, open APIs and integrations, and intuitive workflows define Gen-3 cybersecurity. Kunal Agarwal, founder of dope.security said:
Enterprise cybersecurity revolves around solutions. How can businesses protect themselves from attackers and solve the use cases that plague them? From detecting if malware has already hijacked an endpoint, to malicious websites and personal Gmail. From preventing web access to web access to enforcing single sign-on, cybersecurity has a must-have set of controls for any organization.
One thing that hasn’t changed over the last few decades is that implementing cybersecurity is a bit of a pain. It is labor intensive, requires tool-specific training, and requires constant vendor interaction.this is 1st generation A cybersecurity expert with on-premises solutions that almost required a PhD. Get it up and running in your product. A must-have product had to sell with professional service over time. They most often needed sales engineers to help implement and translate incorrect or non-existent documentation.
Many of the problems stem from first-generation vendors’ on-premises architectures and legacy thinking. In the last 10 years, 2nd generation Led by Crowdstrike and SentinelOne. A months-long deployment process turned into a multi-tenant cloud architecture that doesn’t require dedicated hardware. Suppose there is a small bug in the management console. In that case, the customer can expect the issue to be resolved within three months rather than waiting his one year for the release and adding customer effort to manually upgrade the cybersecurity software.
In the meantime, first-generation vendors have attempted a lift-and-shift to the cloud and some catch-up innovations. However, they are still built on the same mindset and traditional backbone, making them difficult to deploy, not seamlessly integrated, and technical debt piling up.
Things got better, but vendors still needed a lot of people to sell and deploy their software, and administrators spent countless hours setting up the software. customer experience.
enter the third generation
Third generation products are born in the trenches of customer problems and complaints. From a simple question about how to use a product to a long six-month defect, engineering and product teams are fed up with problem-prone products. After all, how can you be proud of something that constantly breaks in your customer environment? Will your end-user employees end up complaining?
The focus has shifted to the user experience. And it’s not just about the beautiful UI. Ultimately, every step should be taken to ensure that the customer does not have to reach out for support and that there is no manual work for someone to do.
Let’s look at a simple example: Log in to the admin console.
All 1st and 2nd generation cybersecurity products have a login and tenant creation process. This has the following issues:
- What if the admin forgets the password?
- What if the initial email was incorrect in provisioning?
- What about 2FA?
These are *manual* solutions in large “enterprise” cybersecurity companies. You may need to contact another administrator within your company or submit a support request to the vendor. 2FA may not be implemented in the product by default, so we have to make a decision here. Onboarding process. Looking to implement SAML? Wait, that costs extra…
How easy would it be if you could instantly log in with your Microsoft 365 or Google Workspace account? No additional fees or hassles.
This example shows that Generation 1/2 cybersecurity companies still have terrible UX to accomplish something as simple as gaining secure access to a console. Digging deeper into the product, such areas permeate all aspects of the end-to-end effort to use technology.
see next: 7 Cybersecurity Trends for CISOs to Watch
Ease of use and deployment
The difference in focus here has to start from the very beginning of choosing to try the product. Getting a typical legacy cybersecurity system would require her webform requests to sales, discovery calls, multiple demos, and meetings before evaluating the technology. It’s an easy 4-6 week process.
In contrast, the third generation’s refocus to solve customer problems is aimed at removing barriers to entry. This method is similar to Product Led Growth (PLG), allowing end-her users to try the product and quickly establish a value proposition. As a matter of fact, most security professionals will be fine with the management console.
PLG gives customers access to real-time POCs through a self-service model, allowing them to consume their products in a frictionless manner. This is not necessarily a bottom-up approach. Employees can never be expected to install technology themselves. But at least the CISO or security architect gains confidence and familiarity without the involvement of sales or her PM.
Eliminating the month of product access increases trust in the product and company while putting customer needs first.
first class experience
A lot of this is easier said than done. As you can imagine, every team he member needs to have ground level experience with what goes wrong and where time his churn occurs with customer issues. But the most important factor in building third-generation cybersecurity is mindset.
Defects and support issues are often left for months and never fixed, especially in large companies. They are difficult to fix, but not impossible. Ultimately it comes down to the willingness of the PM and his engineering leaders to try to solve customer problems. Not at executive level.
This is a natural progression to the 3rd generation, focused on experience. Whether your customers are worth hundreds of thousands of dollars a year or have 10-15 users, ensuring a seamless experience is key. When they have a problem, help them solve it! The team puts a signature on their products that they are of high quality and free of defects (as far as we have verified).
Our pride in what we built combined with our humility to ensure that our customers’ problems were solved lays the foundation for an overall better, first-class experience.
How do you think Gen 3 makes cybersecurity more user-friendly? Share with us Facebook, twitterWhen LinkedIn.