SlideShare a Scribd company logo
1 of 10
Download to read offline
2017 North American Cybersecurity
Awareness andTraining Platform
CustomerValue Leadership Award
BEST PRACTICES RESEARCH
© Frost & Sullivan 2017 2 “We Accelerate Growth”
Contents
Background and Company Performance ........................................................................3
Industry Challenges..............................................................................................3
Customer Impact and Business Impact of KnowBe4..................................................3
Conclusion...........................................................................................................6
Significance of Customer Value Leadership ....................................................................7
Understanding Customer Value Leadership....................................................................7
Key Benchmarking Criteria ....................................................................................8
Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best
Practices ...................................................................................................................8
The Intersection between 360-Degree Research and Best Practices Awards.......................9
Research Methodology ..........................................................................................9
About Frost & Sullivan ..............................................................................................10
BEST PRACTICES RESEARCH
© Frost & Sullivan 2017 3 “We Accelerate Growth”
Background and Company Performance
Industry Challenges
With the rapidly evolving world of internet crime, recent case-law requires organizations
to take "reasonable measures" to protect their networks, especially their last line of
defense—their employees. Many hackers are using so-called social engineering tactics to
target human reactions via phishing and spear-phishing emails to create an easy access
point to a company’s network, stealing data and consumers’ personal information—e.g.,
confidential documents, credit card numbers, and social security numbers, or worse, infect
the network with ransomware causing downtime. Phishing emails deceive vulnerable
employees by recreating or acting like legitimate emails from another employee, manager,
customer, or organization, and attempt to capture valuable information from the recipient.
With persistent threats such as these, organizations cannot solely rely on security
software solutions to prevent data breaches; they also need to educate employees to
react appropriately and identify scam emails. Currently phishing emails remain a
pervasive attack vector against organizations, boasting high success rate in acquiring
valuable information from their targets. Spear-phishing attacks deceive targets at a 90+
percent rate because they have a personalized element that manipulates a person into
believing an email is authentic. Hackers pose as a trusted source that people are familiar
with in an attempt to trick them into clicking on malicious links which prompt recipients to
type in confidential information such as their credentials, credit card information, and
critical organizational data or personal information.
Organizations cannot afford to leave inadequate security measures in place for their
network; however, many companies deploy only software solutions that do not provide
sufficient security, leaving organizations paying too much for second-rate technology.
Insufficient security solutions allow network attacks that devour a company’s capital and
revenue because recovery is expensive and breaches lose the trust of customers.
Finally, if for-profits and non-profits do not educate and train their employees on how to
identify and block social engineering attacks, these organizations will continue to fall
victim to criminal attacks via the internet and find themselves on tomorrow's front page.
KnowBe4’s Customer Impact and Business Impact
Florida-based KnowBe4 is a leader in the security awareness industry providing an
integrated phishing training and simulation platform to facilitate its clients’ need to
combat the ever-evolving hacker model. Leveraging nearly 30 years of experience and the
expertise of Kevin Mitnick, KnowBe4’s chief hacking officer and labeled “the most famous
hacker in the world,” the company serves over 14,000 customers worldwide to train
employees to "Think Before You Click". KnowBe4 understands that hackers try to leverage
human error to bypass logical faculty and deceive employees to attack organizations;
therefore, it provides a platform that focuses around combating those faults.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2017 4 “We Accelerate Growth”
Additionally, KnowBe4 has the world’s most extensive library of security awareness
training content—including videos, games, newsletters, interactive modules, and posters—
that improves employees’ Phish-prone™ percentage. On average, KnowBe4’s platform can
help organizations cut employees’ tendency to fall for phishing scams from nearly 16
percent to just 1.2 percent over the course of one year.
Unmatched Security Training and Simulated Phishing Solutions
The company’s new Automated Security Awareness Program (ASAP) is a free online tool
for IT professionals to customize and manage a training program by answering a
questionnaire about their organization—e.g., their industry, specific regulations, and
employees’ issues that need targeting. KnowBe4’s ASAP tool then suggests relevant
courses and allows IT professionals to create a training program and course schedule
specifically tailored to their organization’s needs. The platform takes the guesswork out of
the equation and allows quick deployment of KnowBe4’s security awareness training
solutions direct to employees.
Another new tool the company provides for free is Email Exposure Check Pro (EEC) that
conducts a deep web search on the email addresses of an organization that are publicly
available to detect the most at risk employees—e.g., email addresses included in data
breaches. The EEC reveals the email attack surface an organization needs to focus on, to
reduce a hacker’s chance of breaching the network. A third example is KnowBe4's free
Weak Password Test (WPT) tool helps clients recognize employees that are prone to using
non-complex or previously used passwords.
KnowBe4 provides clients with an unlimited use of over 1,500 phishing templates that
customers can email to their employees to simulate actual phishing emails—e.g., LinkedIn
IT support, Domino’s coupon, or a password reset—to test employees on how they
respond to phishing attempts. Clients can create custom templates and randomize their
delivery, allowing customers to see how employees react to various phishing attempts, re-
enforcing the need to pay attention to email content, and preventing employees from
warning each other (promoting personal reliance).
Organizations can utilize KnowBe4’s Social Engineering Indicators feature to teach
employees to recognize red flags in simulated phishing email fields—e.g., subject,
attachments, and body text. In the event an employee takes the bait, enterprises can
create mock landing pages to observe how far an employee will dive into the phishing
scam such as filling out forms with personal or confidential company information on an
outside webpage or website. Additionally, Second Chance is a feature that detects
questionable information within an email; it informs employees and asks if they wish to
proceed anyway. If they choose to continue, Second Chance gives them the option to go
"back in time" and roll back their decision.
Furthermore, KnowBe4’s clients can generate extensive reporting to show what
percentage of employees take the bait—or even answer back to the hackers—with a
BEST PRACTICES RESEARCH
© Frost & Sullivan 2017 5 “We Accelerate Growth”
breakdown on each person, allowing their internal security awareness team to focus its
efforts on employees who need help recognizing malicious emails. The company’s Smart
Groups feature is an ad-hoc, real-time query tool that allows organizations to search their
employee database through a customizable set of criteria, e.g., a manager’s name,
number of times an employee fails a test level, and date range. The feature is
comprehensive and customizable and updates employee data every 15 minutes or less for
near-time information through KnowBe4’s Active Directory Integration.
KnowBe4’s Smart Groups feature allows clients to upgrade the security level of each
employee, utilizing rules-driven phishing template deployment. For example, employees
are set to a certain difficulty level between 1 and 5—if they consistently pass or cannot
pass their current level, they are either promoted or demoted a phishing template level to
continue challenging their responses to phishing attempts.
AIDA™, a machine learning artificial intelligence platform, is a chatbot that simulates ways
that an attacker engages people through different channels—e.g., email, text message, or
voicemail. It aims to convince a target that the phishing methods are legitimate contact
attempts from outside organizations, such as their dentist’s office or Facebook. If an
employee replies (negatively or positively) AIDA will respond like a human and continue to
test employee response until a graded conclusion can be rendered from the interaction. The
platform is available through KnowBe4’s diamond level service.
The company understands that content is an essential aspect of information retention;
therefore, it creates materials in various forms for clients— for instance, ranging from
extremely corporate-friendly and "safe" to more edgy styles using humor. Different
content types are available to diamond level customers at no additional cost.
Customer-centric Solutions Promoting Extraordinary Company Growth
KnowBe4 consistently grows its company through customer and business acquisitions. The
company leverages inbound marketing techniques to earn potential clients’ trust via its
free tools that prove they are a leader in the cybersecurity training and simulation
industry. KnowBe4’s inbound sales staff—split between small and mid-sized businesses
and enterprises—is in-house, operating out of its Tampa Bay corporate office. Additionally,
the company generates leads from whitepapers, webinars, and building relationships with
companies through networking. KnowBe4’s momentum is a direct result of the methodical
way it approaches potential clients and maintains its innovative edge with its customer-
centric solutions.
The company’s growth velocity and trajectory—300 percent year-over-year increase—pave
the way to position it as the number one security awareness vendor by the first quarter of
2018, rapidly surpassing competing vendors in the space. KnowBe4 impresses Frost &
Sullivan with its quarter-to-quarter growth throughout 2017. For example, in Q3 of 2015,
its revenue were $2 million; however, by Q2 of 2017 revenues reached $14 million—with
the most significant quarter-to-quarter increase in Q4 of 2016, increasing revenues by $4
BEST PRACTICES RESEARCH
© Frost & Sullivan 2017 6 “We Accelerate Growth”
million. Due to its rapid growth, KnowBe4 is hiring employees to facilitate its growth and
innovations allowing it to serve its clients better as well as focus its efforts on marketing
to expand its global presence.
Contributing to its growth, KnowBe4 acquires companies that improve its offerings to
clients, such as Security Awareness Company (SAC), which was acquired for an
undisclosed amount and paid for itself in less than five months. The company recently
acquired Securable.io to further expand its security awareness training platform to bring
more value to its clients. Furthermore, private equity and venture capital (VC) investment
firms regularly approach the company, but until recently KnowBe4 consistently declined
because its positive cash flow does not require investments. However, recognizing a
partner as a globally respected brand that has deep relationships with enterprises across
industry verticals, KnowBe4 closed a deal in October 2017 with Goldman Sachs Growth
Equity to receive a Series B of $30 million funding to continue growing its brand across
industries globally.
Conclusion
More than ever, organizations need to protect their network environments and add their
employees as a last line of defense "human firewall." Many cybersecurity awareness
training and simulation platforms are insufficient and do not fulfill specific organizational
needs. KnowBe4 leverages its understanding of the behavior and logic of hackers and the
way people retain information to create the most comprehensive, best-in-class platform in
the security awareness training industry. With its customer-centric solutions, future-facing
innovations, company acquisitions, and strong overall performance, KnowBe4 earns Frost
& Sullivan’s 2017 Customer Value Leadership Award for its cybersecurity awareness and
training platform.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2017 7 “We Accelerate Growth”
Significance of Customer Value Leadership
Ultimately, growth in any organization depends upon customers purchasing from a
company and then making the decision to return time and again. Delighting customers is,
therefore, the cornerstone of any successful growth strategy. To achieve these dual goals
(growth and customer delight), an organization must be best-in-class in three key areas:
understanding demand, nurturing the brand, and differentiating from the competition.
Understanding Customer Value Leadership
Customer Value Leadership is defined and measured by two macro-level categories:
Customer Impact and Business Impact. These two sides work together to make customers
feel valued and confident in their products’ quality and long shelf life. This dual
satisfaction translates into repeat purchases and a high lifetime of customer value.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2017 8 “We Accelerate Growth”
Key Benchmarking Criteria
For the Customer Value Leadership Award, Frost & Sullivan analysts independently
evaluated two key factors—Customer Impact and Business Impact—according to the
criteria identified below.
Customer Impact
Criterion 1: Price/Performance Value
Criterion 2: Customer Purchase Experience
Criterion 3: Customer Ownership Experience
Criterion 4: Customer Service Experience
Criterion 5: Brand Equity
Business Impact
Criterion 1: Financial Performance
Criterion 2: Customer Acquisition
Criterion 3: Operational Efficiency
Criterion 4: Growth Potential
Criterion 5: Human Capital
Best Practices Recognition: 10 Steps to Researching,
Identifying, and Recognizing Best Practices
Frost & Sullivan analysts follow a 10-step process to evaluate Award candidates and
assess their fit with select best practice criteria. The reputation and integrity of the
Awards are based on close adherence to this process.
STEP OBJECTIVE KEY ACTIVITIES OUTPUT
1
Monitor,
target, and
screen
Identify Award recipient
candidates from around the
globe
• Conduct in-depth industry
research
• Identify emerging sectors
• Scan multiple geographies
Pipeline of candidates who
potentially meet all best-
practice criteria
2
Perform
360-degree
research
Perform comprehensive,
360-degree research on all
candidates in the pipeline
• Interview thought leaders
and industry practitioners
• Assess candidates’ fit with
best-practice criteria
• Rank all candidates
Matrix positioning of all
candidates’ performance
relative to one another
3
Invite
thought
leadership in
best
practices
Perform in-depth
examination of all candidates
• Confirm best-practice criteria
• Examine eligibility of all
candidates
• Identify any information gaps
Detailed profiles of all
ranked candidates
4
Initiate
research
director
review
Conduct an unbiased
evaluation of all candidate
profiles
• Brainstorm ranking options
• Invite multiple perspectives
on candidates’ performance
• Update candidate profiles
Final prioritization of all
eligible candidates and
companion best-practice
positioning paper
5
Assemble
panel of
industry
experts
Present findings to an expert
panel of industry thought
leaders
• Share findings
• Strengthen cases for
candidate eligibility
• Prioritize candidates
Refined list of prioritized
Award candidates
BEST PRACTICES RESEARCH
© Frost & Sullivan 2017 9 “We Accelerate Growth”
STEP OBJECTIVE KEY ACTIVITIES OUTPUT
6
Conduct
global
industry
review
Build consensus on Award
candidates’ eligibility
• Hold global team meeting to
review all candidates
• Pressure-test fit with criteria
• Confirm inclusion of all
eligible candidates
Final list of eligible Award
candidates, representing
success stories worldwide
7
Perform
quality check
Develop official Award
consideration materials
• Perform final performance
benchmarking activities
• Write nominations
• Perform quality review
High-quality, accurate, and
creative presentation of
nominees’ successes
8
Reconnect
with panel of
industry
experts
Finalize the selection of the
best-practice Award recipient
• Review analysis with panel
• Build consensus
• Select recipient
Decision on which company
performs best against all
best-practice criteria
9
Communicate
recognition
Inform Award recipient of
Award recognition
• Inspire the organization for
continued success
• Celebrate the recipient’s
performance
Announcement of Award
and plan for how recipient
can use the Award
10
Take
strategic
action
Upon licensing, company is
able to share Award news
with stakeholders and
customers
• Coordinate media outreach
• Design a marketing plan
• Assess Award’s role in future
strategic planning
Widespread awareness of
recipient’s Award status
among investors, media
personnel, and employees
The Intersection between 360-Degree Research and Best
Practices Awards
Research Methodology
Frost & Sullivan’s 360-degree research
methodology represents the analytical
rigor of our research process. It offers a
360-degree-view of industry challenges,
trends, and issues by integrating all 7 of
Frost & Sullivan's research methodologies.
Too often companies make important
growth decisions based on a narrow
understanding of their environment,
leading to errors of both omission and
commission. Successful growth strategies
are founded on a thorough understanding
of market, technical, economic, financial,
customer, best practices, and
demographic analyses. The integration of
these research disciplines into the 360-
degree research methodology provides an
evaluation platform for benchmarking
industry participants and for identifying those performing at best-in-class levels.
360-DEGREE RESEARCH: SEEING ORDER IN
THE CHAOS
BEST PRACTICES RESEARCH
© Frost & Sullivan 2017 10 “We Accelerate Growth”
About Frost & Sullivan
Frost & Sullivan, the Growth Partnership Company, enables clients to accelerate growth
and achieve best-in-class positions in growth, innovation and leadership. The company's
Growth Partnership Service provides the CEO and the CEO's Growth Team with disciplined
research and best practice models to drive the generation, evaluation and implementation
of powerful growth strategies. Frost & Sullivan leverages more than 50 years of
experience in partnering with Global 1000 companies, emerging businesses, and the
investment community from 45 offices on six continents. To join our Growth Partnership,
please visit http://www.frost.com.

More Related Content

Similar to KnowBe4 Award Write Up

Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docxsodhi3
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenCMR WORLD TECH
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
KnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfKnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfahmad661583
 
Proofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write UpProofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write UpClaudia Toscano
 
EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...ssuser2d55aa
 
The Elaboration of a Strategy in Digital Marketing & Procedures Automation
The Elaboration of a Strategy in Digital Marketing & Procedures AutomationThe Elaboration of a Strategy in Digital Marketing & Procedures Automation
The Elaboration of a Strategy in Digital Marketing & Procedures AutomationEya tborski
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxjeanettehully
 
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxArindamGhosal6
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docxArindamGhosal6
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analyticsJim Kaplan CIA CFE
 
Account Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full ProtectionAccount Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full ProtectionKalin Hitrov
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingDanielle Bowers
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Laura Benitez
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docxharrisonhoward80223
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityDavid X Martin
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityRahul Tyagi
 

Similar to KnowBe4 Award Write Up (20)

Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
KnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfKnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdf
 
Proofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write UpProofpoint Security Awareness Award Write Up
Proofpoint Security Awareness Award Write Up
 
EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...
 
The Elaboration of a Strategy in Digital Marketing & Procedures Automation
The Elaboration of a Strategy in Digital Marketing & Procedures AutomationThe Elaboration of a Strategy in Digital Marketing & Procedures Automation
The Elaboration of a Strategy in Digital Marketing & Procedures Automation
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
 
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docx
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
Account Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full ProtectionAccount Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full Protection
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
 
Spear Phishing
Spear PhishingSpear Phishing
Spear Phishing
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docx
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe Security
 

More from Claudia Toscano

Compliancequest Award Write Up
Compliancequest Award Write UpCompliancequest Award Write Up
Compliancequest Award Write UpClaudia Toscano
 
Siemens Healthineers Award Write Up
Siemens Healthineers Award Write UpSiemens Healthineers Award Write Up
Siemens Healthineers Award Write UpClaudia Toscano
 
Proofpoint Email Security Award Write Up
Proofpoint  Email Security Award Write UpProofpoint  Email Security Award Write Up
Proofpoint Email Security Award Write UpClaudia Toscano
 
WENZEL Group GmbH & Co. KG
WENZEL Group GmbH & Co. KGWENZEL Group GmbH & Co. KG
WENZEL Group GmbH & Co. KGClaudia Toscano
 
Intermedia Award Write Up
Intermedia Award Write UpIntermedia Award Write Up
Intermedia Award Write UpClaudia Toscano
 
NanoXplore Award Write Up
NanoXplore Award Write UpNanoXplore Award Write Up
NanoXplore Award Write UpClaudia Toscano
 
Zf Friedrichshafen Award Write Up
Zf Friedrichshafen Award Write UpZf Friedrichshafen Award Write Up
Zf Friedrichshafen Award Write UpClaudia Toscano
 
INTEGRA Bioscience Award Write Up
INTEGRA Bioscience Award Write UpINTEGRA Bioscience Award Write Up
INTEGRA Bioscience Award Write UpClaudia Toscano
 
Zonar Systems Award Write Up
Zonar Systems Award Write UpZonar Systems Award Write Up
Zonar Systems Award Write UpClaudia Toscano
 

More from Claudia Toscano (20)

Compliancequest Award Write Up
Compliancequest Award Write UpCompliancequest Award Write Up
Compliancequest Award Write Up
 
Flex Award Write Up
Flex Award Write UpFlex Award Write Up
Flex Award Write Up
 
Guardhat Award Write Up
Guardhat Award Write UpGuardhat Award Write Up
Guardhat Award Write Up
 
Siemens Healthineers Award Write Up
Siemens Healthineers Award Write UpSiemens Healthineers Award Write Up
Siemens Healthineers Award Write Up
 
Proofpoint Email Security Award Write Up
Proofpoint  Email Security Award Write UpProofpoint  Email Security Award Write Up
Proofpoint Email Security Award Write Up
 
WENZEL Group GmbH & Co. KG
WENZEL Group GmbH & Co. KGWENZEL Group GmbH & Co. KG
WENZEL Group GmbH & Co. KG
 
Biamp Award Write Up
Biamp Award Write UpBiamp Award Write Up
Biamp Award Write Up
 
Intermedia Award Write Up
Intermedia Award Write UpIntermedia Award Write Up
Intermedia Award Write Up
 
Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write Up
 
GenCell Award Write Up
GenCell Award Write UpGenCell Award Write Up
GenCell Award Write Up
 
Huawei Award Write Up
Huawei Award Write UpHuawei Award Write Up
Huawei Award Write Up
 
NanoXplore Award Write Up
NanoXplore Award Write UpNanoXplore Award Write Up
NanoXplore Award Write Up
 
3M Award Write Up
3M Award Write Up3M Award Write Up
3M Award Write Up
 
3M Award Write Up
3M Award Write Up3M Award Write Up
3M Award Write Up
 
Zf Friedrichshafen Award Write Up
Zf Friedrichshafen Award Write UpZf Friedrichshafen Award Write Up
Zf Friedrichshafen Award Write Up
 
Koxka Award Write Up
Koxka Award Write UpKoxka Award Write Up
Koxka Award Write Up
 
Optum Award Write Up
Optum Award Write UpOptum Award Write Up
Optum Award Write Up
 
INTEGRA Bioscience Award Write Up
INTEGRA Bioscience Award Write UpINTEGRA Bioscience Award Write Up
INTEGRA Bioscience Award Write Up
 
Zonar Systems Award Write Up
Zonar Systems Award Write UpZonar Systems Award Write Up
Zonar Systems Award Write Up
 
Perstorp Award Write Up
Perstorp Award Write UpPerstorp Award Write Up
Perstorp Award Write Up
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

KnowBe4 Award Write Up

  • 1. 2017 North American Cybersecurity Awareness andTraining Platform CustomerValue Leadership Award
  • 2. BEST PRACTICES RESEARCH © Frost & Sullivan 2017 2 “We Accelerate Growth” Contents Background and Company Performance ........................................................................3 Industry Challenges..............................................................................................3 Customer Impact and Business Impact of KnowBe4..................................................3 Conclusion...........................................................................................................6 Significance of Customer Value Leadership ....................................................................7 Understanding Customer Value Leadership....................................................................7 Key Benchmarking Criteria ....................................................................................8 Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best Practices ...................................................................................................................8 The Intersection between 360-Degree Research and Best Practices Awards.......................9 Research Methodology ..........................................................................................9 About Frost & Sullivan ..............................................................................................10
  • 3. BEST PRACTICES RESEARCH © Frost & Sullivan 2017 3 “We Accelerate Growth” Background and Company Performance Industry Challenges With the rapidly evolving world of internet crime, recent case-law requires organizations to take "reasonable measures" to protect their networks, especially their last line of defense—their employees. Many hackers are using so-called social engineering tactics to target human reactions via phishing and spear-phishing emails to create an easy access point to a company’s network, stealing data and consumers’ personal information—e.g., confidential documents, credit card numbers, and social security numbers, or worse, infect the network with ransomware causing downtime. Phishing emails deceive vulnerable employees by recreating or acting like legitimate emails from another employee, manager, customer, or organization, and attempt to capture valuable information from the recipient. With persistent threats such as these, organizations cannot solely rely on security software solutions to prevent data breaches; they also need to educate employees to react appropriately and identify scam emails. Currently phishing emails remain a pervasive attack vector against organizations, boasting high success rate in acquiring valuable information from their targets. Spear-phishing attacks deceive targets at a 90+ percent rate because they have a personalized element that manipulates a person into believing an email is authentic. Hackers pose as a trusted source that people are familiar with in an attempt to trick them into clicking on malicious links which prompt recipients to type in confidential information such as their credentials, credit card information, and critical organizational data or personal information. Organizations cannot afford to leave inadequate security measures in place for their network; however, many companies deploy only software solutions that do not provide sufficient security, leaving organizations paying too much for second-rate technology. Insufficient security solutions allow network attacks that devour a company’s capital and revenue because recovery is expensive and breaches lose the trust of customers. Finally, if for-profits and non-profits do not educate and train their employees on how to identify and block social engineering attacks, these organizations will continue to fall victim to criminal attacks via the internet and find themselves on tomorrow's front page. KnowBe4’s Customer Impact and Business Impact Florida-based KnowBe4 is a leader in the security awareness industry providing an integrated phishing training and simulation platform to facilitate its clients’ need to combat the ever-evolving hacker model. Leveraging nearly 30 years of experience and the expertise of Kevin Mitnick, KnowBe4’s chief hacking officer and labeled “the most famous hacker in the world,” the company serves over 14,000 customers worldwide to train employees to "Think Before You Click". KnowBe4 understands that hackers try to leverage human error to bypass logical faculty and deceive employees to attack organizations; therefore, it provides a platform that focuses around combating those faults.
  • 4. BEST PRACTICES RESEARCH © Frost & Sullivan 2017 4 “We Accelerate Growth” Additionally, KnowBe4 has the world’s most extensive library of security awareness training content—including videos, games, newsletters, interactive modules, and posters— that improves employees’ Phish-prone™ percentage. On average, KnowBe4’s platform can help organizations cut employees’ tendency to fall for phishing scams from nearly 16 percent to just 1.2 percent over the course of one year. Unmatched Security Training and Simulated Phishing Solutions The company’s new Automated Security Awareness Program (ASAP) is a free online tool for IT professionals to customize and manage a training program by answering a questionnaire about their organization—e.g., their industry, specific regulations, and employees’ issues that need targeting. KnowBe4’s ASAP tool then suggests relevant courses and allows IT professionals to create a training program and course schedule specifically tailored to their organization’s needs. The platform takes the guesswork out of the equation and allows quick deployment of KnowBe4’s security awareness training solutions direct to employees. Another new tool the company provides for free is Email Exposure Check Pro (EEC) that conducts a deep web search on the email addresses of an organization that are publicly available to detect the most at risk employees—e.g., email addresses included in data breaches. The EEC reveals the email attack surface an organization needs to focus on, to reduce a hacker’s chance of breaching the network. A third example is KnowBe4's free Weak Password Test (WPT) tool helps clients recognize employees that are prone to using non-complex or previously used passwords. KnowBe4 provides clients with an unlimited use of over 1,500 phishing templates that customers can email to their employees to simulate actual phishing emails—e.g., LinkedIn IT support, Domino’s coupon, or a password reset—to test employees on how they respond to phishing attempts. Clients can create custom templates and randomize their delivery, allowing customers to see how employees react to various phishing attempts, re- enforcing the need to pay attention to email content, and preventing employees from warning each other (promoting personal reliance). Organizations can utilize KnowBe4’s Social Engineering Indicators feature to teach employees to recognize red flags in simulated phishing email fields—e.g., subject, attachments, and body text. In the event an employee takes the bait, enterprises can create mock landing pages to observe how far an employee will dive into the phishing scam such as filling out forms with personal or confidential company information on an outside webpage or website. Additionally, Second Chance is a feature that detects questionable information within an email; it informs employees and asks if they wish to proceed anyway. If they choose to continue, Second Chance gives them the option to go "back in time" and roll back their decision. Furthermore, KnowBe4’s clients can generate extensive reporting to show what percentage of employees take the bait—or even answer back to the hackers—with a
  • 5. BEST PRACTICES RESEARCH © Frost & Sullivan 2017 5 “We Accelerate Growth” breakdown on each person, allowing their internal security awareness team to focus its efforts on employees who need help recognizing malicious emails. The company’s Smart Groups feature is an ad-hoc, real-time query tool that allows organizations to search their employee database through a customizable set of criteria, e.g., a manager’s name, number of times an employee fails a test level, and date range. The feature is comprehensive and customizable and updates employee data every 15 minutes or less for near-time information through KnowBe4’s Active Directory Integration. KnowBe4’s Smart Groups feature allows clients to upgrade the security level of each employee, utilizing rules-driven phishing template deployment. For example, employees are set to a certain difficulty level between 1 and 5—if they consistently pass or cannot pass their current level, they are either promoted or demoted a phishing template level to continue challenging their responses to phishing attempts. AIDA™, a machine learning artificial intelligence platform, is a chatbot that simulates ways that an attacker engages people through different channels—e.g., email, text message, or voicemail. It aims to convince a target that the phishing methods are legitimate contact attempts from outside organizations, such as their dentist’s office or Facebook. If an employee replies (negatively or positively) AIDA will respond like a human and continue to test employee response until a graded conclusion can be rendered from the interaction. The platform is available through KnowBe4’s diamond level service. The company understands that content is an essential aspect of information retention; therefore, it creates materials in various forms for clients— for instance, ranging from extremely corporate-friendly and "safe" to more edgy styles using humor. Different content types are available to diamond level customers at no additional cost. Customer-centric Solutions Promoting Extraordinary Company Growth KnowBe4 consistently grows its company through customer and business acquisitions. The company leverages inbound marketing techniques to earn potential clients’ trust via its free tools that prove they are a leader in the cybersecurity training and simulation industry. KnowBe4’s inbound sales staff—split between small and mid-sized businesses and enterprises—is in-house, operating out of its Tampa Bay corporate office. Additionally, the company generates leads from whitepapers, webinars, and building relationships with companies through networking. KnowBe4’s momentum is a direct result of the methodical way it approaches potential clients and maintains its innovative edge with its customer- centric solutions. The company’s growth velocity and trajectory—300 percent year-over-year increase—pave the way to position it as the number one security awareness vendor by the first quarter of 2018, rapidly surpassing competing vendors in the space. KnowBe4 impresses Frost & Sullivan with its quarter-to-quarter growth throughout 2017. For example, in Q3 of 2015, its revenue were $2 million; however, by Q2 of 2017 revenues reached $14 million—with the most significant quarter-to-quarter increase in Q4 of 2016, increasing revenues by $4
  • 6. BEST PRACTICES RESEARCH © Frost & Sullivan 2017 6 “We Accelerate Growth” million. Due to its rapid growth, KnowBe4 is hiring employees to facilitate its growth and innovations allowing it to serve its clients better as well as focus its efforts on marketing to expand its global presence. Contributing to its growth, KnowBe4 acquires companies that improve its offerings to clients, such as Security Awareness Company (SAC), which was acquired for an undisclosed amount and paid for itself in less than five months. The company recently acquired Securable.io to further expand its security awareness training platform to bring more value to its clients. Furthermore, private equity and venture capital (VC) investment firms regularly approach the company, but until recently KnowBe4 consistently declined because its positive cash flow does not require investments. However, recognizing a partner as a globally respected brand that has deep relationships with enterprises across industry verticals, KnowBe4 closed a deal in October 2017 with Goldman Sachs Growth Equity to receive a Series B of $30 million funding to continue growing its brand across industries globally. Conclusion More than ever, organizations need to protect their network environments and add their employees as a last line of defense "human firewall." Many cybersecurity awareness training and simulation platforms are insufficient and do not fulfill specific organizational needs. KnowBe4 leverages its understanding of the behavior and logic of hackers and the way people retain information to create the most comprehensive, best-in-class platform in the security awareness training industry. With its customer-centric solutions, future-facing innovations, company acquisitions, and strong overall performance, KnowBe4 earns Frost & Sullivan’s 2017 Customer Value Leadership Award for its cybersecurity awareness and training platform.
  • 7. BEST PRACTICES RESEARCH © Frost & Sullivan 2017 7 “We Accelerate Growth” Significance of Customer Value Leadership Ultimately, growth in any organization depends upon customers purchasing from a company and then making the decision to return time and again. Delighting customers is, therefore, the cornerstone of any successful growth strategy. To achieve these dual goals (growth and customer delight), an organization must be best-in-class in three key areas: understanding demand, nurturing the brand, and differentiating from the competition. Understanding Customer Value Leadership Customer Value Leadership is defined and measured by two macro-level categories: Customer Impact and Business Impact. These two sides work together to make customers feel valued and confident in their products’ quality and long shelf life. This dual satisfaction translates into repeat purchases and a high lifetime of customer value.
  • 8. BEST PRACTICES RESEARCH © Frost & Sullivan 2017 8 “We Accelerate Growth” Key Benchmarking Criteria For the Customer Value Leadership Award, Frost & Sullivan analysts independently evaluated two key factors—Customer Impact and Business Impact—according to the criteria identified below. Customer Impact Criterion 1: Price/Performance Value Criterion 2: Customer Purchase Experience Criterion 3: Customer Ownership Experience Criterion 4: Customer Service Experience Criterion 5: Brand Equity Business Impact Criterion 1: Financial Performance Criterion 2: Customer Acquisition Criterion 3: Operational Efficiency Criterion 4: Growth Potential Criterion 5: Human Capital Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best Practices Frost & Sullivan analysts follow a 10-step process to evaluate Award candidates and assess their fit with select best practice criteria. The reputation and integrity of the Awards are based on close adherence to this process. STEP OBJECTIVE KEY ACTIVITIES OUTPUT 1 Monitor, target, and screen Identify Award recipient candidates from around the globe • Conduct in-depth industry research • Identify emerging sectors • Scan multiple geographies Pipeline of candidates who potentially meet all best- practice criteria 2 Perform 360-degree research Perform comprehensive, 360-degree research on all candidates in the pipeline • Interview thought leaders and industry practitioners • Assess candidates’ fit with best-practice criteria • Rank all candidates Matrix positioning of all candidates’ performance relative to one another 3 Invite thought leadership in best practices Perform in-depth examination of all candidates • Confirm best-practice criteria • Examine eligibility of all candidates • Identify any information gaps Detailed profiles of all ranked candidates 4 Initiate research director review Conduct an unbiased evaluation of all candidate profiles • Brainstorm ranking options • Invite multiple perspectives on candidates’ performance • Update candidate profiles Final prioritization of all eligible candidates and companion best-practice positioning paper 5 Assemble panel of industry experts Present findings to an expert panel of industry thought leaders • Share findings • Strengthen cases for candidate eligibility • Prioritize candidates Refined list of prioritized Award candidates
  • 9. BEST PRACTICES RESEARCH © Frost & Sullivan 2017 9 “We Accelerate Growth” STEP OBJECTIVE KEY ACTIVITIES OUTPUT 6 Conduct global industry review Build consensus on Award candidates’ eligibility • Hold global team meeting to review all candidates • Pressure-test fit with criteria • Confirm inclusion of all eligible candidates Final list of eligible Award candidates, representing success stories worldwide 7 Perform quality check Develop official Award consideration materials • Perform final performance benchmarking activities • Write nominations • Perform quality review High-quality, accurate, and creative presentation of nominees’ successes 8 Reconnect with panel of industry experts Finalize the selection of the best-practice Award recipient • Review analysis with panel • Build consensus • Select recipient Decision on which company performs best against all best-practice criteria 9 Communicate recognition Inform Award recipient of Award recognition • Inspire the organization for continued success • Celebrate the recipient’s performance Announcement of Award and plan for how recipient can use the Award 10 Take strategic action Upon licensing, company is able to share Award news with stakeholders and customers • Coordinate media outreach • Design a marketing plan • Assess Award’s role in future strategic planning Widespread awareness of recipient’s Award status among investors, media personnel, and employees The Intersection between 360-Degree Research and Best Practices Awards Research Methodology Frost & Sullivan’s 360-degree research methodology represents the analytical rigor of our research process. It offers a 360-degree-view of industry challenges, trends, and issues by integrating all 7 of Frost & Sullivan's research methodologies. Too often companies make important growth decisions based on a narrow understanding of their environment, leading to errors of both omission and commission. Successful growth strategies are founded on a thorough understanding of market, technical, economic, financial, customer, best practices, and demographic analyses. The integration of these research disciplines into the 360- degree research methodology provides an evaluation platform for benchmarking industry participants and for identifying those performing at best-in-class levels. 360-DEGREE RESEARCH: SEEING ORDER IN THE CHAOS
  • 10. BEST PRACTICES RESEARCH © Frost & Sullivan 2017 10 “We Accelerate Growth” About Frost & Sullivan Frost & Sullivan, the Growth Partnership Company, enables clients to accelerate growth and achieve best-in-class positions in growth, innovation and leadership. The company's Growth Partnership Service provides the CEO and the CEO's Growth Team with disciplined research and best practice models to drive the generation, evaluation and implementation of powerful growth strategies. Frost & Sullivan leverages more than 50 years of experience in partnering with Global 1000 companies, emerging businesses, and the investment community from 45 offices on six continents. To join our Growth Partnership, please visit http://www.frost.com.