Blog

I struggle with the need for public references.  Clearly our prospective clients want to know that their peers are using our products and services; however, by publicly providing proof that customers are using our solutions, we also knowingly bring more scrutiny by the very criminals that our solutions are supposed to protect our clients from.  Additionally, while often clients would like to see public references, they often refuse to be one (with good reason).  As a security professional, I would also generally not recommend my clients provide public references, but our marketing and PR teams are always asking because ALL of our competitors do this.  I think we need a better way (and a referendum) that does not harm Prevalent for not trying to compete publicly with firms that would potentially do harm to their clients through the use of public acknowledgement.  Maybe a private reference and credentialing model to be shared with other potential clients would help here??

While I do believe there is a place for public references (in some cases), we have recently looked at alternatives, including the use of anonymous references.  I am excited to announce several references for clients using our technologies and services.  These include two Fortune 500 clients and a technology service provider that are using our products in unique and innovative ways to solve their third party threat management needs.  You can find these on the Resources page on our website under the heading ‘Articles, Infographics & More’.  There are other marketing initiatives underway that will also support this anonymous model.

We have great clients using Prevalent technologies and services. We will look to continue to highlight these use cases while also serving our clients’ security needs and our desire for more awareness.  I hope other business leaders will look at this as an opportunity to help provide better security; and our clients and prospects will help us further promote Prevalent “privately” as we limit our marketing capabilities in an effort to maintain our vision for “information anywhere, security everywhere”.

Categories: Blog
Tags: