A SaaS provider offered a free trial period, but only 2% of the free users were converted to be paying users.
Free trial users didn’t reach the “Aha!” moment and see the value of the product.
This was a problem because there are lots of alternatives. And it was obvious, that people don´t have time or make the effort to really get to know the product.
A code-free user onboarding software that helped create interactive product walkthroughs
The company easily segmented their new and existing users to improve their product adoption with specific onboarding flows, that fit to the specific need of each group. So, if for instance a new user tests the trail version, he will be automatically guided e.g. via an animation leading him to the next step. The product is very “non-developer friendly” and straightforward to get the job done. Also, it offers a domain expertise to go over previous user flows and created new onboarding flows to improve the user experience.
The customer had FAQs written as articles so they could be turned into interactive flows as well.
Live chat support, FAQ and help center articles.
The solution shouldn’t make the UX worse and slow down the website.
Acceptance of the company's employees supported by
Product Manager had difficulties on optimizing limited development resources. They wanted to focus on new features but they already had low conversion rate and low percentage of their users were fully using the company’s product.
Only basic HTML to embed the code to customer’s website. If customer is using Google Tag Manager, none required.
Integrations or APIs
Where is the data stored?
Data Classification & Handling
Customer data is classified and establishes the most appropriate way of handling, storing, retrieving, and disposing of this data according to its classification. Customer data is classified at the highest level.
Data Encryption in Transit and At Rest
The best practice encryption algorithms for cryptographic controls are used to ensure the security of data and the environment that data is stored in. All data is encrypted at rest and in motion. All data-in-transit uses TLS connections, and data-at-rest is encrypted by default, always. Database backups are also automatically encrypted at rest. Encryption Keys are managed by using IBM services coupled with industry-standard methods. The service is SOC 2 Type 1 certified and HIPAA ready. Applications use a layer between application business logic and database resources. This intermediate layer ensures that one customer is not able to access another customer’s data. Data in databases are designed to be segmented for tenants.