Creating the 10/10/10 User Onboarding Experience

At Abnormal Security, we’re constantly exploring opportunities to improve our customer’s user experience. In this blog post, we’d like to share Abnormal’s process to design a framework to identify gaps and improve customer’s first-time user experience to onboard our platform.
March 5, 2021

At Abnormal Security, we’re constantly exploring opportunities to improve our customer’s user experience. In this blog post, we’d like to share Abnormal’s process to design a framework to identify gaps and improve customer’s first-time user experience to onboard our platform.

First-time user experience (FTUE) is a critical, emotional, and one-time-only experience that allows customers to build a strong first impression of any product. The 10/10/10—first 10 seconds, 10 minutes, and 10 days—really matter and are critical to long-term success. At Abnormal, we leverage the 10/10/10 framework to explore user goals, outcomes, and artifacts that help customers walk away with a phenomenal first-time user experience as they begin to learn, integrate, and interact with Abnormal.

Crafting the 10/10/10 FTUE Experience for Abnormal

To begin to understand our 10/10/10, we started with our initial brainstorming. As part of this process, we crowdsourced the stakeholders who are involved in the customer’s (proof-of-value, or POV, process. This includes members of our team in integration, product management and design, sales, data science, and most importantly, our customers. We breakdown individual critical user onboarding time periods and further explore aspects of key results customers aspire to gain.

For each phase, we think about the first 10 seconds, first 10 minutes, and first 10 days.

  • What do we want customers to understand?
  • What do we want customers to experience?
  • What’re the top three takeaways at the end of this phase?

Here’s some top level feedback we aggregated.

10 10 10 overview

With this framework, the Abnormal team was able to identify gaps from our current POV experience. Currently, Abnormal takes about some time after initial integration to create client-specific detection models and locate retroactive email threats. Now during this waiting period, customers can access the new integration status page, with the latest detection findings, before they receive full portal access.

In the integration status page, new customers can learn about their integration progression, see POV statistics that Abnormal has learned learn the latest news about Abnormal.

Abnormal pov stats so far

Customers can benefit from increased transparency and visibility in the way Abnormal is handling their data, access additional controls to get their tenant up and running, and also gain educational content that’s catered to help them grasp the Abnormal product during the POV period.

Leveraging the 10/10/10 framework, we have built a clear picture of a customer’s first time user experience and increased our ability to calibrate key product takeaways in various phases of their ‘first’ experience. This allows us to closely align with our onboarding journey and build both emotional and evidence-based excitement for our customers as they kick off their POV journey with us.

To learn more about how to start your POV with Abnormal, connect with an Email Security Specialist today.

Creating the 10/10/10 User Onboarding Experience

See Abnormal in Action

Schedule a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Posts

B 1500x1500 Knowledge Base People Base L1 R1
Discover how Abnormal uses contextual, behavioral data to uncover anomalous activity across logins and devices with PeopleBase.
Read More
ABN B 12 2 22 Expanding our partnership L1 R2
Our partnership with Microsoft has created plenty of opportunities to celebrate. Here are some of the especially exciting moments from 2022.
Read More
B 1500x1500 5 key takeaways L1 R1
Ed Amoroso discusses the biggest security risks with cloud email and how to prevent them.
Read More
B Threat Intel Phishing Attacks HR Policies
Threat actors are capitalizing on the new year, posing as human resources officials to send credential phishing attacks.
Read More
ESG Blog
ESG’s technical validation proves the risk reduction capabilities of Abnormal Cloud Email Security.
Read More
CFO Cover
Industry-leading CFO Sam Wolff discusses spending on security technology in the current macroeconomic conditions.
Read More