Creating the 10/10/10 User Onboarding Experience

March 5, 2021

At Abnormal Security, we’re constantly exploring opportunities to improve our customer’s user experience. In this blog post, we’d like to share Abnormal’s process to design a framework to identify gaps and improve customer’s first-time user experience to onboard our platform.

First-time user experience (FTUE) is a critical, emotional, and one-time-only experience that allows customers to build a strong first impression of any product. The 10/10/10—first 10 seconds, 10 minutes, and 10 days—really matter and are critical to long-term success. At Abnormal, we leverage the 10/10/10 framework to explore user goals, outcomes, and artifacts that help customers walk away with a phenomenal first-time user experience as they begin to learn, integrate, and interact with Abnormal.

Crafting the 10/10/10 FTUE Experience for Abnormal

To begin to understand our 10/10/10, we started with our initial brainstorming. As part of this process, we crowdsourced the stakeholders who are involved in the customer’s (proof-of-value, or POV, process. This includes members of our team in integration, product management and design, sales, data science, and most importantly, our customers. We breakdown individual critical user onboarding time periods and further explore aspects of key results customers aspire to gain.

For each phase, we think about the first 10 seconds, first 10 minutes, and first 10 days.

  • What do we want customers to understand?
  • What do we want customers to experience?
  • What’re the top three takeaways at the end of this phase?

Here’s some top level feedback we aggregated.

10 10 10 overview

With this framework, the Abnormal team was able to identify gaps from our current POV experience. Currently, Abnormal takes about some time after initial integration to create client-specific detection models and locate retroactive email threats. Now during this waiting period, customers can access the new integration status page, with the latest detection findings, before they receive full portal access.

In the integration status page, new customers can learn about their integration progression, see POV statistics that Abnormal has learned learn the latest news about Abnormal.

Abnormal pov stats so far

Customers can benefit from increased transparency and visibility in the way Abnormal is handling their data, access additional controls to get their tenant up and running, and also gain educational content that’s catered to help them grasp the Abnormal product during the POV period.

Leveraging the 10/10/10 framework, we have built a clear picture of a customer’s first time user experience and increased our ability to calibrate key product takeaways in various phases of their ‘first’ experience. This allows us to closely align with our onboarding journey and build both emotional and evidence-based excitement for our customers as they kick off their POV journey with us.

To learn more about how to start your POV with Abnormal, connect with an Email Security Specialist today.

Image

Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

0
Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 10 3 22 Cobalt Terrapin Blog
Threat group Cobalt Terrapin uses sophisticated impersonation techniques with multiple steps to commit invoice fraud.
Read More
B 09 29 22 CISO Cybersecurity Awareness Month
October is here, which means Cybersecurity Awareness Month is officially in full swing! These five tips can help security leaders take full advantage of the month.
Read More
B Email Security Challenges Blog 09 26 22
Understanding common email security challenges caused by your legacy technology will help you determine the best solution to improve your security posture.
Read More
B 5 Crucial Tips
Retailers are a popular target for threat actors due to their wealth of customer data and availability of funds. Here are 5 cybersecurity tips to help retailers reduce their risk of attack.
Read More
B 3 Essential Elements
Legacy approaches to managing unwanted mail are neither practical nor scalable. Learn the 3 essential elements of modern, effective graymail management.
Read More
B Back to School
Discover how threat group Chiffon Herring leverages impersonation and spoofed email addresses to divert paychecks to mule accounts.
Read More
B 09 06 22 Rearchitecting a System Blog
We recently shared a look at how the Abnormal engineering team overhauled our Unwanted Mail service architecture to accommodate our rapid growth. Today, we’re diving into how the team migrated traffic to the new architecture—with zero downtime.
Read More
B Industry Leading CIS Os
Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 12 innovative and influential thought leaders on social media.
Read More
B Podcast Engineering 11 08 24 22
In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
Read More