chat
expand_more

Creating the 10/10/10 User Onboarding Experience

At Abnormal Security, we’re constantly exploring opportunities to improve our customer’s user experience. In this blog post, we’d like to share Abnormal’s process to design a framework to identify gaps and improve customer’s first-time user experience to onboard our platform.
March 5, 2021

At Abnormal Security, we’re constantly exploring opportunities to improve our customer’s user experience. In this blog post, we’d like to share Abnormal’s process to design a framework to identify gaps and improve customer’s first-time user experience to onboard our platform.

First-time user experience (FTUE) is a critical, emotional, and one-time-only experience that allows customers to build a strong first impression of any product. The 10/10/10—first 10 seconds, 10 minutes, and 10 days—really matter and are critical to long-term success. At Abnormal, we leverage the 10/10/10 framework to explore user goals, outcomes, and artifacts that help customers walk away with a phenomenal first-time user experience as they begin to learn, integrate, and interact with Abnormal.

Crafting the 10/10/10 FTUE Experience for Abnormal

To begin to understand our 10/10/10, we started with our initial brainstorming. As part of this process, we crowdsourced the stakeholders who are involved in the customer’s (proof-of-value, or POV, process. This includes members of our team in integration, product management and design, sales, data science, and most importantly, our customers. We breakdown individual critical user onboarding time periods and further explore aspects of key results customers aspire to gain.

For each phase, we think about the first 10 seconds, first 10 minutes, and first 10 days.

  • What do we want customers to understand?
  • What do we want customers to experience?
  • What’re the top three takeaways at the end of this phase?

Here’s some top level feedback we aggregated.

10 10 10 overview

With this framework, the Abnormal team was able to identify gaps from our current POV experience. Currently, Abnormal takes about some time after initial integration to create client-specific detection models and locate retroactive email threats. Now during this waiting period, customers can access the new integration status page, with the latest detection findings, before they receive full portal access.

In the integration status page, new customers can learn about their integration progression, see POV statistics that Abnormal has learned learn the latest news about Abnormal.

Abnormal pov stats so far

Customers can benefit from increased transparency and visibility in the way Abnormal is handling their data, access additional controls to get their tenant up and running, and also gain educational content that’s catered to help them grasp the Abnormal product during the POV period.

Leveraging the 10/10/10 framework, we have built a clear picture of a customer’s first time user experience and increased our ability to calibrate key product takeaways in various phases of their ‘first’ experience. This allows us to closely align with our onboarding journey and build both emotional and evidence-based excitement for our customers as they kick off their POV journey with us.

To learn more about how to start your POV with Abnormal, connect with an Email Security Specialist today.

Creating the 10/10/10 User Onboarding Experience

See Abnormal in Action

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B 1500x1500 MKT579z 3 Images for Proofpoint Customer Story Blog 15
A global industrial manufacturer blocked 3,232 missed attacks and saved 336 SOC hours per month by adding Abnormal to address gaps left by Proofpoint.
Read More
B RFI
Abnormal urges adoption of AI-native cybersecurity in response to OSTP’s RFI, highlighting the need for public-private collaboration to counter AI-powered threats.
Read More
B MKT793r Open Graphs Convergence Announcement Blog
Join this virtual event series to get the insights you need to make security decisions in the age of AI.
Read More
B Atlantis AIO Blog
Discover how cybercriminals use Atlantis AIO to automate credential stuffing attacks—and how AI-driven security can stop them before accounts are compromised.
Read More
B Black Basta
Black Basta is a highly active ransomware-as-a-service (RaaS) group that has been linked to dozens of high-profile attacks against organizations worldwide. See how they utilize generative AI to support their campaigns.
Read More
B AI Generated Zoom Impersonation Phishing Attack
Threat actors impersonated Zoom using an AI-generated phishing page to deliver a remote monitoring and management tool.
Read More