Changes in it_security_buyer_behaviour

55
Changes in IT security buyer behaviour John Bottom, Base One 22 November 2011 www.baseone.co.uk

description

Presentation given in London in November 2011 by John Bottom of Base One at the IT Security Marketing Forum 2011.

Transcript of Changes in it_security_buyer_behaviour

Page 1: Changes in it_security_buyer_behaviour

Changes in IT security buyer behaviourJohn Bottom, Base One

22 November 2011

www.baseone.co.uk

Page 2: Changes in it_security_buyer_behaviour

Let’s talk about research...

Page 3: Changes in it_security_buyer_behaviour

Two important surveys:

The Buyersphere Report 2011

We asked 500 UK B2B buyers about the information channels they used

The Social Media Benchmark Report

We asked 248 B2B marketers how they used social media in order to engage buyers

Page 4: Changes in it_security_buyer_behaviour

Two important surveys:

The Buyersphere Report 2011

We asked 500 UK B2B buyers about the information channels they used

The Social Media Benchmark Report

We asked 248 B2B marketers how they used social media in order to engage buyers

Page 5: Changes in it_security_buyer_behaviour
Page 6: Changes in it_security_buyer_behaviour

>1,000 business buyers

Purchase over £20,000

Behaviour directly linked to purchase

www.baseone.co.uk

Page 7: Changes in it_security_buyer_behaviour

How do buyers inform their purchases?

Page 8: Changes in it_security_buyer_behaviour

Which information channels do B2B buyers use?

Source: B2B Marketing/Base 2011

Page 9: Changes in it_security_buyer_behaviour

Which information channels do B2B buyers use?

Source: B2B Marketing/Base 2011

Page 10: Changes in it_security_buyer_behaviour

Which information channels do B2B buyers use?

Source: B2B Marketing/Base 2011

Page 11: Changes in it_security_buyer_behaviour

The Generation Gap

under 30s over 30s

BLOGS15%

FB18%

BLOGS5%

FB7%

Source: B2B Marketing/Base 2011

Page 12: Changes in it_security_buyer_behaviour

2010 compared to 2011

Source: B2B Marketing/Base 2011

Page 13: Changes in it_security_buyer_behaviour

A growing thirst for information

Page 14: Changes in it_security_buyer_behaviour

A growing thirst for information

Social media is coming, but slowlyUse your website at all stages of the buying cycleSeparate “content” from “social media”

Page 15: Changes in it_security_buyer_behaviour

A growing thirst for information

Source: B2B Marketing/Base 2011

Page 16: Changes in it_security_buyer_behaviour

The changing world of live events

Source: B2B Marketing/Base 2011

Page 17: Changes in it_security_buyer_behaviour

Think hard about the way

you use live events

Page 18: Changes in it_security_buyer_behaviour

Digitisation of marketing tools

2000: Brochure Website

Page 19: Changes in it_security_buyer_behaviour

Digitisation of marketing tools

2000: Brochure

2005: Direct mail

Website

Email

Page 20: Changes in it_security_buyer_behaviour

Digitisation of marketing tools

2000: Brochure

2005: Direct mail

2010: Event

Website

Email

Webinar

Page 21: Changes in it_security_buyer_behaviour

Influence v usage

Page 22: Changes in it_security_buyer_behaviour

The data capture debate

Source: B2B Marketing/Base 2011

Page 23: Changes in it_security_buyer_behaviour

More than half of buyers really don’t want to talk about themselves...

Lead gen v

brand build

Page 24: Changes in it_security_buyer_behaviour

How do users share data?

Source: B2B Marketing/Base 2011

Page 25: Changes in it_security_buyer_behaviour

Sharing information

Page 26: Changes in it_security_buyer_behaviour

Sharing information

Don’t forget intranets

Or email

Think about formatting

Page 27: Changes in it_security_buyer_behaviour

Attitudes towards social media

Page 28: Changes in it_security_buyer_behaviour

Hate social media?

Love social media?

Page 29: Changes in it_security_buyer_behaviour

Social media is here. Deal with it.

Page 30: Changes in it_security_buyer_behaviour

Social Media Benchmark Survey

Page 31: Changes in it_security_buyer_behaviour

Social Media Benchmark Survey

How are marketers responding to changing buyer behaviour?

Page 32: Changes in it_security_buyer_behaviour

Are you using social media?

Source: B2B Marketing/Base 2011

Page 33: Changes in it_security_buyer_behaviour

Do you have a social media strategy?

Source: B2B Marketing/Base 2011

Page 34: Changes in it_security_buyer_behaviour

How do you decide on a social media strategy?

Source: B2B Marketing/Base 2011

Page 35: Changes in it_security_buyer_behaviour

How do you prove ROI?

Source: B2B Marketing/Base 2011

Page 36: Changes in it_security_buyer_behaviour

We’re doing all the easy thingsWe’re skimming the surface

Page 37: Changes in it_security_buyer_behaviour

We’re doing all the easy thingsWe’re skimming the surface

If you want a competitive advantage, the opportunity is there NOW

Page 38: Changes in it_security_buyer_behaviour

How is social media being used?

Source: B2B Marketing/Base 2011

Page 39: Changes in it_security_buyer_behaviour

Community Platform

Juniper J-Central

Page 40: Changes in it_security_buyer_behaviour

Community Platform

Juniper J-Central

Page 41: Changes in it_security_buyer_behaviour

Community Platform

Juniper J-Central

Page 42: Changes in it_security_buyer_behaviour

How is social media being used?

Source: B2B Marketing/Base 2011

Page 43: Changes in it_security_buyer_behaviour

Beware the tumbleweed effect...

Page 44: Changes in it_security_buyer_behaviour

The nightclub theory

Page 45: Changes in it_security_buyer_behaviour

What are the biggest challenges?

Source: B2B Marketing/Base 2011

Page 46: Changes in it_security_buyer_behaviour

What are the biggest challenges?

What percentage of your time do you spend on social media?

What percentage of your budget do you spend on social media?

Page 47: Changes in it_security_buyer_behaviour

What are the biggest challenges?

Source: B2B Marketing/Base 2011

Page 48: Changes in it_security_buyer_behaviour

The time/resource issue

Page 49: Changes in it_security_buyer_behaviour

The time/resource issue

Centralised content

Structured plan

Hire content creators

Audit your expertise

Page 50: Changes in it_security_buyer_behaviour

Conclusions

Separate ‘social media’ from ‘content’

Content is what buyers want. Social media is ONE OF the ways

they get it

Page 51: Changes in it_security_buyer_behaviour

Conclusions

Centralise your content. It’s too time-consuming to do otherwise.

Page 52: Changes in it_security_buyer_behaviour

Conclusions

Use issue-based content to make your website work harder.

Page 53: Changes in it_security_buyer_behaviour

Conclusions

Think twice about data capture. Not everything is about lead

generation.

Page 54: Changes in it_security_buyer_behaviour

Conclusions

Social media is growing.

But its effect is still minimal compared to website/SEO.

Are you going to be the pioneer?

Page 55: Changes in it_security_buyer_behaviour

Download report from www.baseone.co.uk

linkedin: johnbottom