September 7, 2022

Product-Led Growth as Your Next Marketing Strategy with Ross Haleliuk

by Breaking Through in Cybersecurity Marketing

Listen Now

Product-Led Growth as Your Next Marketing Strategy with Ross Haleliuk

September 7, 2022 Breaking Through in Cybersecurity Marketing


Show Notes

Ross Haleliuk, Head of Product at LimaCharlie, joins us to talk about product-led growth (PLG) and its role in cybersecurity and cloud security. Ross leads us through exactly what PLG is and how SAAS companies can implement it into their product or service processes for customer acquisition, revenue growth, retention, and engagement. Whether you’re a small business or a big company, PLG can ensure your customers are happy with your products and fully engaged with your services— without even going through the traditional sales funnel. Timecoded Guide: [02:01] Defining product-led growth and how businesses can use it to acquire customers

[08:33] How PLG is different in cybersecurity and customer data

[20:06] Balancing a security risk with ease of installation and integration

[28:21] Understanding metrics, conversions, and the customer retention journey

[35:36] Best hiring practices for PLG companies interested in implementing PLG  

What is PLG, and why is everyone talking about it? PLG stands for “product-led growth.” Product-led growth might just sound like another cybersecurity buzzword, but it’s actually a solid business strategy. PLG positions the product as the main drive for customer acquisition, revenue growth, and retainment. Instead of a sales person or team guiding the customer through their purchasing journey, the product itself is fostering engagement, building relationships with paying customers, and showing them its own value. “The part that is incredibly important is that a potential customer has the ability to try the product before they start paying for it, before they purchase.”

How does PLG play out in cybersecurity? Product-led growth can be tricky to implement in a cybersecurity space for a few reasons. The first is that product-led growth requires individual contributors to be empowered to make decisions, try different products, and make suggestions about solutions to problems. This can be difficult to implement in large companies without buy-in from leadership positions. Second, many products in cybersecurity fall under the umbrella of “keeping people safe.” This can be difficult to quantify the specific value of to customers, which is a vital aspect of successful PLG strategies. “The challenge with those kinds of products is: How do you say if it's working? How do you measure if it's working? If you haven't been breached, is it because nobody tried to do it, [or] is the product so good that it stopped it? Did you just get lucky? It's the value that becomes incredibly hard to measure.” How is PLG not just giving away a company’s products for free forever? Implementing a PLG strategy means giving customers a chance to discover the value of your product for themselves, without having to go through a paywall or talk to a sales rep. If customers can immediately see the value of your product, they’re likely to keep using it— and that’s when your sales and/or marketing teams can step in. At the end of the day, PLG doesn’t completely replace a sales team or funnel, but instead makes it easier for your sales team to focus on high-ticket items and customer success. “If a company has 500 people adopt the product, the freemium version in one of their departments, with only 5 people using it, it means that the sales team can now approach and have a conversation, potentially about expanding the 5 people deployment into the 500 people deployment. The sizing of the opportunities becomes easier.” How do you measure the value of a PLG strategy in a cyber company? It can be difficult to measure the value of PLG in a cybersecurity company, but it’s not impossible. What marketers and sales reps need to remember is that there has to be a key event that a customer experiences in order for them to realize the product does what it’s supposed to. For example, if you have an alert set up for someone clicking a link in an email that they’re not supposed to click, that’s a tangible event and alert you can see. That alert shows your customer that the product or software is doing what it’s supposed to do, and therefore illustrates the value of your PLG strategy.

“Building a PLG product requires an incredibly deep knowledge of the customer's needs, motivations, expectations, and everything else that drives the purchasing decisions.”



Grab your ticket to the Cyber Marketing Con 2022.

Spend some time with our guest Ross Haleliuk on LinkedIn or on his website.

Follow Gianna on LinkedIn.

Catch up with Maria on LinkedIn.

Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter. Additional Resources:
Read more

Recent Episodes

November 29, 2023
by Breaking Through in Cybersecurity Marketing

In this episode, Charles Gold, Chief Marketing Officer at ThreatConnect, joins Maria and Gianna to discuss why CMOs fail or succeed.  To begin, Charles shares his background in running global marketing organizations. He even started a technology comp...

November 22, 2023
by Breaking Through in Cybersecurity Marketing

When you think humor, comedy, LOL, or even LMFAO if you are fancy, cybersecurity isn't typically the first thing that comes to mind. But who says talking about ROI, demand gen, and marketing has to be boring? Humor exists in everything, and with so m...

November 15, 2023
by Breaking Through in Cybersecurity Marketing

Welcome to Breaking Through in Cybersecurity Marketing, where we explore the hottest topics in cyber marketing, interview experts and help you become a better cybersecurity marketer! In this episode, Amy Stokes Waters, Founder and Chief Executive Off...

November 8, 2023
by Breaking Through in Cybersecurity Marketing

Competitive intelligence programs can be reactionary and one-dimensional due to squeaky-wheel syndrome and we-just-lost-a-deal-to-so-and-so-itis.    Learn from Alex Babar, Vice President of Solutions at Brinqa about 3 categories of competitive intel ...

October 31, 2023
by Breaking Through in Cybersecurity Marketing

On this week’s very special Halloween episode, listen as the hosts embark on a journey beyond the seven seas, a thrilling match filled with spooky stories and of course, lighthearted banter (one can’t help but laugh even in fear)... Sink your fangs i...

October 25, 2023
by Breaking Through in Cybersecurity Marketing

Since #CyberMarketingCon2023 is coming on December 10th through 13th. We can’t help but replay some of our sessions from previous conferences. This week’s episode is from CyberMarketingCon2022. If you enjoy this session, you will enjoy this year’s li...

October 18, 2023
by Breaking Through in Cybersecurity Marketing

In this episode, Joseph Barringhaus, Director of Demand Generation at Sonrai Security, joins Maria and Gianna to discuss all things demand gen. Sonrai Security is a cloud security startup that focuses on identity, access, and permission in the cloud....

October 11, 2023
by Breaking Through in Cybersecurity Marketing

The time for #CyberMarketingCon2023 is fast approaching and we hope to see you in Austin in December. So mark those calendars and get your tickets, the conference will be from December 10th through 13th. It's filled with education, the best speakers,...

October 4, 2023
by Breaking Through in Cybersecurity Marketing

In this episode, Geordie Carswell, CMO at ActualTech Media joins Maria and Gianna to talk about the stuff no marketer wants to talk about right now: lead generation and content syndication! Can lead generation be a successful part of a demand generat...

September 27, 2023
by Breaking Through in Cybersecurity Marketing

In this episode, Jake Milstein, CRO, and CMO at Critical Insight, joins Maria and Gianna to discuss his unique perspective on serving underrepresented cybersecurity markets, the importance of establishing trust and personal connection with clients, a...