SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
Howmuchcontentdoyouneed?
Vendor Content Crucial to Selection Process
Pieces of Content Consumed
IfyouarenotprovidingenoughTRUSTEDCONTENT,
youareFRUSTRATINGyourprospects.
Trusted Information Hard to Come By…
Extremely challenging /Very challenging
Somewhat challenging
Not very challenging /Not at
all challenging
38%
43%
19%
WhatcontentisTRUSTEDbyyourprospects?
ProspectstrustcontentfromPeersandIndustryAnalysts
Industryanalysts
31.4%
(cited by 31.4%
of respondents)
28.7%
early in lifecycle
Peers
Influenceofvendorsasatrustedsourcelagsat
8.1%
3.1%
2006
TO CLOSE?TO CLOSE?
ARE YOU PROVIDING YOUR
SALES TEAM WITH
ENOUGH
an increase from
White papers
Case Studies
Guest blogging
Social media promotion
Infographics
CHOSEN
VENDOR
5LESS
THAN
30%
5-9
30%
10-14
13%
15-19
6%
20-24
3%
25+
5%
On average, IT
decision-makers
consume 8 pieces
of content created by,
or on behalf of,
the vendor they
eventually select.
Vendor bias,
sales pitches
and
trustworthiness
of source were
cited as the
biggest
challenges.
Savvy vendors will develop and deliver
more content and tools...to create a
“circleoftrust”with skeptical buyers,
including independent endorsements,
peer and analyst reviews, success stories,
and validation needed to create trust.
Custom Research
and EMA Branded
Content including:
GIVEYOURSALESTEAMASOLIDMIXOFCONTENT
GIVEYOURSALESTEAMASOLIDMIXOFCONTENT
GIVEYOURSALESTEAMASOLIDMIXOFCONTENTGIVEYOURSALESTEAMASOLIDMIXOFCONTENTGIVEYOURSALESTEAMASOLIDMIXOFCONTENT
resourceforyourcontentneeds.
Market
Coverage,
including:
EMA'S EXPERT ANALYSTS CAN HELPEMA'S EXPERT ANALYSTS CAN HELP
YOU ARM YOUR SALES TEAM WITH TRUSTED CONTENT!YOU ARM YOUR SALES TEAM WITH TRUSTED CONTENT!
EMA'S EXPERT ANALYSTS CAN HELPEMA'S EXPERT ANALYSTS CAN HELP
YOU ARM YOUR SALES TEAM WITH TRUSTED CONTENT!YOU ARM YOUR SALES TEAM WITH TRUSTED CONTENT!
EMA'S EXPERT ANALYSTS CAN HELP
YOU ARM YOUR SALES TEAM WITH TRUSTED CONTENT!
For more information on EMA Vendor Services and Special Offers, please visit:
visit: http://research.enterprisemanagement.com/itvendors
EMA RADAR Reports evaluate
vendors in specific product/technology
categories, helping buyer's short list
vendors during the buying cycle. Several
licensing options let you make use of this
trusted content with prospects.
EMA VENDOR TO WATCH reports
are one page highlights of new and
interesting vendors or new product
directions. Written for our end user
subscribers, these are also compelling
content for vendors to distribute.
AsaleadingAnalystfirm,EMAisatrusted3rdparty
Q.When you are recommending and selecting vendors for major enterprise IT/security purchases,
approximately how many pieces of content do you typically consume that are created by, or for, the
vendor you eventually select?
Source: IDG Enterprise Customer Engagement, May 2012
Source: Predictions for 2012 and Beyond: The End of B2B Sales & Marketing as We Know It?, Alinean, Inc.
Source: IDG Enterprise Customer Engagement, May 2012
Q. Generally speaking, how challenging do you feel it is to locate enough high quality trusted information on
major enterprise IT/security products and services to make an informed purchase decision you are comfortable
with?
morethancontentfromaVendor.
4times
EMA Provides:
Co-branded Promotion
Guaranteed Number of Leads
Market Education & Validation
Hosted
Webinars

Más contenido relacionado

Destacado

A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMA SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMijfcstjournal
 
WPL Handbook
WPL HandbookWPL Handbook
WPL HandbookSue Flack
 
carta del jefe indio
carta del jefe indiocarta del jefe indio
carta del jefe indiokaworu
 
Quiero Ser Tu HerOe
Quiero Ser Tu HerOeQuiero Ser Tu HerOe
Quiero Ser Tu HerOeCangre_lu
 
Software-Defined Storage Radar Report: Deploying Enterprise Wide
Software-Defined Storage Radar Report: Deploying Enterprise WideSoftware-Defined Storage Radar Report: Deploying Enterprise Wide
Software-Defined Storage Radar Report: Deploying Enterprise WideEnterprise Management Associates
 
Distance Estimation to Image Objects Using Adapted Scale
Distance Estimation to Image Objects Using Adapted ScaleDistance Estimation to Image Objects Using Adapted Scale
Distance Estimation to Image Objects Using Adapted Scaletheijes
 
Presentación Impress realizada por Silvia
Presentación Impress realizada por SilviaPresentación Impress realizada por Silvia
Presentación Impress realizada por Silviaraul andres
 
Demo Arbo Management Systeem
Demo Arbo Management SysteemDemo Arbo Management Systeem
Demo Arbo Management SysteemRoger Pieter Lam
 

Destacado (9)

A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMA SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
 
Cover stroy
Cover stroyCover stroy
Cover stroy
 
WPL Handbook
WPL HandbookWPL Handbook
WPL Handbook
 
carta del jefe indio
carta del jefe indiocarta del jefe indio
carta del jefe indio
 
Quiero Ser Tu HerOe
Quiero Ser Tu HerOeQuiero Ser Tu HerOe
Quiero Ser Tu HerOe
 
Software-Defined Storage Radar Report: Deploying Enterprise Wide
Software-Defined Storage Radar Report: Deploying Enterprise WideSoftware-Defined Storage Radar Report: Deploying Enterprise Wide
Software-Defined Storage Radar Report: Deploying Enterprise Wide
 
Distance Estimation to Image Objects Using Adapted Scale
Distance Estimation to Image Objects Using Adapted ScaleDistance Estimation to Image Objects Using Adapted Scale
Distance Estimation to Image Objects Using Adapted Scale
 
Presentación Impress realizada por Silvia
Presentación Impress realizada por SilviaPresentación Impress realizada por Silvia
Presentación Impress realizada por Silvia
 
Demo Arbo Management Systeem
Demo Arbo Management SysteemDemo Arbo Management Systeem
Demo Arbo Management Systeem
 

Más de Enterprise Management Associates

Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Enterprise Management Associates
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryEnterprise Management Associates
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...Enterprise Management Associates
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsEnterprise Management Associates
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...Enterprise Management Associates
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Enterprise Management Associates
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Enterprise Management Associates
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityEnterprise Management Associates
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesEnterprise Management Associates
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...Enterprise Management Associates
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Enterprise Management Associates
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Enterprise Management Associates
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Enterprise Management Associates
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessEnterprise Management Associates
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...Enterprise Management Associates
 

Más de Enterprise Management Associates (20)

Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 

Does your sales team have enough trusted content to close?

  • 1. Howmuchcontentdoyouneed? Vendor Content Crucial to Selection Process Pieces of Content Consumed IfyouarenotprovidingenoughTRUSTEDCONTENT, youareFRUSTRATINGyourprospects. Trusted Information Hard to Come By… Extremely challenging /Very challenging Somewhat challenging Not very challenging /Not at all challenging 38% 43% 19% WhatcontentisTRUSTEDbyyourprospects? ProspectstrustcontentfromPeersandIndustryAnalysts Industryanalysts 31.4% (cited by 31.4% of respondents) 28.7% early in lifecycle Peers Influenceofvendorsasatrustedsourcelagsat 8.1% 3.1% 2006 TO CLOSE?TO CLOSE? ARE YOU PROVIDING YOUR SALES TEAM WITH ENOUGH an increase from White papers Case Studies Guest blogging Social media promotion Infographics CHOSEN VENDOR 5LESS THAN 30% 5-9 30% 10-14 13% 15-19 6% 20-24 3% 25+ 5% On average, IT decision-makers consume 8 pieces of content created by, or on behalf of, the vendor they eventually select. Vendor bias, sales pitches and trustworthiness of source were cited as the biggest challenges. Savvy vendors will develop and deliver more content and tools...to create a “circleoftrust”with skeptical buyers, including independent endorsements, peer and analyst reviews, success stories, and validation needed to create trust. Custom Research and EMA Branded Content including: GIVEYOURSALESTEAMASOLIDMIXOFCONTENT GIVEYOURSALESTEAMASOLIDMIXOFCONTENT GIVEYOURSALESTEAMASOLIDMIXOFCONTENTGIVEYOURSALESTEAMASOLIDMIXOFCONTENTGIVEYOURSALESTEAMASOLIDMIXOFCONTENT resourceforyourcontentneeds. Market Coverage, including: EMA'S EXPERT ANALYSTS CAN HELPEMA'S EXPERT ANALYSTS CAN HELP YOU ARM YOUR SALES TEAM WITH TRUSTED CONTENT!YOU ARM YOUR SALES TEAM WITH TRUSTED CONTENT! EMA'S EXPERT ANALYSTS CAN HELPEMA'S EXPERT ANALYSTS CAN HELP YOU ARM YOUR SALES TEAM WITH TRUSTED CONTENT!YOU ARM YOUR SALES TEAM WITH TRUSTED CONTENT! EMA'S EXPERT ANALYSTS CAN HELP YOU ARM YOUR SALES TEAM WITH TRUSTED CONTENT! For more information on EMA Vendor Services and Special Offers, please visit: visit: http://research.enterprisemanagement.com/itvendors EMA RADAR Reports evaluate vendors in specific product/technology categories, helping buyer's short list vendors during the buying cycle. Several licensing options let you make use of this trusted content with prospects. EMA VENDOR TO WATCH reports are one page highlights of new and interesting vendors or new product directions. Written for our end user subscribers, these are also compelling content for vendors to distribute. AsaleadingAnalystfirm,EMAisatrusted3rdparty Q.When you are recommending and selecting vendors for major enterprise IT/security purchases, approximately how many pieces of content do you typically consume that are created by, or for, the vendor you eventually select? Source: IDG Enterprise Customer Engagement, May 2012 Source: Predictions for 2012 and Beyond: The End of B2B Sales & Marketing as We Know It?, Alinean, Inc. Source: IDG Enterprise Customer Engagement, May 2012 Q. Generally speaking, how challenging do you feel it is to locate enough high quality trusted information on major enterprise IT/security products and services to make an informed purchase decision you are comfortable with? morethancontentfromaVendor. 4times EMA Provides: Co-branded Promotion Guaranteed Number of Leads Market Education & Validation Hosted Webinars