<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

All Posts

The Biggest Problem with Sales in Cyber Security

DJ Jones, Director of North American Sales at Datashield, outlines one of the biggest problems with sales in cyber security. The answer may surprise you.

Today we caught DJ off guard and asked him:

"What are some of the problems we have with cyber security sales?"

His immediate answer:

Feature Dumping

Too often, as salespeople, we spew out feature after feature of a technology or solution without stopping to find out with problems the prospect might have. This should be step one. Find out the pain points and educate the prospect on how your technology or solution helps solve those problems.

"We just don't listen, we are too interested in telling people about our features and benefits. Understand what their common concerns are, and how we help augment what they are doing with what we can do."

At Datashield, we have implemented a consultative sales culture that is more interested in solving customer problems and retaining our service with our clients, rather than pushing technology or solutions on them.

Topics from this Article

Sales, Consultative Approach, Video, Cyber Security

DJ Jones
DJ Jones
DJ Jones is Director of North American Sales for Datashield and contributes solution and process related to content to the Datashield Blog. When not leading the team internally, he focuses on servicing customers in the Southwest territory, including Arizona, Utah, Nevada, Hawaii, and Southern California.

Related Posts

What is Microsoft Defender for Endpoint and How Does it Work?

Microsoft Defender for Endpoint, formerly known as Microsoft Defender Advanced Threat Protection, provides enterprise-level protection to endpoints to prevent, detect, investigate, and respond to advanced threats.

What is the Zero Trust Framework?

Zero Trust security concept is a model and framework developed by former Forrester analyst John Kindervag in 2010. Since then, the Zero Trust model is widely adopted, with leading researchers at Gartner, Microsoft, and Google all developing and implementing their variations of Zero Trust frameworks while keeping the core concept intact.

Behavioral Indicators of Insider Threat Activity

Contrary to popular beliefs, an insider threat is not always a security risk within an organization's immediate perimeter. Current employees and managers aside, an insider threat could be a former employee who had access to specific information, a third-party consultant, or a business partner.