Research of IT-sales process

We have been selling consulting and automation for quite some time now. And in recent years, associated with the sale of SAAS.
 
 
We communicate with different companies and compare how the sales process is organized in the food and service companies. We often get into arguments about the motivation of sellers, their workload, the necessary experience and education, the channels of lodogeneration, regulations and sales processes.
 
 
After several such disputes at the conferences, we decided to initiate a study of the IT sales process to do some sort of a cut with the ability to compare how IT ...
+ 0 -

Crossover invites you to Gravity Co-working Space for the last Hiring Tournament of the season

Crossover invites you to Gravity Co-working Space for the last Hiring Tournament of the season  
 
Over the past few months, we've spent as many as three large Hiring Tournament in Moscow, in which we looked for specialists at such high-paying positions as Software Engineering Manager or Chief Software Architect. We collected reviews, talked about the internal kitchen and even conducted streams. But the first month of summer is coming to an end and the need to reset the pace, gain strength to the laboring autumn breakthrough and just rest, it's stronger. Really active at this time, probably only tourist agents who need to sell to us, northerners, burning and not very tours to the region with a more ...
+ 0 -

Building flexible business analytics for SaaS without involving the development resource

Building flexible business analytics for SaaS without involving the development resourceAnalytics is one of the most important components of any online business. It is impossible to make decisions and test hypotheses, based on intuition and their assumptions, and not on figures. Rather, it is possible, but not for long.
 
I regularly and for a long time are engaged in construction of analytics at myself in a product. Of course, not everything turned out right away, much was done by trial and error. But as a result, I still derived a certain algorithm, as well as a set of principles and rules that allow you to build flexible analytics without the help of developers. About them and ...
+ 0 -

SOC for intermediate. We are sorting out what we are protecting, or how to make an inventory of the

SOC for intermediate. We are sorting out what we are protecting, or how to make an inventory of theinfrastructure.And again, hello. The cycle "SOC for " continues its movement and development. We have already covered the first layer of the internal kitchen of the monitoring and incident response centers in previous articles, so let's try to go a little deeper into technical details and more subtle problems.  We have already several times indirectly touched on the topic of asset management: and in article about the security control , and in issues of automation and artificial intelligence in SOC . Obviously, without monitoring the infrastructure of the customer, the monitoring center will not ...
+ 0 -

The miners replaced the cryptographers

We at Solar JSOC permanently collect impersonal data on events and incidents of information security in customer infrastructures. On the basis of this information, we do an analysis every six months, which demonstrates how attacks on Russian organizations are changing. Today we have collected for you the most interesting trends of the second half of 2017
 
 
The miners replaced the cryptographers  
they told , how to properly build the process of using external sources of threat information. Here are the types of Threat Intelligence we use:
 
 
 
Opensource - open databases of malware indicators, management servers and phishing links. As ...
+ 0 -

What is SaaS-business

+ 0 -