Get started Bring yourself up to speed with our introductory content.

What is the price point cut-off for the customer?

Budget is a big aspect of planning an authentication project. Learn how to work with your customer's budget and ensure that they stay within their limits when implementing an authentication solution.

What is the price point cut-off for the customer?

About the author
Russ Rogers is an information security expert and author of Nessus Network Auditing, 2nd Edition. Russ is currently a penetration tester for the federal government.

At what point can the customer no longer afford to install or maintain the authentication solution you're suggesting? There's a limit, but you need to understand where that limit is so you can price your solution within those boundaries. Bear in mind that the costs of a solution aren't just limited to the initial installation and configuration. There are often years of behind-the-scenes costs related to patching, maintenance, upgrades and experienced human resources for administration. Try to choose solutions that offer as little change to the customer's current IT operations as possible in order to limit the learning curve. Look for solutions that will fit well with the existing skill sets, so the customer doesn't have to hire new employees. Consider offering on-site training for the solution to the customer as well, to limit training costs on the new solution.

Dig Deeper on Identity and access management (IAM) security services

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

MicroscopeUK

  • IT Lab acquires Mirus IT

    Managed services player with a focus on Microsoft takes revenues past the £75m mark with a move to pick up Mirus

  • Cyber security and the channel

    Leading lights in the industry give their assessment of where the cyber security market is headed in the second half of 2019

  • SCC investing in the future

    Channel player delivers solid set of numbers for its fiscal year at the same time as investing in IT systems to support future ...

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchDataManagement

SearchBusinessAnalytics

Close