CLOUDTWEAKS CONTRIBUTOR PROGRAM

Join the CloudTweaks thought leadership contributor program which includes a customized profile, branded identity page, newsletter marketing, social amplification and more...

The program is currently available to consultants, influencers or executive level contributors.

blockchain

SaaS Growth Hacking Do’s And Don’t

SaaS Growth Hacking

Thanks to a few phenomenally successful campaigns and visions of best case scenarios, growth hacking tactics have received a lot of positive attention in recent times. But as the techniques and their results are analyzed it’s becoming apparent that there’s a right and a wrong way to use these tools. Or, at least, there’s a time, a place, and an implementation. Cloud Based Software As A Service (SaaS) companies such as Dropbox, Pinterest, and Airbnb boast a few of the most wildly successful strategies contrived to date (Excellent 2015 Marketing Statistics List), but with the ever-evolving global tech and business climate, ‘old’ tactics aren’t likely to yield positive results without new twists on the invention.

marketing-growth-hacking

The Dos

Never again will we see massive success stories that are merely revamps of old hits – unless you’re writing teen vampire novels, in which case give it 10 to 15 years. Video marketing is a trend expected to flourish in 2016, and additionally ensuring your growth hacks account for the massive traffic routed by search engines and social networks could ramp up achievements.

  • A few key points to keep in mind: Match-make growth hacking and products/services: You’re going to need a synergy between the two, ideally with a key representative closely involved in the development of both.
  • Spot trends: All the information you could possibly need is flying about, but Big Data often results in a case of not seeing the wood for all the trees. Learn to extract pertinent points but also know when to back off. Just because you think something rocks, doesn’t mean anyone else is going to care, and a rework is likely to yield better results than soldiering on.
  • Change the way you think: Growth hacking comes into play when traditional marketing methods aren’t likely to succeed. This isn’t the time for crossing your ‘T’s and dotting your ‘I’s. Be creative, think outside of the box, and be willing to take calculated risks.
  • Communicate & Incentivize: Creative doesn’t mean disorganized. Ensure your communication is easily understood and followed by both your team and your potential customers. And then save money by getting your customers to market for you – a little freebie often goes a long way to positive word of mouth and heightened product uptake.

shutterstock_325151036

(Image Source: Shutterstock)

The Don’ts

  • Sadly, there is no growth hacking template or checklist. Strategies and tactics often work only once, and success usually boils down to the right attitude, genuine curiosity, and the ability to try, and fail, adapt, and invent.
  • Popularity alone only survives through high school: Simply creating a buzz isn’t enough. If you’re building products or services that don’t have the end users in mind, no amount of popularity will result in success. Unless you’ve built a pyramid scheme that is, at the very least, frowned upon in many countries, illegal in most. Back to the drawing board, please.
  • Don’t forget about loyalty: Many businesses focus on building up new users before ensuring the satisfaction of the loyal early adopters. Growth hacks that run roughshod over your faithful flock in an attempt to recruit new masses miss the success that personal referrals, word of mouth, and client satisfaction promise.
  • Don’t be aggressive: This isn’t telecanvassing. Aggressive, underhanded strategies trample on your reputation and miss the point of the clever loopholes that drive customer numbers as well as satisfaction.

Unless you’re selling thin in chocolate sauce, your product won’t sell itself: Don’t let the beauty of your growth hack so over-awe you that you forget to measure its success. Analyze your data, find out what’s working, and optimize it. Repeat…

By Jennifer Klostermann

Jennifer Klostermann

Jennifer Klostermann is an experienced writer with a Bachelor of Arts degree majoring in writing and performance arts. She has studied further in both the design and mechanical engineering fields, and worked in a variety of areas including market research, business and IT management, and engineering. An avid technophile, Jen is intrigued by all the latest innovations and trending advances, and is happiest immersed in technology.

The Lighter Side Of The Cloud - Tough Times
The Lighter Side Of The Cloud - Yahoo!!
The Lighter Side Of The Cloud: Resistance
The Lighter Side Of The Cloud - Full Of Data
The Lighter Side Of The Cloud - Drinking and Driverless
Infosec thought leaders

Cryptocurrencies and Ransomware: How VDI Can Help Defend Against the Next Ransomware Attack

Cryptocurrencies and Ransomware The WannaCry ransomware made headlines back in May when it crippled hospitals across the UK and put ...
GDPR Compliance

A Quick and Dirty Guide to GDPR Compliance

GDPR Compliance Set a reminder: On May 25, 2018, the new General Data Protection Regulation directive from the European Union ...
David

Future Data Storage Needs Increasing At A Rate Of Nearly 25X By The Year 2021

The Future of Data Storage Data is everywhere. In the security industry, there are close to 300 million surveillance cameras ...
Marty Puranik

HIPAA Risk Assessment Guide for Smaller Practices

HIPAA Risk Assessment Guide Disconcertingly, one in four practices (25%) are failing meaningful use audits by the Centers for Medicare ...
5 Data Security Tips Small Businesses Should Mimic

5 Data Security Tips Small Businesses Should Mimic

Data Security Tips As more and more companies begin to switch to the cloud, cyber attacks need to be a ...
Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks “WanaCrypt0r 2.0” or “WannaCry,” an unprecedented global ransomware cyber-attack recently hit over 200,000 banking institutions, hospitals, government agencies, ...
Critical Success Factors when shifting Workloads into the Cloud

Critical Success Factors when shifting Workloads into the Cloud

Shifting Workloads into the Cloud By 2020, 92 percent of all workloads will reside in the cloud. Yet challenges remain ...
HTML5 Speed Test

HTML5 Speed Test

HTML5 SPEED TEST SERVICES There is no made-for-all solution when it comes to optimizing a website for speed, and while putting a cloud platform in place is a good start, every cloud startup should ensure that they have an optimization ...
Cloud Monitoring and Data Performance Services

Cloud Monitoring and Data Performance Services

CLOUD PERFORMANCE MONITORING The Dynamic State Of Cloud Performance Monitoring And Evaluation Monitoring and evaluation in cloud computing are essential processes. They determine whether a company’s applications on the cloud are effective, safe, and efficient. They also help eliminate failures in ...
Free Report: "Gartner Report: 2018 CEO Survey"

Free Report: “Gartner Report: 2018 CEO Survey”

Deep discipline is required for digital business. Read the full report to learn how to: Prepare for more deeply disciplined exploitation of the digital business changes ahead, Lock the leadership into winning through digital business, Drive business model changes and ...
Business Analytics Vs Data Science

Business Analytics Vs Data Science

Big Data Continues To Grow Big Data continues to be a much discussed topic of interest and for good reason.  According to a recent report from International Data Corporation (IDC), "worldwide revenues for big data and business analytics will grow ...
Network Management Software Buyer Guide 2018

Network Management Software Buyer Guide 2018

This concise data-driven report covers the Network Management software landscape, as of August 2018. he 24-page report includes: Market Overview - Top 10 Network Management products in 2018, User reviews and vendor size data, In-depth look at the Top 3 ...
Automate Service Management

[Free eBook] 150 Ways to Automate Service Management Throughout Your Organization…

Think about an IT Service Catalog as a supermarket of available services. Everyone in your company requests and delivers services from each other. From Human Resources and Marketing to Facilities and Procurement, each department is a service provider to the ...