A Better Approach to Sales Content Management

Every day, enterprise salespeople ask themselves: where can I find the right content to send to my prospect?

For most companies, the default answer is Google Drive, Dropbox, or whatever file repository the company is using. But that’s not always helpful. For example, if you are looking for a previous proposal to use as a template for a new prospect in, say, the auto industry, knowing they are seeking X functionality, how can you find the most relevant sample in your company’s drive? Unless your company has very rigid file naming standards, it often involves a lot of searching around through incomplete or irrelevant search queries to find what you’re looking for. 

Solving this simple issue doesn’t need to be difficult. Rather, it’s easily fixed with an effective sales content management solution. The goal of a good sales content management solution is to have a central place where sales assets are created, stored, and organized so teams can access them at any point in the selling cycle. This hub can be a cornerstone for sales enablement, but it’s also an effective way to increase your teams’ productivity and performance. 

A recent survey of salespeople by HubSpot Research found more than half rely on their peers to get tips for improving. 44 percent looked to their manager, 35 percent to team training resources, and 24 percent to media.

The need for sales content isn’t just an internal issue, though. As more companies implement social selling programs for their reps, there’s an even larger need for a central hub that is accessible and has an abundance of easy-to-share resources. In fact, studies show half of sales revenue is influenced by social selling in 14 common industries, including computer software, healthcare, and marketing and advertising. 

How can you get more mileage out of your sales enablement content? Here are a few best practices to get you started:

Take Note of Your Existing Assets 


Whether you’re currently storing your existing sales asset library in Box, Sharepoint, or something else, it’s very likely that you have a pretty large backlog of materials, which can make getting started feeling like climbing a mountain. 

Going back to basics can be the easiest way to overcome this initial hurdle: consider making a spreadsheet to take an inventory of all existing assets, noting the name of the item, what type of item it is (i.e., a video, a PPT, etc), a short description of its use, and a link to where it’s stored. This exercise is helpful when it comes to getting a better understanding of existing assets, but it also enables you to archive outdated and irrelevant content, while identifying additional content needs at your enterprise.

Address Gaps in Your Internal (and External) Content


If you want to improve your internal sales collateral, it’s important to have a clear strategy in mind and it starts with surveying your sales force. Find out if there are any pieces of content they like or refer to a lot and use this as an opportunity to update those documents. You’ll also want to find out if there are any knowledge gaps that exist in your materials. Is there something your reps could use more training on or a new trend coming down the pike they should be prepared for? Perhaps you noticed during the inventory phase that assets are out of date, don’t have complete information on them, or don’t address some new functionalities your product has. These are all good fodder for new content. 

This assessment doesn’t just have to apply to your internal sales documents. It’s also a great time to determine any additional external assets you need to have for any social selling initiatives your company might have. After all, when it comes to building a business case, content is king and still significantly influences purchase decisions. According to a survey by DemandGen, three-quarters of buyers said the content of potential vendors had a “significant impact” on which they chose. 

Your sales team likely spends all day talking to current customers and potential clients, which makes them a wealth of information when it comes to understanding what assets are worth developing. Ask them about their communication pain points, what prospects ask questions about and where there might be any opportunities to alleviate confusion. 

But planning new external sales assets shouldn’t exist in a vacuum: your company’s marketing team is also a great resource to tap into. They spend all day crafting and refining different messages to prospects and can usually offer data and feedback on what content will sing (and which will fall flat). 

Lastly, don’t forget to look critically at the customer journey for opportunities. When you have a better understanding of how your prospects become customers, you can identify where content can help eliminate friction at various points in the sales process.

Creating Sales Content


When it comes to putting together new internal and external-facing content, the possibilities are endless. Of course, it’s important to approach it realistically and strategically. Recognize that Rome wasn’t built in a day and, as such, neither will all the sales collateral you want to produce. Identify which pieces are the priority and enter them into a content calendar. This easy tool allows you to set timeline goals while budgeting your time realistically.

But who says content needs to build itself or only be done by one person? Tap into subject matter experts at your company so you can divide up the creation of these assets. Your team is also a great resource for some of these items, be they sales scripts, proposal templates, blog posts, or something else. 

Stuck on content ideas? Try these:

  • Customer content: Case studies, white papers, blog posts, informative videos, downloadables like infographics, eBooks, etc.
  • Informative content: emails, presentations, brochures, multimedia files, informational documents
  • Internal sales content: sales scripts, email templates, product sheets, training materials, sales playbooks, micro-trainings, onboarding documentation, PPT templates, proposal templates, training modules, role-playing videos, sales education

Categorizing Sales Content Effectively


Sales has an information overload issue, which makes this arguably the most important step when it comes to the implementation and adoption of your sales content management platform. 

It’s no secret that sales professionals are busy people, but that doesn’t always mean they’re being productive. When it takes your reps an inordinate amount of time to find the content they’re looking for, productivity (and, you guessed it: profit) takes a dip. 

The stats are staggering: Aberdeen found out that sales reps spend close to 43 hours every month searching for information. That’s over 500 hours a year. Imagine what each member of your team could do if they got even a fraction of that time back. 

Organizing sales content in ways that speed up the search process is not only a productivity enhancer but a likely factor in winning more customers.  

Channels
Separate content into channels based on goal or subject matter. It also creates a search functionality that enables multiple methods of finding the right content. 

In this paradigm, a proposal that is uploaded to the sales content management solution can be assigned to a channel, such as Automotive, as well as to other relevant channels like Proposals, Prospects, or Customers.  Similar to a quantum bit of content, it can now exist simultaneously in more than one place and be found by salespeople searching from many different angles.

The beauty of a channel-based system, as opposed to a traditional folder system, is that it allows you to quickly add content to a new or existing channel with a single click. Whereas, adding new folders to a large store of existing content is much more difficult and assets tend to get lost in the process.

Tagging
Tagging is another way to effectively facilitate content discovery. If you were to create a new proposal for BMW, it can be stored and assigned multiple tags, increasing the likelihood it will be easily found later. 

Contextual Documentation
It’s not enough to know what content exists, context is also invaluable when it comes to saving time and boosting productivity. This may be in the form of thumbnails, which can provide a clue as to what is inside the file, or a description to accompany the file name. 

Annotations
A leading-edge sales content management solution should also enable annotations, which leave important insights about content for others to refer to. You might note that x asset may work best for y cohort but a video would work better for z. When the ability to comment is enabled, sales reps and managers can collaborate better, outlining which assets may help with a particular opportunity or problem. That also means advice is preserved within the content portal and easily referred to later, rather than being forgotten or lost in a black hole of email.

A good sales content management system gives your team an easy way to share what they’ve learned so you don’t have to wait for a pipeline review or a sales conference to learn what’s working–the sales intelligence is right there next to the content they used.

This functionality does not exist when you simply save a slide deck to Box or a similar file storage system but saving it in a place where users can comment, rate, and suggest improvements or tweaks to the content is an action that can actually lead to more closed deals.  

Distributing Knowledge 


Perhaps unsurprisingly: 60-70% of content produced by sales and marketing teams never gets used. After all, if it’s not getting used, what’s the point? Your sales force is always on-the-go and having one, singular portal across multiple devices is a great way for them to find whatever content they need, wherever they are. Whether they’re using the portal on desktop, an iOS app or Android app, make the content as easy to access as possible. 

Measure the Impact


Determining what sales content is having an impact goes much further than just knowing what your team is downloading. This doesn’t just apply to your team, it also applies to prospects. Having access to a suite of analytics can help you easily see:

  • What content is being shared
  • Who is sharing it
  • Whom they are sharing the information with
  • How engaged the prospect was with it
  • If it contributed to increased sales

Data doesn’t lie: when sales teams create and distribute content that is meaningful to their audience, they are radically more effective.

———–
Would you like to learn more about how CircleHD’s sales content management solutions can help your team deliver the right message, to the right person, at the right time? We’d love to speak with you. Contact us today.


What Every CIO Needs to Know About Video Security

About a month ago, a leaked video of an all-hands meeting at Google revealed that the tech giant was struggling to deal with controversial topics that have been plaguing its internal company culture. Of course, this is not the first time an organization’s sensitive information has been made public–it almost feels like we hear about a new instance every single day. From business secrets to company culture, and beyond, the non-verbal cues able to be seen in video often go beyond what is spoken. 

As a CIO, you’re likely responsible for the overall information technology at your business. Whether you’re looking to protect company relations and trade secrets, or just looking to make the information at your meetings more secure (or something else!), content made available should always only be accessible by the intended audience. This is why enterprise-level video security protocols and encryption need to be a part of every piece of tech that touches your company. 

And, when it comes to video content, here’s a guide to what you need to know to improve the privacy of internal content so you can better protect videos from prying eyes.

How (and Why) Videos Are Created


We all know what a video is, but do you know the key components of these complex files? All videos contain a series of pictures (or frames), glued together to create motion (Fun fact: that’s why they were originally referred to as “motion pictures”). Audio track(s) are then synced with these continuous optical tracks to give them life. Depending on how the audio is packaged, and its containers, these tracks may stay bundled in one single file or made available as a separate file.

Almost 5 billion videos are watched on YouTube every single day. Further, though, video is arguably the most engaging medium for everything from learning a new skill, to sales training and overall business communication and beyond. Giving your employees the chance to make their own video content is also a great opportunity for your business. Not only is it convenient, saving time and money for your organization, but it also gives you a library of materials to use as needed. 

Once upon a time, you couldn’t create videos without fancy equipment and a sophisticated setup. But those days are long gone. Thanks to the advancements in mobile technologies and modern browsers, capturing screens and webcams has never been easier. Now, videos are being used everywhere in business, from marketing to training, onboarding to sales enablement–the list goes on. 

This widespread adoption is why making content available to the right audience remains an important job. While some videos are appropriate for the general public, oftentimes, you’ll need to secure them internally or for prospects.

Protecting Internal Videos


Any CIO knows that a combination of technologies is ideal when it comes to protecting trade secrets and content. Any of the single options listed below can be ineffective for video security when deployed alone. For best results, it’s recommended you implement more than one mechanism to secure content as dictated by its business classification.

Firewall

This mechanism is widely deployed in enterprises with any kind of content security. Firewalls restrict content availability within a boundary: It may be a physical device such as a network or a logical perimeter as we see with IP restriction. While it’s effective, it prevents employees from accessing content on the go. Since an increasing amount of employees are working remotely these days, firewalls can create barriers when accessing important videos like all-hands meetings unless deployed in conjunction with secure remote access technologies such as VPN.

Cloud technologies/software as a service (SaaS) is typically accessible from everywhere. This creates opportunities for remote employees to get connected and consume company resources in the same manner as in-house employees while bringing them together virtually.

Authentication

Limiting access to employees or partners via authentication should be the first defense mechanism implemented, as authentication plays an important factor in restricting content only to those you trust. Username/password combinations may be an easy way to start, but that becomes another password management overhead for personnel and makes the overall user experience less than desirable.

Almost all enterprises use some sort of a directory management service which stores users in a database:

  • Single sign-on provides a bridge between user experience and security while helping you achieve compliance.
  • Cloud applications need an extra bit of security, so a single factor authentication may not be enough and in this case, implementing a second-factor authentication such as smart card or TOPT devices is a good idea.

Cloud Identity management services like Okta, OneLogin or Ping improve the user experience while providing the security for cloud applications enterprises need.

Authorization

Authorization refers to limiting access to a defined user set like a department or a group but it does not work without authentication. Cloud video platforms like CircleHD enable you to restrict your videos to specific audiences with very little effort. You can even utilize segments your company already uses, such as cost center or department.

Encryption

Encryption has been utilized since 600 BC when the ancient Spartans used it to send messages during a battle, but it’s more modern form has been in use since World War I. The technology works by altering bits of content with a secret key. Then letting someone access that original content again with a complimenting key. 

There are four types of commonly used algorithms:

  • Symmetric encryption – algorithms use the same key to encrypt and decrypt the content. Its usage is considered less secure when used alone over the internet since the sender and receiver share the same key. Symmetric encryption is faster and often used to encrypt large blocks of data such as video.

  • Asymmetric encryption – This uses a public key to encrypt and a private key to decrypt the video. It can also be used to verify the authenticity of a video if a MITM attack is a risk. This algorithm is slower and requires a higher computation power, making it an unsuitable option for video security, as videos are often played on low-powered devices such as mobile phones and tablets.

  • Encryption at rest – Essentially, this can be described as converting your sensitive data into another form, which generally happens through an algorithm that cannot be understood by a user who doesn’t have the encryption key to decode it It’s particularly useful in rendering data useless to hackers, should your information be compromised.

    This is the recommended approach if you’re on a public data center or public-facing object store like AWS S3. We do that CircleHD. All your content is encrypted by KMS (key management service) where the content can only be decrypted by a key that is periodically rotated to reduce the surface of an attack vector.

  • Encryption on transit – This describes how data is transmitted. TLS (or SSL) is a secure transport channel. When used, it reduces the man in the middle (MITM) attack. The content is encrypted using a negotiated symmetric key algorithm.

AES ( Advanced Encryption Standard) is a symmetric encryption algorithm widely used for video encryption for the above-mentioned reasons. This algorithm supports various lengths of key bits, such as 128, 256, 512 or a higher multitude of 128. The downside of AES is that, once the video encryption key is shared, the keyholder can continue to decrypt the video as long as it is available. 

Intranet videos are often played on web browsers, but HTML5 player is not capable of playing an encrypted video by itself. That means you can’t just encrypt an mp4 video file and have the browser stream to play it.

Thankfully, most modern browsers (89%) support Media Source Extension (MSE). Therefore, it allows javascript to download encrypted videos, decrypt them and feed them to the media player programmatically. This process is complicated, and implementation was left up to various video vendors, however, they like to support it.

Over the years, the advancement of internet video streaming has led to 2 popular protocols for standardization: HLS (HTTP Live Streaming) by Apple & DASH (Dynamic Adaptive Streaming over HTTP) by MPEG. If your users are on the Apple ecosystem, you are out of luck and have to stick with HLS.

Why do we need HLS or DASH but not just encrypt the mp4 file?


The old mp4 file format (or container) wasn’t designed to support encryption. Your HTML5 player needs the meta-data, which is often at the end of the file. To play an encrypted video, such as a regular mp4, your browser has to download a large file before playing it. This gives your end-users a large buffering period, high CPU usage, and bad user experience. 

Solution: 

Chunking – A file splitting mechanism that allows your large video file to split into smaller blocks and encrypt each block individually. Your device or browser can then download only the necessary parts to start playing. And then download other parts as needed. Another advantage is that each block can be encrypted with a different encryption key. 

Sticking with a standard protocol such as HLS or DASH has the following benefits:

  • Portability across browsers and devices
  • Standardization of encoders and encoding algorithms
  • Adaptive bitrate streaming 
  • Standardization of encryption algorithms
  • Support for content delivery networks

While encryption of video improves the security of the content, it’s not bulletproof. Once the key is stolen, attackers can decrypt the video.

DRM – Digital Rights Management


DRM is a stronger encryption protection mechanism. It can work on an existing protocol such as HLS or DASH. It’s widely used by Hollywood and streaming services, such as Netflix and Amazon, for compliance requirements. This method, however, depends on cryptographic module support from hardware and operating system vendors. 

Most DRM solutions are fragmented and available today are proprietary and may require licensing and royalty payment. Google’s Widevine DRM is a popular solution currently made popular due to out of the box support in Chrome and Firefox browsers. Other technologies include: 

  • PlayReady from Microsoft
  • FairPlay by Apple
  • ClearKey by MPEG

(Note: CircleHD has plans to support DRM in Q2 2020 for our enterprise plans and enterprises that require higher grade video security. Please contact our sales team if you are looking for a DRM solution for your enterprise video.)

At CircleHD, we believe the ease of access to videos should be every employee’s right. It’s worth noting that over-guarding content can create a barrier to consumption across your organization. Be sure to strike a balance between your enterprise video security needs and user experience to encourage adoption across your teams. 

—–

We’d love to speak further with you about how to effectively implement a secure content management platform at your company. Please contact us to learn more about how CircleHD can meet your video security needs while encouraging employee engagement and collaboration at your enterprise.