{"id":26550,"date":"2017-04-19T05:00:01","date_gmt":"2017-04-19T12:00:01","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=26550"},"modified":"2017-05-01T14:21:05","modified_gmt":"2017-05-01T21:21:05","slug":"sp-ever-happened-jennifer-subscribers-can-go-engaged-enraged","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/04\/sp-ever-happened-jennifer-subscribers-can-go-engaged-enraged\/","title":{"rendered":"What Ever Happened to Jennifer? How Subscribers Can Go From Engaged to Enraged"},"content":{"rendered":"<p><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"xGkKNFmBVHo\" ><\/lite-youtube><\/div><\/p>\n<p>Recently, we published a light-hearted video \u201c<a href=\"https:\/\/youtu.be\/xGkKNFmBVHo\" rel=\"nofollow,noopener\" >If Your Smartphones Could Talk<\/a>,\u201d in which we captured an infected mobile phone\u2019s \u201cguilty confession\u201d to sending unauthorized premium text messages without its subscriber\u2019s (Jennifer\u2019s) knowledge. It was a humorous attempt to make an important point \u2013 malware on subscriber devices can have a real impact on a service provider\u2019s bottom line and on their most important asset \u2013 the subscriber.<\/p>\n<p>Here are some more details on Jennifer\u2019s experience and how a subscriber like Jennifer can impact service provider profitability.<\/p>\n<p>Jennifer is an example of how subscribers can quickly move from satisfied and \u00a0\u201cengaged\u201d to dissatisfied and enraged as a result of a security incident. Research has shown that dissatisfied customers cost more to serve, and they spend less money, even if they don\u2019t churn out to another provider. There are real dollars in terms of support costs and lost revenue opportunities.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/04\/Jen_1.png\"><div style=\"max-width:100%\" data-width=\"975\"><span class=\"ar-custom\" style=\"padding-bottom:29.85%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-26553 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/04\/Jen_1.png\" alt=\"jen_1\" width=\"975\" height=\"291\" \/><\/span><\/div><\/a><\/p>\n<p>Imagine the following scenario: Jennifer is a subscriber in a high-value consumer segment. Total acquisition costs are high, but lifetime value, including additional quad play services plus lines and phones for family members, is much greater than a typical subscriber (see chart below).<\/p>\n<p>&nbsp;<\/p>\n<table style=\"height: 148px;\" width=\"437\">\n<tbody>\n<tr>\n<td width=\"168\"><\/td>\n<td width=\"70\">Typical<\/td>\n<td width=\"77\">Jennifer<\/td>\n<\/tr>\n<tr>\n<td width=\"168\">Cost of acquisition<\/p>\n<p>-\u00a0\u00a0 including device subsidy<\/td>\n<td width=\"70\">$150<\/td>\n<td width=\"77\">$1,300<\/td>\n<\/tr>\n<tr>\n<td width=\"168\">Monthly ARPU<\/td>\n<td width=\"70\">$100<\/td>\n<td width=\"77\">$265<\/td>\n<\/tr>\n<tr>\n<td width=\"168\">Life-time value (net)<\/td>\n<td width=\"70\">$150<\/td>\n<td width=\"77\">$4,000<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Jennifer provides additional benefits \u2013 she is an active promoter of the brand \u2013 she loves her new phone and wants to try all the new apps her friends have been telling her about. She is so thrilled, she posted a picture of herself with her phone on social media.<\/p>\n<p>So what happened to Jennifer after the guilty mobile device sent countless \u201csilent\u201d SMS messages?<\/p>\n<p>Well, as you might guess, when Jennifer got her bill, she discovered hundreds of dollars in charges for premium text messages she never wanted or sent. She was furious and called customer care. In the lengthy conversation that followed, the customer care rep refunded Jennifer and told her she might have malware on her phone. Although her immediate problem was resolved, the experience left her with nagging doubts \u2013 malware on her phone? She didn\u2019t even know mobile devices could get infected and she is reconsidering whether she should allow her family members to get the mobile phones they want. Research suggests she is likely to tell 10-12 of her friends about her negative experience.<\/p>\n<p>For example, if Jennifer decides to switch providers earlier than expected, never expand the plan to add her family, and not buy any of those extra value-added services, that $4,000 potential lifetime value could easily drop as low as $150. That $150 barely covers the cost of the call to customer care.<\/p>\n<p>With the average monthly malware infection rate reported by Nokia now at 1.35 percent of mobile devices, a service provider with 20M subscribers could have 270,000 \u201cJennifers\u201d calling customer care every month! That\u2019s a huge risk to future revenue, a big increase to customer care costs, and can certainly contribute to high churn.<\/p>\n<p>These are major concerns all service providers are facing today. Palo Alto Networks Next-Generation Security Platform enables service providers to offer protection to their subscribers and enterprise customers while further protecting their own networks from malware-related attacks.<\/p>\n<p>Learn more about the new role of security in service provider value and revenue creation in our white paper, \u201c<a href=\"https:\/\/get.info.paloaltonetworks.com\/webApp\/security-monetization-en\">Rethink Security Monetization<\/a>.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/go.paloaltonetworks.com\/ignite2017\"><div style=\"max-width:100%\" data-width=\"820\"><span class=\"ar-custom\" style=\"padding-bottom:41.46%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-25356 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/03\/ignite17-social-cover-img-facebook-820x340.png\" alt=\"ignite17-social-cover-img-facebook-820x340\" width=\"820\" height=\"340\" \/><\/span><\/div><\/a><\/p>\n<p><strong>Ignite \u201917 Security Conference: Vancouver, BC June 12\u201315, 2017<\/strong><\/p>\n<p>Ignite \u201917 Security Conference is a live, four-day conference designed for today\u2019s security professionals. Hear from innovators and experts, gain real-world skills through hands-on sessions and interactive workshops, and find out how breach prevention is changing the security industry. Visit the <a href=\"http:\/\/www.paloaltonetworksignite.com\" rel=\"nofollow,noopener\" >Ignite website<\/a> for more information on tracks, workshops and marquee sessions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What ever happened to Jennifer? keeping subscribers secure can impact service provider profitability. <\/p>\n","protected":false},"author":336,"featured_media":28659,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1097],"tags":[3573,3486],"coauthors":[3480],"class_list":["post-26550","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-providers","tag-iot-service-providers","tag-mobile-network-operators"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/05\/blog-service-providers-banner-650x300.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/26550","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/336"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=26550"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/26550\/revisions"}],"predecessor-version":[{"id":28731,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/26550\/revisions\/28731"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/28659"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=26550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=26550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=26550"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=26550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}