How to build for Large Enterprises?

  1. Business
  2. Information Technology
  3. Information Security
  4. Legal
  5. Compliance
  6. Procurement
  • Who logged in and at what time?
  • Who logged out and at what time?
  • Who created something?
  • Who deleted something?
  • Who modified something?
  • Who added another user?
  • Who shared something with someone else?
  • Provide access to multiple users at once
  • Revoke access of multiple users at once
  • Provide access to a certain designation of all users. For instance, all the VP-level employees of the company.
  • Vulnerability Assessment (VA)
  • Penetration Testing (PT)
  • Source Code Review
  • Application Security (AppSec)
  • XSS Scripting Attack
  • SQL Injection Attack
  • DDoS Prevention
  • Requirement of an Antivirus System
  • What is your company’s leave policy?
  • Code of Conduct Policy
  • Remote Access Policy
  • Incident Management Policy
  • Access Control Policy
  • Does your product improve the employee experience? Show the change in eNPS
  • Does your product reduce application downtime? Show the reduction in downtime
  • Does your product improve Customer experience? Show the increase in NPS or CSAT

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store