Behind the scenes of $2 billion Indian startup movie #PNgrowth

Last month, for the first time, I witnessed something really special. Even for someone like me, whose very job and calling is to evangelise this nascent software ecosystem of ours, this was something extraordinary.

I’ve been doing this a while, and what happened last month was one of the best feelings I’ve had in this journey.

This is what happened: Some of the leading B2B enterprise startups in the country, including FreshdeskEka SoftwareCapillaryZenotiFusionChartsKiSSFlow, etc all got together under a single roof.

This is what they got together for: To help 52 other, smaller B2B startups in achieving scale, like they have.

It’s no exaggeration to say that the founders of these companies are some of the most important product leaders we have.

In the first session itself, Shekar Kirani pointed out that a platform like this will not be easily available, and the assembled startups needed to leverage the best from the network and from the folks who had arrived with the the express intention of helping them. And the product leaders who also made an important point – that they did not want the new age startups to go through the same grind, or make the same mistakes they had made in their years of scaling.

I was amazed. It is almost never that you see such accomplished professionals come together towards helping and nurturing young startups from their own learnings.

And what was this? What was happening?

This was the 2nd edition of #PNgrowth.

The first one had been in Jan 2016 at the Infosys Campus in Mysore where we had assembled around 186 founders to help companies think about Category Leadership. It went really, really well, but the feedback was that that perhaps keeping it focussed for fewer founders would help the cause better.

Many heated discussions were conducted over breakfast, lunch, dinner, and beer (especially beer) on the program for the 2nd edition and on how we can add value to the content.

These conversations were typically 4-6 hours long, which meant that the entire program/content took us over 200 hours with 12 founders brainstorming for the past 3-4 months.

It really did take us that long.

And those deep discussions based on the 1st edition’s feedback was what the program for November was based on.

And now that #PNgrowth 2016 is over, I decided to take a look back and share some of the learnings in organising this, and on how we pulled this together. 

This year, the program was designed to help companies chase ‘Good Scale’, that is, to achieve high growth without compromising on quality. There were 52 founders with us, from all over India, and a few from outside as well.

Before we get into the details, a larger question must be addressed again, largely because it keeps getting brought up. This time, I’m trying to use a different approach to explain this. Bear with me.

WHY IS iSPIRT DOING THIS ‘MOVIE’ CALLED PNGROWTH?

iSPIRT’s mission is to make India a ProductNation. We have many initiatives like Playbook RoundtablesPNcamp, etc which are focussed around building products and helping companies achieve good scale. Although there are many accelerators in our country, very few offer value to the founders/companies. Keeping this in mind, iSPIRT wanted to do something unique and create a platform which would help companies think about growth in an effective manner. More importantly, we want to make ongoing mentorship accessible to the founders.

_mg_0662The goal was to create 8-10 companies every year which would eventually go on to become $10mn revenue companies in the next 3 years.

WHO ARE THE DIRECTORS OF THE MOVIE? 

These are the co-chairs.

The first edition of PNgrowth had just finished and I was looking for someone to be the architect for the second edition. I met Shankar Maruwada for lunch at Muffets & Tuffets and was having a completely different  conversation. But, as we touched upon the PNgrowth topic, Shankar had lots of suggestions on how we could do this better. I immediately requested him to help in designing the program and helping me organise it better.. He accepted graciously, and was keen to help.

_a5a7389My next request was to get Pallav Nadhani involved again. There is a reason for this. Pallav, in many ways, was the person who forced us to think around Category Leadership. The first meeting took place at Pallav’s place which went on till 2:30 am.

By then, I had had several interactions with Aneesh Reddy, and the early playbook roundtables on Product Management had been done by him. I reached out to him and he was very keen to be part of the program and help us.

With Shankar, Pallav and Aneesh on-board, the pillars of the event were erected.

WHERE DID I FIND THE STAR CAST FOR THE MOVIE?

These, of course, were the facilitators.

Around 4-6 months in advance, we started working on the content for the event. Various topics were discussed. One thing was clear to me: Every founder had immense passion and commitment to add value to a certain topic. The format we had in mind was to make very interactive session. All of us had had enough of the ‘sage on stage’ approach. The founders were to lead sessions and work along with the participating entrepreneurs to help them extract maximum benefit.

Many discussions later, Pallav & Shankar actually started with using the frameworks & mindflips and were later joined by Girish & AneeshManav & Shekhar also used the same in their session. 

_mg_7722It was great to see that all the facilitators did an outstanding job of delivery of the frameworks and ensured that they shared real life stories and lots of data and numbers from their companies. What was more important was that they made sure they spent time with all the attendees and ensured they received personalised attention. They were able to build a personal connect and trust within the startup community by sharing internal information even though they didn’t have to, thereby making the discussion even more credible.

WHO CAME TO WATCH THE MOVIE?

Oh, that. We had huge demand for tickets from the audience, the founders of India’s growing startup community.

_mg_9870HOW DID WE THEN SELECT WHO ACTUALLY GOT TO SEE THE MOVIE?

This time, right from Day 1, we only wanted to get select founders to be part of PNgrowth.

To begin this selection process, we laid out which stage of startups would benefit from PNgrowth. We then went on and created a list of founders and reached out to them. Apart from this, we reached out to folks from within the eco-system and got them to recommend companies to us.

Each company was recommended by atleast 2-3 founders from the PNgrowth curation team. We did zero marketing for PNgrowth except for a video, which we used to communicate to potential participants. We received overwhelming response for the event thus putting me in a fix at several situations where I had to inform founders that they have been rejected for a program/event. It was difficult, but in the interest of the event, it had to be done.

_mg_8362
We finally had 54 founders who confirmed their participation, out of which 52 showed up for the bootcamp. These companies were divided into groups of 6 based on the type of customer/geography they were catering to.

WHERE DID WE HIRE THE SUPPORTING ACTORS?

These were the mentors, and we were able to get around 14 founders as mentors and were simply amazed by their commitment for the two and a half days of the event. Mentors were involved in all facets of the event – from intense board room discussions to the dance floor. Let me go little more deeper on the role that they played. In every session, the founders got access to few frameworks, mindflips which they had to fill and discuss with their peers + mentors. Lot of learnings were shared by mentors and it became very valuable to the founders. Very few of them tweeted from the program as everyone was busy interacting, engaging, absorbing content, but here is one of the tweets which acknowledges the mentors.

_mg_9832WHAT ABOUT THE CREW?

Getting to them, the volunteers.

In my work, I get to interact with many volunteers in many initiatives, but this time the commitment and the passion with which the volunteers worked was unimaginable. Folks would go to sleep at 5am and be ready next day at 8am. They would ensure that mentors/founders have had breakfast, etc and would go an extra mile to take care that founders are focussed on their work and don’t get distracted.

Volunteers also interacted with the founders to understand if the pace/level of the sessions suited them. Lot of planning was done in advance that each and every person who is part of PNgrowth goes back with a WOW experience. I still wonder where they get so much of inspiration from.

_mg_8120I don’t know if i would ever be able to do something like that. Hats off to all the volunteers who put together an awesome experience for the PNgrowth family.

SO, WHAT WAS THE MOVIE ALL ABOUT, THEN?

Day 1

The Founders started with a cricket match between the cohorts itself. 

Sharad Sharma, our guiding light, kick started the event with his words of wisdom for all the founders.

And then it began with Pallav’s session on Who are you? As founders, entrepreneurs have to pitch or sell their ideas constantly, so as to inspire the listener to believe in their dream to either fund the idea, join the team, tie up with the startup, or write about the startup. Is there a method to this? Can this be an acquired skill? 

In this session, founders learnt and practiced a simple framework that enables them to improve their ability to pitch their ideas in the shortest time, to the desired target audience – VCs, journalists, co-founders, customers, business partners, and employees.

The next session was focussed on how to maximise the value of your product. If you as a founder were to increase the perceived value of your offering (Increase average MRR by 1.5X and/or reduce churn to 0.5X),how would your economics change? How would it change your CAC, margins? What would you as a founder then do differently with your product strategy, go to market strategy (positioning, marketing, channel, pricing), team/organization structure, to increase pricing by 1.5X, in the scenarios below as relevant to you. This was followed by an interactive session with the mentors. 

This was end of Day 1 and then we had networking dinner, drinks, some dance and lots of conversations led by Vinod & Ashish.

Day 2

The second day was a more power packed with two sessions. To their credit, the founders were highly engrossed in their sessions, sans their mobile phones and laptops which helped in making these sessions successful.

During the first half, Girish and Aneesh engaged in an extremely fruitful session on product-market how to scale 10X with emphasis on how to establish your sales funnel and building a repeatable sales cycle. This session covered on selling processes from SMBs (by Girish) and enterprises (by Aneesh). They also shed some light on how pricing, positioning and selling varies from one geography to another.

Apart from this, Suresh also gave his insights on selling global products out of India.

_mg_7993The complete session went on till almost tea break after which the candidates came back in for the third and final session by Shekhar and Manav.

This session was meant to give a befitting end to the two rigorous days of activity.

While Manav spoke about how to choose your niche category and expand to other similar industries and geographies, Shekhar’s session was centred around what a VC looks for a in a startup. In the session,

Shekhar did a Q&A round with Nags and Girish on what it takes to build a successful organisation.

He also delved a bit deeper on aspects like how to choose the right market and how to intelligently figure a way out of a market and move into one that is expanding by extracting maximum business value.

Here Raghu also added his thoughts on what it takes to raise venture capital and how one should structure an organisation for a CEO to utilise his time in the most efficient manner.

Though the mentors tried to cover as much ground as possible over the two days, they took questions from audiences on anything they still might have a doubt about.

After this was a complete group photograph since some of the mentors had to leave that night. The energy of the picture speaks for itself. Before calling it a day, the founders were given tasks/homework for them to present on the final day.

Day 3

The third day, we had some inspirational stories from Sanjay Anandaram(Seedfund), Mohit Dubey (CarWale),  Phanindra Sama(RedBus), Raghunandan G(TaxiForSure), Sanjay Deshpande(FortyTwo Labs). We had actually planned for only Sanjay to talk about “entrepreneurial mindset” and then we thought about inviting all of the above folks to share their energy.

Something which we had planned for 20-30 minutes went on for around 90 mins and it was an absolute pleasure to hear some of the learnings/failures from all these founders. Below is the NPS score of 89 for PNgrowth 🙂 

nps-score-pngrowthAfter this, all founders were made to do this exercise on “Getting to 3X Growth in 12 Months”. All mentors with their cohorts spent time with the founders and helped them on what they should be thinking about this. Six Founders got an opportunity to share with the whole group.

Finally Shankar invited all volunteers to share few words on why they volunteered for PNgrowth. With it, a spectacular three days came to end, with some photographs and a lot of hugs, cheers, and greetings.

For me, it was a great feeling to see all of this happen, and at this scale. This probably capped off the year of 2016 for me and iSPIRT as a year in which we were actually able to make the ecosystem function as a cohesive, united entity. Lots of work is ahead of us, but as I write this, I acknowledge a task well begun.

_a5a7717

Many thanks to Sairam for editing & Shruti for filling the blanks.

Uniken: Delivering Secure Digital Experience

Uniken has developed a path breaking Secure Digital Platform, REL-ID™ – which delivers ubiquitous, rich multi-channel digital experience with military grade security to the customers, employees and partners of an enterprise. Uniken was founded by Sanjay Deshpande, Prakash Salvi, Nanjundeashwar Ganapathy, and Nilesh Dhande in 2003 in Boston, with the goal of setting up a world class innovation center. Uniken today boasts of 1M+ users on its platform. 

Introduction

Network communication is increasingly becoming more vulnerable to attacks. Most such attacks attempt to steal your personal details, card details (credit card or debit card), and various other information that can be put to malicious use, mostly to steal money. Whether it is Target, JPMorgan  or banks that don’t wish to be named (obviously), our information is never safe enough.

Uniken1

These attacks target one or more of these elements in the network:

  1. Network
  2. System
  3. Application

Network

There are 2 kinds of network that we use. Internet is the ubiquitous network that allows us to connect to rest of the world. Intranet is the company-wide network that allows us to connect with rest of the employees in our organization. Security hazards in both these networks are slightly different

Internet

Internet relies on open standards and some special servers like DNS (to find the IP address from the server name) and routers (devices that keep the route map of entire Internet, sending network packets from a source towards the destination). They control the way network communications occur; compromising these special servers can compromise Internet (or a large part of it).

Intranet

Intranet normally assumes that all the nodes in the network are trustworthy, and it sends traffic to every node in the network so that the intended recipient can take it while others discard it. This poses a big threat if one of the machines is compromised; controlling one machine is enough for the attacker to control the network.

With cloud services (using Internet services to replace Intranet services) becoming more prevalent in organizations, the line between intranet and internet keeps blurring.

System

Communication happens between two systems on any network. If one of the systems (either sender or receiver) is controlled by a hacker, even a secure network cannot protect you from attack and theft. Malware and viruses are the primary ways systems get compromised, which can then take over a communication link or mislead your system into thinking it is communicating with X while real communication is happening with Y (X is real bank site, Y is fake site, stealing your bank customer id/username and password).

Application

A network and the system may be safe, but if the application you are using to do the communication (say the browser, or a Torrent application downloaded from Internet) is compromised, you are exposed to attack and theft. Given the prevalence of web applications, Browsers are increasingly becoming target of attacks. With the plug-in/add-in model that all browsers support, it is becoming easier for attackers to compromise the browser and thereby compromising the communication.

Securing the network must mean securing each of these elements of the network communication. This is what Uniken attempts to do for its customers.

Uniken Advantage

Uniken2

Uniken3

 

Uniken has developed a path breaking Secure Digital Platform, REL-ID™ – which delivers ubiquitous, rich multi-channel digital experience with military grade security to the customers, employees and partners of an enterprise. Through REL-ID, the end users enjoy a rich and secure digital experience across devices (Mobiles, Tablets, Laptops and Desktops) and platforms (Windows, Mac OS, Android, iOS and Windows Phone).

Currently, over a million end users, employees and partners of very large enterprises rely on REL-ID for a seamless and secure digital experience. These enterprises have witnessed online fraud being reduced up to 100%.

So what is REL-ID (Relative Identity)? In REL-ID communication, identity of a system is dependent on the other system it is communicating with. For example, if A and B need to communicate with each other, A’s identity is established relative to B, and B is identified relative to A (hence the name Relative Identity) – this identity is relevant only for A-B communication. Such an identity is established when A or B express interest in communicating with each other, thus creating a mutually authenticated channel for communication.

The Uniken Product

Through REL-ID, Uniken offers a unique and scalable way to create a secure private network. This is achieved through 3 sub-systems that Uniken deploys for its clients – REL-ID Apps, REL-ID Network, and REL-ID Platform.

REL-ID Apps

Uniken4

Uniken5

A REL-ID App is the client application that is responsible for providing a secure way to communicate to other clients or to the server. It serves 2 purposes in the REL-ID eco-system:

  1. Provide consistent experience to users in all device and OS configurations
  2. Provide a secure way to connect the communicating end points (client-client or client-server)

A REL-ID App has 2 parts:

  • App Viewer – A native container of the application that is implemented differently for different platforms and abstracts the device-specificity. It enables creation of hybrid apps that use HTML/ HTML5 and Javascript for user interface and the APIs for accessing device specific functionality for security
  • HTML5 app – A standard application (HTML5, JavaScript) that is hosted within the App Viewer

Given that they are hosted inside the App Viewer, these apps provide consistent experience running on all devices (desktops, laptops, tablets and mobiles) and all operating systems (Windows, MacOS, iOS, Android) thereby providing excellent customer experience.

For example, if a customer of a bank (who is a Uniken Client) has to avail of netbanking, customer will install a REL-ID app that allows netbanking, and transact through it. This app can be installed on any device.

REL-ID Network

As mentioned before, the REL-ID platform secures the network by creating secure point-to-point (application to application tunnel) connection between sender and receiver. Usually, such a secure connectivity is achieved through the use of VPN (Virtual Private Network) which is hard, costly to manage and deploy at a large scale in such point to point configuration. Within REL-ID, this is achieved without using VPN, using their patented technology.

Continuing with the above example, if the bank employee wishes to check his official mail from home using Outlook (an application that is not a REL-ID App), she can launch Outlook securely through the App Viewer and App Viewer will provide a secure connection to the Exchange Server hosted by the bank. The employee doesn’t need to use complicated procedures like RSA Token in order to achieve this.

REL-ID Platform

Uniken6

 

REL-ID Platform controls the policies, permissions and access management and authentication technologies. It ensures that REL-ID Apps and data is accessible only to authorized users through registered devices. It also hosts a REL-ID Store which is a library of pre-defined REL-ID Apps ready to be deployed through App Viewer.

Differentiators

Uniken differentiates its offering in 3 areas:

  1. Patented Military Grade Secure REL-ID Private Network – Supports Mutual and Multi-factor authentication, and state of the art App-to-App tunneling technology, enabling VPN-Less remote secure access through minimal infrastructure requirement. It creates a secure and private closed digital ecosystem, accessible to only authorized users and devices. Enabling this through VPN is a much more complex affair and impossible to be rolled out to large user base like retail banking customers
  2. Compelling Secure Digital Experience – Normally, highly secure applications/systems have meant poor usability (because of restrictions placed and the focus on non-functional goal like Security). However, Uniken has focused on making its apps highly usable in addition to highly secure.
  3. Quick Apps Framework – REL-ID Digital Platform comes with inbuilt secure private app store. These Apps are available not only on the Mobile Platforms (phones/tablets) but also on the desktops/laptops.

 

Development Process

Team

Overall product development + R&D team size is more than 80, with most of their core technology stack built in C/C++, with operating system and network programming skills. They also have a team for embedded systems, who work on creating special purpose secure appliances and devices. Apps are developed in standard HTML5 technologies.

They also have a Product Management team that works closely with the sales/marketing teams and the technology R&D and Product Development teams.

Process

Developing a security product doesn’t require a drastically different product development process or tools. They operate in an iterative 3-day development cycle.

One of the interesting aspect of their development approach (and which is different than other classes of software) is to create monolithic components rather than modular components (which goes against standard design principles of software development). This is to avoid creating multiple points of failure, which is critical to avoid from security perspective.

The features that are specific to the customers are built by separate customization teams. Customizations, when required, are small changes on top of the pre-built apps in the system, and can be typically done in a 7-day rapid development cycle. These are later analyzed (every month) and brought back in to the main product development roadmap if the sales/marketing team justifies doing so.

Even as a security product, usability is a very important aspect of their development process, performance is close second.

Market

Their target segment includes banking, insurance and defense, with the largest set of current customers coming from Banking, including one of the largest Public Sector banks in India.

Over past 2 years, REL-ID has been rolled out to over 1 million users and the count is rapidly growing.
REL-ID is being seen as the next generation security technology in the most difficult to penetrate security market of Israel. This technology has also been appreciated by Indian Defense & Navy where Uniken is supporting them in their security related requirements.

The information security market is projected to reach $67 billion (Rs 4.1 lakh crore) in 2013 and grow to $95 billion (Rs 5.9 lakh crore) by 2017, according to research firm Gartner.

On the security front, there are various players like Symantec, RSA, Vasco and on the network and virtualization technologies front, Cisco and Citrix. On digital experience front, Backbase and Adobe offer similar products.

However, none of these are scalable and unified/holistic to offer a secure digital platform especially when it comes to delivering secure digital experiences to consumers.

Roadmap

Their product suite is now fairly complete in terms of features and functionality. Over next 12-18 months, they are focusing on a few key areas:

  1. Make offering more broad across BFSI
  2. Go deep in India – Penetrate further in India (BFSI, Defense)
  3. Strategic expansion in other geographies – Execute opportunities in Israel (to build credibility by competing with other security companies in Israel), initiate penetration efforts in the US market.

As they expand, the key challenges are to manage the marketing and PR, and identifying the right partners in each of these markets.

The Road Ahead

Uniken has a vision that there will be a very large number of private networks in the world (built on top of public internet) using their technology, one for each group of people who want to communicate privately and securely with each other. In a way, this is counter to what Internet stands for (openness), but given the security and privacy issues mushrooming all over, this is a laudable vision. To be clear, this is very disruptive too: there are very large companies out there whose business models depend on the fact that they can ‘see’ the traffic generated through individual systems, be it a system in an organization, at home, on the road, in hospital, or anywhere else (think digital advertising, personalized search, etc.). These models will cease to exist (or have to be significantly rewired) if the vision of secure private networks come true.

Uniken is taking small but confident steps towards that vision. In next 12-18 months, they intend to have 5 million users on their system (from 1M currently). They are confident about their model of building in India and selling to the world, and their experience working with Indian PSUs (Banks, defense) has been great. Their global marketing efforts are underway, and they are establishing themselves as a potent force in the home of security products – Israel.

It is great to see hard-core technology product being made in India and we wish them all the best as they penetrate US and other big markets of the world.