Have you considered employing usage-based billing to help stop revenue leakage at your organization?

Yes, we have usage-based billing21%

Yes, I've considered it54%

No, I haven't considered it21%

I'm unfamiliar with "usage-based billing"2%

703 PARTICIPANTS
6.9k viewscircle icon1 Upvotecircle icon3 Comments
Sort by:
vp information technology in Consumer Goods4 years ago

We absolutely see usage-based billing as a growing demand.

Lightbulb on2
CTO in Finance (non-banking)5 years ago

From my experience in telecom, I have found that overly focusing usage-based billing, eg minutes, data utilization, can actually cost mor than it saves. The cost of managing the billing and the complexity for the customer can ultimately cost much more than uneven utilization. And the six sigma era burned in the concept that variance is what often creates issue. If you cannot predict your spend, you will go to a provider that is.

I tend to focus billing based on customer perception of value and orient pricing around 2 or 3 factors that change tiers. For example, project management might be the number of projects and users.

Lightbulb on1
Director of Information Security in Energy and Utilities5 years ago

It also ultimately depends on the type of product/service in question. For certain types it's really N/A and it's very relevant and easy to implement for others.

Lightbulb on2

Content you might like

Severe impact: Major disruptions in critical services and operations12%

Significant impact: Noticeable disruptions but manageable26%

Moderate impact: Some disruptions but business largely continues as usual22%

Minor impact: Minimal disruptions with quick resolution13%

No impact: Not affected28%

View Results

Recovery procedures: Activating recovery procedures and guiding help desk on increased calls46%

Employee Support: Assisting affected employees with alternative work methods and internal updates (intranet posts, email blasts)59%

Incident response: Activating in-depth security investigation and response procedures51%

External support: Seeking support from external consultants, tech vendors, and service providers22%

Security measures: Implementing additional security controls and notifications to protect our users32%

External communication: Providing updates to customers and external stakeholders28%

CrowdStrike communication: Communicating directly with CrowdStrike26%

Microsoft communication: Communicating directly with Microsoft19%

Other: Share in comments3%

View Results