Our Qualification covers the fundamental knowledge of MEDDPICC
Our methodology covers the 'HOW' and the methods you can use to uncover pain, quantify value, differentiate and accelerate.
The Sales Process looks at the structured set of steps to convert prospects into customers. Analyzing stages, pipeline definitions and events.
Our products under the 'Measure' pillar help you assess the maturity of your GTM function and provides in-depth areas of improvement.
At it's core, mOS provides an opportunity management tool, designed to help sellers progress deals and highlight gaps in a proactive and efficient mindset
Built in org-chart, stakeholder mapping functionality. Add your core stakeholders across your opportunities and highlight potential gaps across Economic Buyers and Champions
mDB is not just a repository; it's a streamlined database aimed to simplify value propositions and enable alignment across GTM teams
Two-way sync with SFDC to ensure opportunities, stakeholders and deal information is integrated across CRMs
An AI tool built into mOS, sharing best practices, support, guidance and data with Sellers ensuring they're getting the very best from MEDDPICC
Explore our recent releases, learn about enhancements and see how we continue to evolve our purpose-built MEDDPICC platform to better serve your needs.
We offer two core products; MEDDICC Playbook and MEDDICC Operating System; together these products enable teams to adopt MEDDPICC and to maximize implementation ROI.
Our playbook helps you go from questioning the how to understanding the why. All of our enablement programs are part of our playbook.
We only work with companies, where we can see a clear ROI on your membership.
Our purpose-built MEDDPICC SaaS helps you put theory into practice. Currently only available for businesses and teams.
We only work with companies, where we can see a clear ROI on your membership.
Your true sales potential is just around the corner and it’s time for you to unlock it.
MEDDICC can equip you with the tools necessary to align the entire GTM team and achieve bigger wins, faster.
Enablement teams collaborate with us to bring in MEDDPICC subject matter expertise aimed to better their execution.
We work with VCs and PEs to enable portfolio companies to increase sales velocity and maximize ROI.
We help teams improve their revenue output, see how we helped organizations like yours win more, faster with MEDDPICC.
Struggling with forecast accuracy? MEDDPICC replaces uncertainty with predictable results.
Long ramp times slowing revenue? MEDDPICC speeds up onboarding, cuts churn, and delivers faster results.
Want to break into enterprise? MEDDPICC gives your team the strategy to close complex deals and scale upmarket confidently.
Want to grow deal sizes? MEDDPICC helps your team engage the right stakeholders and align the buying process, driving higher ACV and more revenue per opportunity.
Struggling with retention and expansion? MEDDPICC maximizes customer value, driving upsells, reducing churn, and boosting net revenue retention.
Is low productivity slowing your team? MEDDPICC equips reps with tools to increase efficiency, minimize wasted time, and focus on closing deals.
Whether you're a seasoned pro or new to MEDDIC, we provide tailored support to help you implement and master MEDDPICC. Our solutions are designed for all levels, ensuring success and growth across your customer lifecycle.
We only work with companies, where we can see a clear ROI on your membership.
See how MEDDPICC helps teams tackle real-world challenges. After working with 500+ organizations, we’ve seen it boost everything from win rates to deal velocity, no matter your industry or team size.
We only work with companies, where we can see a clear ROI on your membership.
We only work with companies, where we can see a clear ROI on your membership.
We only work with companies, where we can see a clear ROI on your membership.
Data protection and information security are key elements of MEDDICC’s products and services. Protecting your data and earning your trust is pivotal to us. Therefore, we have implemented and keep on developing technical and organizational measures to ensure secure processing of information.
Our practices are based on the legal framework of the European General Data Protection Regulation (EU GDPR) as well as common standards and guidelines such as ISO 27001.
Organizational Security
Information Security Program
We have an Information Security Program in place that is communicated throughout the organization. Our Information Security Program follows the criteria set forth by the SOC 2 Framework. SOC 2 is a widely known information security auditing procedure created by the American Institute of Certified Public Accountants.
Third-Party Audits
Our organization undergoes independent third-party assessments to test our security and compliance controls.
Roles and Responsibilities
Roles and responsibilities related to our Information Security Program and the protection of our customer’s data are well defined and documented. Our team members are required to review and accept all of the security policies.
Security Awareness Training
Our team members are required to go through employee security awareness training covering industry standard practices and information security topics such as phishing and password management.
Confidentiality
All team members are required to sign and adhere to an industry standard confidentiality agreement prior to their first day of work.
Background Checks
We perform background checks on all new team members in accordance with local laws.
Cloud Security
Cloud Infrastructure Security
All of our services are hosted with Amazon Web Services (AWS). They employ a robust security program with multiple certifications. For more information on our provider’s security processes, please visit AWS Security.
Data Hosting Security
All of our data is hosted on Amazon Web Services (AWS) databases. These databases are all located in the [United States]. Please reference the above vendor specific documentation linked above for more information.
Encryption at Rest
All databases are encrypted at rest.
Encryption in Transit
Our applications encrypt in transit with TLS/SSL only.
Vulnerability Scanning
We perform vulnerability scanning and actively monitor for threats.
Logging and Monitoring
We actively monitor and log various cloud services.
Business Continuity and Disaster Recovery
We use our data hosting provider’s backup services to reduce any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team in the event of any failures affecting users.
Incident Response
We have a process for handling information security events which includes escalation procedures, rapid mitigation and communication.
Access Security
Permissions and Authentication
Access to cloud infrastructure and other sensitive tools are limited to authorized employees who require it for their role.
Where available we have Single Sign-on (SSO), 2-factor authentication (2FA) and strong password policies to ensure access to cloud services are protected.
Least Privilege Access Control
We follow the principle of least privilege with respect to identity and access management.
Quarterly Access Reviews
We perform quarterly access reviews of all team members with access to sensitive systems.
Password Requirements
All team members are required to adhere to a minimum set of password requirements and complexity for access.
Password Managers
All company issued laptops utilize a password manager for team members to manage passwords and maintain password complexity.
Vendor and Risk Management
Annual Risk Assessments
We undergo at least annual risk assessments to identify any potential threats, including considerations for fraud.
Vendor Risk Management
Vendor risk is determined and the appropriate vendor reviews are performed prior to authorizing a new vendor.
Contact Us
If you have any questions, comments or concerns or if you wish to report a potential security issue, please contact security@meddicc.com.
Suggested information to provide (where applicable):
URL where the issue was detected:
Your company name and the user name affected:
Type of affected data:
Device / operating system information:
Information on how the issue can be reproduced