You are on page 1of 7

Technology, Media & Telecommunications Practice

A battle plan for telcos’


digital-attacker brands
Many operators need to transform themselves to cope with new
market conditions but have had difficulty making an organization-wide
overhaul. A smart digital-attacker strategy may be the solution.

This article was a collaborative effort by Rehman Adil, Cenk Erdogan, Vikas Gour, Nicolas Maechler,
and Karolina Sauer-Sidor, representing views from McKinsey’s Technology, Media &
Telecommunications Practice.

© Tim Robberts/Getty Images

March 2021
Global telecom giants currently find themselves at stand and navigate, damaging the customer
a critical crossroads. Although coverage is improving experience, especially in comparison with that
and speed is increasing with investment in 5G offered by ascendant digital-native alternatives.
networks, revenue growth from voice and data is
slowing in many markets. At the same time, the To better satisfy and hold onto their customers,
industry continues to have difficulty with meeting some operators have started to build their own
rapidly changing customer expectations, which separate digital-native-attacker units. This
are shaped by simple, personalized interactions that approach has turned out to be less expensive and
are made available by digital giants such as Airbnb, disruptive—and in some cases, more successful—
Amazon, Apple, Netflix, and Uber. Telecom operators’ than a holistic digital transformation of the core
average net promoter score (NPS), a key customer- business. The nimble, new brands are also proving
satisfaction metric, has typically been in the 20s, to be strong growth vehicles for their parent
versus more than 50 for many digital powerhouses. companies. Within four quarters from launch, the
typical digital attacker has contributed close to
There is nothing simple about most telcos’ product 25 percent of overall gross additional subscribers
portfolios, and that complexity is part of their (gross adds) to the incumbent operator, while
problem. What started as a broad range of plans showing total profitability that is more than
for a diverse customer base has evolved into a five percentage points higher (exhibit).
dizzying array of options that are difficult to under­

Exhibit

Digital attackers
attackers have
have proven
proven to
to be
bemore
morecost-efficient
cost-efficientinincustomer
customeracquisition
acquisition
parent companies.
than their parent

Average gross subscriber additions for digital attackers in the first year, % share by month

25
Digital attackers are able to acquire a good
amount of new customers in a relatively short time.
20
Share of new customers, % of parent company

15 23
Digital attackers are able to acquire customers at
10
approximately half the cost as their parent companies.

Acquisition cost, % of parent company


5

49
0

Month 1 Month 12

Source: LinkedIn; operator sites; WCIS by Informa; Corporate Performance Analytics by McKinsey

2 A battle plan for telcos’ digital-attacker brands


Most importantly, 70 percent of these gross adds What it takes to launch
are new to the operator and not cannibalized from a digital attacker
legacy parts of the business, with an acquisition The competitive rationale for launching a separate
cost that is roughly half that of the parent brand. attacker brand is compelling, and the potential
These units not only can reduce the “cost to serve” impact is substantial, but it’s nevertheless a daunting
per customer by 50 to 70 percent once they prospect for many legacy operators given the
reach scale but also consistently deliver a better duplication of roles and potential cannibalization.
customer experience, with an NPS that can be Encouragingly, we have found that if operators
as much as 30 to 40 percentage points higher than follow five steps in launching their digital attackers,
the incumbent competitors. they can see a positive return on their investment
within six to nine months: Create a radically simplified
and differentiated product; adopt customer-tested
When launching a digital attacker design and create an ultra-easy user experience;
makes sense build flexible technology that helps fuel innovation;
Choosing to embark on a digital-attacker strategy use digital-marketing tactics as well as advanced
in the first place is not a simple decision for a parent analytics to drive digital sales; recruit digital talent
operator to make. In our experience, the and organize in agile, autonomous teams.
organization’s leaders need to address several key
questions before taking the plunge: We have seen this approach adopted successfully
across geographies. For example, Sunrise
1. Would the digital attacker help accelerate Communications in Switzerland launched yallo as
customer acquisition with a differentiated brand a digital-attacker brand to pursue aggressive
and value proposition that will serve an growth with a primary focus on digital offers and
underserved or underindexed segment? digital marketing. Orange Flex in Poland, Yaqoot by
Zain in Saudi Arabia, and by.U by Telkomsel in
2. What would be the cannibalization impact? Indonesia have all positioned the digital attacker as
Even if it is potentially significant, is there merit a new, fully digital value proposition, including
in a preemptive self-cannibalization strategy digital customer journeys such as onboarding, acti­
to protect “share in digital” (that is, cannibalize vation, and service. Some of these digital attackers
yourself before others cannibalize you)? have even started expanding into true digital-
services platforms (for example, video, gaming,
3. Do the company’s existing technology and and messaging).
processes provide the means to test and
learn quickly? All of these players have shown that the key to
a digital attacker’s success is having an agile, lean
4. Do the existing operating model, brand operating model that gives it the flexibility and
perception, customer expectations, technology nimbleness to make rapid changes, shift its business
stack, and business processes pose any strategy, and go to market quickly. The five steps
challenges to launching a new proposition that is that we have identified are critical to achieving
fundamentally lean and nimble? that goal.

5. Is there an opportunity within the existing 1. Create a radically simplified and differentiated
operating model to experiment with a more open product. Telecom operators’ product portfolios
ecosystem and telco adjacencies? have grown exceedingly complex over time.
Taking various options into account, operators
6. Is there a cost advantage to explore by moving to might offer more than 20 separate mobile plans,
an end-to-end or hybrid digital proposition? each with many pages of fine print and often

A battle plan for telcos’ digital-attacker brands 3


The plans offered by digital attackers
are transparent, easy to understand, and
easily can be changed to fit a customer’s
shifting needs. This instant adaptability
is key to their growing popularity.

featuring late fees and other charges that surprise simple wording and communication. Design
customers at the end of the month. professionals must work closely with customers
to create and test the user interfaces (UI) and
To appeal to today’s demanding customers, digital user experiences (UX) every step of the way (for
attackers make their offerings much less example, making sure customers navigate as
complicated. They look to Netflix as a model for few screens as possible to accomplish a task and
ease of use and transparency. The streaming easy switches to turn options on and off).
giant has just a few different plans based on the
number of screens, with monthly rates that For example, one operator used internal cross-
have no hidden fees or charges. The average functional teams and collaborated with more
legacy telecom company has three to four than 4,000 customers across the whole country
times more mobile-package variations compared to create its digital operator: the process
to digital attackers. In fact, many attackers— included quantitative research with several
including FUNK by freenet and yallo swype by thousand customers during the discovery
Sunrise Communications—only have two and research stage, individual testing sessions
different offers. on UX/UI design with several hundred
customers, multiple co-creation hackathons,
Yet, it isn’t just the sheer small number of different and preproduction delivery testing with
plans that makes these upstart brands stand approximately 60 customers. After the launch,
out. The plans themselves are transparent, easy the operator reviewed more than 1,000 chats per
to understand, and easily can be changed to fit week and addressed customer feedback.
a customer’s shifting needs. This instant
adaptability is key to their growing popularity. If The operator used this rigorous process to
customers suddenly decide they need more design end-to-end journeys that are 100 percent
data or roaming for a trip, for instance, they can within the app, from onboarding to support.
order it from their mobile phones with just a few Customers can upgrade or downgrade their data
clicks or swipes, and the plan will automatically plans in real time and easily purchase (and
be updated in real time. immediately use) additional data in roaming or
international call minutes. Moreover, there
2. Adopt customer-tested design and create an are no loyalty contracts. Customers can subscribe
ultra-easy user experience. Even if a digital- and unsubscribe by simply swiping on or off
attacker brand does a great job streamlining its on their phone.
service offering, it won’t reap the full benefits
without an equally simplified user experience. That This marriage of a simplified offering and user-
means having a seamless, intuitive interface and tested design means that customers end up

4 A battle plan for telcos’ digital-attacker brands


having fewer questions and, as a result, the cost digital channels. For example, a digital attacker in
to serve drops significantly. One operator made the Middle East built more than 25 microservices
self-service one of the building blocks of the new that simplify the integration with front-end
customer journey, going so far as to eliminate channels while simultaneously implementing
the inbound customer-care call center altogether. customized user experiences for digital-ID
Its digital attacker now has a two-tiered verification, rewards, digital payments, and sub­
customer-service structure. The first level makes scription management. These microservices-
self-guided and self-help online tools available based modules allowed the digital attacker to
24/7. Chatbots, for example, have evolved from iterate, test, and continuously improve the
serving information to processing requests. digital front-end experience to achieve product–
If that doesn’t resolve the issue, the problem is market fit within eight months after the
escalated to a second level. Ticketing captures initial launch.
inquiries in a structured format and then
progressively addresses root causes and auto­ By selecting the right technology and adopting
mates answers. Phone contact is only possible the best engineering practices (for example,
as an outbound callback. business and operations support systems to
maximize automation in the software-
Moreover, the company built its new billing system development life cycle), the digital attacker will
with keen attention to the UX and UI. For example, benefit from a faster “build–measure–learn”
it created an interactive self-care website that loop.1 The faster the learning cycle, the faster the
offers complete transparency on payment status. route to innovation and product-market fit.
The customer can drill down to understand
charges. As a result, the number of bill-related 4. Use digital marketing and advanced analytics to
inquiries to customer care fell by 30 percent. drive digital sales. To fuel revenue growth, telcos
also need a much faster time to market for new
3. Build flexible technology that helps fuel promotions and campaigns. Being successful in
innovation. Digital-attacker brands need to digital sales requires continuous reinvention
launch and experiment with new features (for example, adopting new channels, formats,
and customer experiences rapidly. That requires creatives) to tap new pools of subscribers.
a new IT stack that is flexible, modular, and
operates independently of the incumbent telco’s Accordingly, digital attackers operate their new
IT systems. promotions and campaigns on a very short idea-
to-execution cycle: a few days versus several
These new IT stacks should leverage cloud- weeks at most incumbents. For example, yallo by
native deployments whenever possible to Sunrise Communications implemented weekly
simplify IT operations and reduce operational marketing sprints. Each Wednesday, teams decide
overhead. Cloud adoption is gaining momentum what they will launch the following Monday. The
with the advent of 5G because 5G standards entire marketing system is configured to move at
are pushing for cloud-native architectures for pace, including all external partners.
telco infrastructure. Vendors of business
and operations support systems are pushing Advanced analytics can turbocharge the learning
cloud-based offerings to the market. process and help digital attackers to personalize
offers based on a customer’s current plan and
Another key component of these new IT stacks circumstance; for example, knowing when a cus­
is a microservices-based architecture, especially tomer is landing in a new country and needs
for the software modules that integrate with the international data roaming or recognizing when a

1
Eric Ries, The Lean Startup: How Today’s Entrepreneurs Use Continuous Innovation to Create Radically Successful Businesses, first edition,
New York, NY: Crown Business, 2011, theleanstartup.com.

A battle plan for telcos’ digital-attacker brands 5


customer is seeking specific help and linking engineers, and data scientists), along with
them to relevant tutorials. new agile ways of working. In an agile setup, small
squads with a combination of these skills
By leveraging marketing tools from outside the operate with a fair amount of autonomy and
industry (rather than traditional telecom customer- continuously perform customer testing
relationship-management systems), digital and gather customer feedback in two-week
attackers can build marketing technology stacks sprints, delivering updates frequently.
that rapidly implement such personalization
strategies through all channels. One digital Traditionally, large telecom players have lacked
attacker runs more than 200 personalized micro­ much of these skills, relying instead on an
campaigns in parallel for specific use cases. outsourcing model. Digital-native organizations,
Meanwhile, everyone on a digital-attacker sales however, cannot afford to use that kind of
team, not just the analytics specialists, needs approach, given their need to learn and respond
visibility into sales data through tools such as faster and rapidly adapt the digital experience.
web analytics, and managers need performance- Building up the necessary internal talent and
management tools to track results, progress capabilities requires new approaches, such as
toward milestones, and drive account­ability. recruiting on university campuses, creating a
Targets should be managed daily. work environment that is attractive to passionate
and skilled individuals, and ensuring autonomy
Promotion and sales are further improved by and a culture that is accepting of failures. One
embedding partners such as marketing agencies attacker used hackathons as a main source
much deeper into daily operations than most of recruiting. Another focused on fostering a lean
telcos do today. One operator linked the marketing and nonhierarchical organization, even creating a
agency’s compensation to the sales target of separate physical work area with plenty of open
the attacker rather than simply paying a service space and screens with live dashboards to foster
fee and, as a result, was able to achieve its goal a lively and more collaborative environment.
by 120 percent.
While team empowerment is crucial, it is equally
5. Recruit digital talent and adopt an agile working important to ensure transparency and a
model. The digital model requires more specific, performance-based culture. Two digital attackers
technology-savvy skill sets than exist within most defined objectives and key results (OKRs) as
incumbent telcos today (that is, designers, an approach to set and measure the targets for
product owners, tech leads, developers, data the teams and individuals. For example, the

By leveraging marketing tools from


outside the industry, digital attackers can
build marketing technology stacks
that rapidly implement personalization
strategies through all channels.

6 A battle plan for telcos’ digital-attacker brands


OKRs for digital marketing and growth were linked often, the existing operating model, technology
to the cost of acquisition and the number of practices, working culture, or talent pool within
gross adds, while OKRs for engineers were linked the legacy organization did not seem to be
to availability and uptime of the system. conducive to launching such a different and lean
offering. This design approach helps ensure
Creating and preserving this environment— agility from planning to execution, including faster
without sacrificing expectations for speedy decision making and a more flexible approach
results—also requires commitment from top to budget allocation, while enabling the creation
management. To help maintain that commit­ment, of new organizational structures, job families,
leaders can validate key elements of the launch and performance management. It also provides
by reviewing specific markers. Successful digital the necessary autonomy and grounds to
attackers have tested the product-market fit experiment and innovate in a relatively risk-free
early on by analyzing changing consumer needs environment with the aim of applying the
and behaviors, interpreting user data, and learnings back to the parent company gradually.
tweaking the proposition, user experience, and
interface accordingly. One telco in Asia ran
a very effective beta program that attracted more
than 30,000 subscribers well before launch; Many telecom operators are in dire need of
they not only provided valuable insights to help transforming themselves to cope with new market
tweak the offering and interface but also conditions but have had difficulty making an
remained paying subscribers after launch. organization-wide overhaul. We believe launching
separate digital-attacker brands is an alternative
Finally, from a broad structural standpoint, oper­ route to digital transformation and a way to address
a­tors have succeeded with digital attackers customers’ changing demands rapidly. Once at
by building and operating them under a separate scale, the digital attacker can become the main
organization (business unit or legal entity). All too growth driver for the parent operator.

Rehman Adil is an associate partner in McKinsey’s London office, Cenk Erdogan is a partner in the Istanbul office,
Vikas Gour is an associate partner in the Singapore office, Nicolas Maechler is a senior partner in the Paris office, and
Karolina Sauer-Sidor is a partner in the Vienna office.

Designed by McKinsey Global Publishing


Copyright © 2021 McKinsey & Company. All rights reserved.

A battle plan for telcos’ digital-attacker brands 7

You might also like