Campaign Focus: Replace legacy VPN with Cloudflare Zero Trust. Secure remote workforces, reduce complexity, improve performance.
Target Persona: CTO / VP Engineering
Why this angle works: Phrase was named a Forrester Wave Leader in Translation Management (2023). They're aggressively scaling enterprise sales, signing clients like Publicis. Enterprise procurement teams now audit SaaS vendors for security posture — SOC2, ISO27001, and Zero Trust architecture are becoming table stakes for $100K+ contracts. Phrase's current stack (legacy VPN, multi-cloud access) creates friction in enterprise sales cycles. A modern Zero Trust posture becomes a competitive advantage that accelerates deals.
Source: Forrester Wave: Translation Management Systems, Q3 2023. Phrase announced Publicis partnership in 2024. Enterprise SaaS buyers increasingly require Zero Trust/SASE in vendor security questionnaires.
Subject line: "Forrester Leader + enterprise sales — security posture question"
Draft email:
Hi [Name],
Congrats on the Forrester Leader recognition — that's a huge validation of Phrase's platform.
As you scale enterprise sales (Publicis and similar), I'm curious about your security posture in vendor evaluations. Enterprise procurement teams now routinely ask about Zero Trust architecture, device posture checks, and least-privilege access.
We help fast-growing SaaS companies replace legacy VPN with Zero Trust — not just for security, but because it becomes a sales accelerator. "We run Cloudflare Zero Trust" checks a box that speeds up enterprise procurement by 2-3 weeks.
Worth a brief conversation?
Best,
[Your name]
Target Persona: CISO / IT Director / VP People Operations
Why this angle works: Make (Integromat) was acquired by Celonis in 2020 for ~$100M. Celonis is a German enterprise process mining company with strict security and compliance requirements (German data protection, SOC2, enterprise vendor standards). Make is a fully remote company with 500+ employees across multiple countries. Post-acquisition, Celonis likely requires Make to align with enterprise security standards. Legacy VPN doesn't meet modern enterprise security requirements — Zero Trust does. The timing is perfect: post-acquisition integration windows are when security architecture changes get approved.
Source: Celonis acquired Integromat (Make) in 2020. Make operates fully remote with 500+ employees across 20+ countries. Celonis is an enterprise SaaS company with Fortune 500 clients requiring strict security compliance.
Subject line: "Make + Celonis — post-acquisition Zero Trust question"
Draft email:
Hi [Name],
Make's fully remote model with 500+ employees across 20+ countries is impressive — but I imagine it creates real security complexity, especially post-Celonis acquisition.
German enterprise companies have strict security requirements. Legacy VPN doesn't provide the device posture checks, least-privilege access, or audit trails that enterprise compliance teams expect.
Post-acquisition integration is actually the ideal time to modernize access infrastructure — budgets are flexible, change is expected, and you can align with Celonis security standards in one move. Cloudflare Zero Trust replaces VPN, SWG, and CASB with one platform.
Worth a 15-minute conversation about how Make thinks about remote access security?
Best,
[Your name]
Target Persona: CISO / Head of Infrastructure (Martin Šašek or equivalent)
Why this angle works: Seznam is the Czech Republic's largest domestic internet company — a de facto piece of national infrastructure serving 6M+ daily users across Email.cz, Novinky.cz, Mapy.cz, Stream.cz, and 25+ other services. They operate their own data centers but also have distributed engineering teams, content moderators, and support staff accessing critical systems remotely. As a high-visibility national target, Seznam faces elevated nation-state and criminal threat actor interest. Legacy VPN concentrators become single points of failure and are notoriously difficult to secure at scale. NÚKIB (Czech cyber security agency) has explicitly recommended moving beyond VPN to Zero Trust architecture for critical infrastructure operators. Seznam's scale and national importance make them a natural fit for enterprise Zero Trust — not just for remote access, but for segmenting access across 30+ services.
Source: Seznam operates 30+ services with 6M+ daily users. NÚKIB has issued guidance recommending Zero Trust for critical infrastructure. Seznam operates own data centers but has distributed workforce. National portal status makes them high-value target.
Subject line: "Critical infrastructure access — Seznam security architecture question"
Draft email:
Hi [Name],
Seznam operates infrastructure that millions of Czechs rely on daily — email, news, maps, search, and video. That's a remarkable responsibility.
I'm curious about your remote access architecture. With distributed engineering teams, content moderators, and support staff accessing critical systems, legacy VPN creates both security gaps and operational bottlenecks. NÚKIB has specifically recommended Zero Trust architecture for operators of critical infrastructure.
Cloudflare Zero Trust is used by critical infrastructure operators globally — including government agencies and national portals — to replace VPN with identity-aware, least-privilege access that scales to hundreds of services and thousands of users.
Would you be open to a conversation about how Seznam thinks about workforce access security at national scale?
Best,
[Your name]
Target Persona: CTO / CISO (Marek Trunkát or Jan Čurn)
Why this angle works: Apify is a Series B web scraping and automation platform with 25K+ customers and a global distributed team. Their core product involves running Actor code on their infrastructure to scrape data from websites worldwide. This creates a unique security challenge: their engineering team needs secure access to scraper infrastructure, customer datasets, and internal APIs — while their platform itself is a high-value target (attackers would love access to 25K customers' scraping configurations and data). Legacy VPN doesn't provide the granular, identity-aware access that a platform company handling sensitive scraped data requires. At Series B scale with global employees, Apify needs a modern access architecture that scales with headcount without adding operational overhead.
Source: Apify raised Series B in 2022 (J&T Ventures). They operate a platform with 25K+ customers and global distributed team. Their infrastructure handles sensitive scraped datasets. Series B companies typically scale from 50 to 200+ employees, making access management a growing pain.
Subject line: "Global team + sensitive data — Apify access security question"
Draft email:
Hi [Name],
Congrats on the Series B and 25K customers. Scaling Apify means you're managing an increasingly complex security landscape.
I'm thinking about your remote access model. Your platform stores 25K customers' scraping configurations and datasets — highly sensitive information. Your engineering team is global and growing. Legacy VPN gives anyone with credentials broad network access, which creates real risk if an account is compromised.
Zero Trust replaces network-based access with identity-aware, least-privilege permissions. Each engineer gets access only to the specific systems they need — scraper infrastructure, dataset storage, or internal APIs — based on their role and device posture.
Worth a 15-minute conversation about how Apify thinks about workforce access security?
Best,
[Your name]
Target Persona: IT Director / Security Lead (Post-Cisco Integration)
Why this angle works: Slido was acquired by Cisco in 2020 for an estimated $100M+ and has been integrated into the Webex suite. Cisco has strict enterprise security standards — they operate one of the world's largest security portfolios and expect acquired companies to align with Cisco's security architecture. Post-acquisition, Slido's infrastructure and workforce access models are likely being audited against Cisco's internal standards. Cisco has publicly embraced Zero Trust as a core architecture principle (Cisco's own Zero Trust framework). For Slido, this means two things: (1) their own workforce access must meet Cisco standards, and (2) their product must eventually integrate with enterprise identity and access management systems. The post-acquisition window is the ideal time to modernize — budgets are allocated, change is expected, and security alignment is mandated.
Source: Slido acquired by Cisco in 2020. Cisco operates extensive security portfolio and mandates security alignment for acquisitions. Cisco has published Zero Trust architecture framework. Post-acquisition integration typically includes security audit and infrastructure standardization.
Subject line: "Slido + Cisco — post-acquisition access security question"
Draft email:
Hi [Name],
Slido's integration into Cisco Webex has been impressive — the audience engagement features are now available to Cisco's massive enterprise customer base.
I'm curious about the post-acquisition security alignment. Cisco has strict internal security standards and has publicly embraced Zero Trust as a core architecture principle. For acquired companies, this typically means modernizing workforce access to meet enterprise compliance requirements.
Post-acquisition windows are actually ideal for this — budgets are flexible, change is expected, and security alignment is mandated. Cloudflare Zero Trust replaces legacy VPN with identity-aware access that integrates seamlessly with Cisco's existing identity infrastructure.
Would you be open to a brief conversation about how Slido is approaching post-acquisition security modernization?
Best,
[Your name]
Target Persona: CISO / VP IT / Head of Global Infrastructure
Why this angle works: Celonis is a German process mining unicorn valued at $13B+ that serves Fortune 500 clients including Siemens, BMW, and L'Oréal. Their platform connects to clients' most sensitive systems — ERP, CRM, and supply chain databases — to analyze business processes. This makes Celonis a high-value target: attackers who compromise Celonis gain indirect access to some of the world's largest companies. Celonis operates globally with offices in Munich, New York, London, Prague, and Tokyo. Their workforce accesses client data, proprietary AI models, and production systems across multiple clouds. German data protection laws (GDPR, BDSG) and enterprise client contracts require strict access controls, audit trails, and data residency. Legacy VPN simply cannot provide the granular access control, device posture verification, and comprehensive logging that Celonis's regulatory and contractual environment demands.
Source: Celonis valued at $13B+ with Fortune 500 clients (Siemens, BMW, L'Oréal). German HQ subjects them to strict GDPR/BDSG requirements. Process mining platforms access sensitive ERP/CRM data, making them high-value targets. Enterprise clients require SOC2, ISO27001, and Zero Trust in vendor assessments.
Subject line: "Fortune 500 access security — Celonis Zero Trust question"
Draft email:
Hi [Name],
Celonis has built an incredible process mining platform — and your client list reads like a who's who of global enterprise.
I'm curious about your workforce access architecture. When you serve Fortune 500 clients, your own security posture becomes part of their vendor assessment. Siemens, BMW, and L'Oréal all require Zero Trust architecture, device posture checks, and comprehensive access logging from their critical vendors.
Legacy VPN creates blind spots — it grants network access without verifying device health or enforcing least-privilege permissions. Cloudflare Zero Trust provides the identity-aware access, audit trails, and compliance reporting that Fortune 500 procurement teams expect.
Would you be open to a conversation about how Celonis approaches workforce access security for enterprise clients?
Best,
[Your name]
Target Persona: Founder / CTO (Ivo Lukáčovič)
Why this angle works: Windy.com is a weather visualization platform with 50M+ users founded by Ivo Lukáčovič, who also founded Seznam.cz. Despite its massive user base, Windy operates with a relatively small, distributed team. The platform delivers weather data globally — including GRIB files, model outputs, and map tiles — from infrastructure spread across multiple providers. The engineering team needs secure access to production servers, weather data pipelines, and global CDN configurations. As a high-profile platform (used by sailors, pilots, and emergency services), Windy is a potential target for attacks that could disrupt critical weather information. Legacy VPN is both a security risk and an operational bottleneck for a small team managing global infrastructure. Ivo is a technical founder who actively discusses infrastructure and has built two of CZ's most important internet properties — he appreciates practical, high-performance solutions.
Source: Windy.com reports 50M+ users. Founded by Ivo Lukáčovič (Seznam.cz founder). Small distributed team manages global weather delivery infrastructure. Used by emergency services, aviation, and maritime users — making reliability and security critical. Ivo is active on social media discussing infrastructure.
Subject line: "Small team, global infrastructure — Windy access security question"
Draft email:
Hi Ivo,
Windy is an incredible product — I've seen it recommended by pilots and sailors worldwide as their go-to weather tool.
I'm thinking about your infrastructure challenge. You built a platform serving 50M users with a lean, distributed team. That team needs secure access to global weather servers, data pipelines, and CDN configs — but legacy VPN adds operational overhead that small teams can't afford.
Zero Trust replaces VPN with browser-based, identity-aware access. No client software, no VPN concentrators to maintain, just secure access from any device. Companies with similar lean teams (e.g., Vercel, Figma) have moved to Zero Trust to reduce security overhead while improving access control.
Worth a brief conversation about how Windy handles remote access?
Best,
[Your name]
Target Persona: CTO / CISO
Why this angle works: Smartsupp is a live chat and chatbot platform serving 60,000+ e-commerce businesses across Europe. Their agents handle real-time conversations containing sensitive customer data — names, emails, order details, and sometimes payment information. The platform integrates directly into e-commerce checkout flows, making it a high-value target for attackers seeking customer data. Smartsupp's support and sales teams are distributed and need access to customer dashboards, conversation histories, and admin tools. GDPR requirements mandate strict access controls for personal data — including logging who accessed what and when. Legacy VPN doesn't provide the granular, auditable access that GDPR compliance requires. A data breach or compliance violation could damage Smartsupp's reputation among e-commerce clients who trust them with customer conversations.
Source: Smartsupp serves 60,000+ e-commerce businesses with live chat and chatbot solutions. Their platform handles customer PII and integrates with checkout flows. GDPR requires strict access controls and audit trails for personal data processing. E-commerce clients expect their vendors to maintain high security standards.
Subject line: "Customer data access — Smartsupp GDPR compliance question"
Draft email:
Hi [Name],
Smartsupp powers live chat for 60,000+ e-commerce stores — that's a huge responsibility for protecting customer data.
I'm curious about your approach to GDPR compliance for workforce access. Your support and sales teams access conversation histories containing customer PII daily. GDPR Article 32 requires organizations to implement access controls that ensure only authorized personnel can process personal data — with full audit trails.
Legacy VPN grants broad network access without granular logging. Zero Trust provides identity-aware access with comprehensive audit trails: you know exactly who accessed which customer's data, from what device, and when. This isn't just security — it's compliance documentation that survives regulatory audits.
Would you be open to a brief conversation about how Smartsupp approaches workforce access compliance?
Best,
[Your name]
Target Persona: CTO / CISO
Why this angle works: BudgetBakers develops Wallet — a personal finance and budgeting app with 5M+ downloads that connects to 15,000+ banks worldwide via open banking APIs. Their platform handles extremely sensitive financial data: transaction histories, account balances, spending patterns, and bank credentials. They operate under PSD2 (Payment Services Directive 2) regulations in Europe, which mandates strong customer authentication, secure communication, and strict access controls. BudgetBakers has a distributed development team working on bank integrations, mobile apps, and financial algorithms. Remote developers with access to financial data pipelines and production systems present a significant compliance risk if access isn't tightly controlled. Financial regulators and banking partners expect fintech vendors to demonstrate enterprise-grade access security — legacy VPN doesn't meet modern financial services standards.
Source: BudgetBakers' Wallet app has 5M+ downloads and connects to 15,000+ banks. Subject to PSD2 regulations in EU. Open banking providers must comply with strong authentication and access control requirements. Banking partners require SOC2 and strict vendor security assessments.
Subject line: "Fintech access compliance — BudgetBakers security question"
Draft email:
Hi [Name],
Wallet is an impressive fintech product — 5M+ users and 15,000 bank connections is serious scale for a Czech-founded company.
I'm thinking about your compliance challenge. PSD2 and your banking partners require strict access controls for anyone touching financial data pipelines. Your distributed team builds bank integrations, maintains mobile apps, and manages production systems that process sensitive transaction data.
Legacy VPN grants network-level access without the granular controls, device verification, or audit trails that financial regulators expect. Zero Trust provides identity-aware access with full session logging — exactly what PSD2 compliance and bank partner assessments require.
Would you be open to a brief conversation about how BudgetBakers approaches workforce access security in fintech?
Best,
[Your name]
Target Persona: CTO / VP Engineering
Why this angle works: Localazy is a fast-growing software localization platform with a fully distributed team building developer tools used by thousands of companies worldwide. As a developer platform, their team needs access to production APIs, CDN configs, customer databases, and deployment pipelines. Their "over-the-air" updates feature pushes content directly to live mobile apps — a high-risk capability if access isn't tightly controlled. A compromised developer account could potentially push malicious translations to millions of end-user devices. Localazy's customers include mobile app developers who expect their localization vendor to maintain strong security practices. As they scale and attract enterprise clients, demonstrating modern access security becomes a competitive requirement. Legacy VPN is particularly painful for distributed developer teams — it adds latency, requires client software, and doesn't integrate with modern identity providers.
Source: Localazy operates as distributed team building developer platform with over-the-air update capabilities. Their platform pushes content to live mobile apps. Developer platforms increasingly face security scrutiny from enterprise clients. Distributed developer teams are moving away from VPN toward identity-based access.
Subject line: "Distributed dev team + production access — Localazy security question"
Draft email:
Hi [Name],
Localazy has built a powerful localization platform — the over-the-air updates feature is particularly valuable for mobile teams.
I'm thinking about your security model. Your distributed team manages production APIs, CDN configs, and deployment pipelines that push content directly to live apps. As you attract larger enterprise clients, they'll ask about your access security practices during vendor assessments.
Legacy VPN is painful for distributed developer teams — client software, latency, and broad network access. Zero Trust replaces it with browser-based, identity-aware access that integrates with your existing SSO and provides audit trails for every production access.
Would you be open to a brief conversation about how Localazy thinks about developer access security?
Best,
[Your name]
Target Persona: CTO / CISO
Why this angle works: Smartlook records user sessions — essentially video-like captures of user behavior — for 200,000+ websites and mobile apps. This data is extraordinarily sensitive: it captures everything users type, click, and view, including passwords, credit card numbers, and personal messages (though Smartlook attempts to mask sensitive fields). Smartlook's support, sales, and engineering teams access this data to help customers analyze user behavior. With a distributed workforce, controlling who can view which customer's session data is both a privacy imperative and a compliance requirement. GDPR classifies session replay data as personal data if it can identify individuals. Smartlook's enterprise clients (banks, healthcare, e-commerce) require their vendors to demonstrate strict access controls. A breach where unauthorized personnel accessed customer session data would be catastrophic for Smartlook's reputation and potentially violate data processing agreements.
Source: Smartlook serves 200,000+ websites/apps with session replay and analytics. Session replay captures user behavior including potentially sensitive inputs. GDPR classifies behavioral data as personal data. Enterprise clients in regulated industries require strict vendor access controls. Competitor Hotjar has faced scrutiny over data handling practices.
Subject line: "Session data access controls — Smartlook security question"
Draft email:
Hi [Name],
Smartlook's session replay technology provides incredible value — but it also means you're handling extraordinarily sensitive data on behalf of 200,000+ clients.
I'm curious about your workforce access controls. Your support, sales, and engineering teams access customer session data daily. GDPR classifies behavioral data as personal data, and your enterprise clients in banking and healthcare require proof that only authorized personnel can view their users' sessions.
Legacy VPN provides network access but no granular control over who can view which customer's data. Zero Trust provides role-based, auditable access with full session logging — so you can prove to clients and regulators exactly who accessed what data and when.
Would you be open to a brief conversation about how Smartlook approaches session data access security?
Best,
[Your name]
Target Persona: CTO / CEO (Product Strategy)
Why this angle works: GoodAccess sells VPN-as-a-service. The entire remote access market is shifting from VPN to Zero Trust (Gartner predicts 60% of enterprises will replace VPN with Zero Trust by 2025). GoodAccess's customers will eventually ask for Zero Trust capabilities. Instead of viewing this as a threat, GoodAccess could partner with Cloudflare to offer Zero Trust to their customer base — or at minimum, modernize their own internal infrastructure to understand the technology. This is a "future-proofing" conversation, not a competitive attack.
Source: Gartner predicts 60% of enterprises will implement Zero Trust by 2025. VPN market is declining while SASE/Zero Trust grows 25%+ annually. GoodAccess is a Czech VPN provider serving SMB market.
Subject line: "VPN market evolution — strategic question for GoodAccess"
Draft email:
Hi [Name],
GoodAccess has built a solid VPN product for the Czech and Slovak market. I respect what you've built.
I'm reaching out because the remote access market is shifting rapidly. Gartner predicts 60% of enterprises will replace VPN with Zero Trust by 2025. Your SMB customers may not ask today, but they will within 18-24 months.
Rather than compete, I'd love to explore whether there's a partnership opportunity — or at minimum, share what we're seeing in the market so GoodAccess can prepare its product roadmap. Would you be open to a brief conversation about where remote access is headed?
Best,
[Your name]
Target Persona: CTO / Co-founder
Why this angle works: Mapotic is a community-driven mapping platform serving tourism boards, NGOs, event organizers, and local communities. Their platform handles user-generated content including photos, GPS tracks, and community data. As a geospatial platform, they work with organizations that may handle sensitive location data — refugee camps, protected natural areas, or politically sensitive regions. Their distributed development team needs access to production map data, user content moderation tools, and customer dashboards. For NGOs and public sector clients, data security and access control are paramount. A breach exposing community map data or user contributions could endanger vulnerable populations or damage partner relationships. Mapotic's community-driven model means data ownership is shared — making access auditing and granular permissions even more important. Legacy VPN is ill-suited for a small, distributed team managing sensitive geospatial data for diverse international clients.
Source: Mapotic serves NGOs, tourism boards, and event organizers with community mapping. User-generated content may include sensitive location data. NGO and public sector clients require strict data protection. Distributed small team manages production systems and customer data.
Subject line: "Community data access — Mapotic security question"
Draft email:
Hi [Name],
Mapotic's work with NGOs, tourism boards, and local communities is inspiring — giving organizations the tools to tell their geographic stories.
I'm thinking about your data security challenge. Your partners include organizations handling sensitive locations and vulnerable populations. Your distributed team accesses production map data, user contributions, and customer dashboards.
NGO and public sector partners increasingly ask vendors about access controls and audit trails. Zero Trust provides identity-aware access with full logging — so you can demonstrate exactly who accessed what community data and when. It replaces VPN complexity with browser-based security that small teams can manage.
Would you be open to a brief conversation about how Mapotic thinks about community data access security?
Best,
[Your name]
Target Persona: CTO / VP Engineering
Why this angle works: Satismeter provides in-app NPS and customer satisfaction surveys for SaaS companies. Their platform collects feedback data, user metadata, and behavioral analytics — then serves dashboards and exports to customers. As a small, distributed team, Satismeter faces the classic startup security challenge: limited resources but growing enterprise expectations. Their customers include SaaS companies that are themselves subject to SOC2, GDPR, and vendor security assessments. These customers increasingly ask their vendors: "Who has access to our customer feedback data?" and "How do you control remote employee access?" For a lean team, building enterprise-grade access controls from scratch is impractical. Zero Trust provides an out-of-the-box solution that gives Satismeter the audit trails, access controls, and compliance documentation they need to pass enterprise vendor assessments without hiring a dedicated security team.
Source: Satismeter serves SaaS companies with NPS and satisfaction surveys. Their customer base includes companies undergoing SOC2 and GDPR compliance. Enterprise SaaS buyers increasingly require vendor security assessments. Small distributed teams struggle to implement enterprise-grade access controls internally.
Subject line: "Enterprise vendor assessments — Satismeter access security"
Draft email:
Hi [Name],
Satismeter's in-app survey platform is elegant — and I imagine you're seeing more enterprise customers as you grow.
Here's the challenge: those enterprise customers are asked by their auditors and clients about vendor security practices. Questions like "Who has access to our feedback data?" and "How do you control remote employee access?" come up in every vendor assessment.
As a lean distributed team, building enterprise-grade access controls from scratch is a huge distraction. Zero Trust gives you the audit trails, granular access controls, and compliance documentation you need to pass vendor assessments — without hiring a dedicated security team.
Worth a 15-minute conversation about how Satismeter handles enterprise security requirements?
Best,
[Your name]
Target Persona: CTO / ML Platform Lead
Why this angle works: Ximilar provides visual AI APIs for fashion tagging, image search, and visual similarity to e-commerce companies. Their platform processes millions of product images through GPU-powered ML models, generating embeddings, tags, and similarity scores. Their distributed ML engineering team trains models on proprietary datasets, manages GPU infrastructure, and accesses customer image data for model improvements. Ximilar's enterprise clients (fashion retailers, marketplaces) require their AI vendors to maintain strict data security — customer product images and proprietary tagging data are commercially sensitive. Additionally, Ximilar's ML models themselves are intellectual property that needs protection. A compromised developer account could expose customer data, proprietary models, or training datasets. For a visual AI company, the combination of customer data, GPU infrastructure, and IP makes access security critical. Legacy VPN is particularly unsuitable for ML teams who need to access Jupyter notebooks, experiment tracking, and GPU clusters from various locations and devices.
Source: Ximilar provides visual AI APIs for fashion and e-commerce. Their platform processes millions of product images via GPU infrastructure. Enterprise e-commerce clients require strict data protection for product images and tagging data. ML teams need access to GPU clusters, notebooks, and experiment tracking from distributed locations.
Subject line: "ML team access security — Ximilar infrastructure question"
Draft email:
Hi [Name],
Ximilar's visual AI platform is impressive — fashion tagging and visual search at scale requires serious ML infrastructure.
I'm thinking about your access security challenge. Your distributed ML team manages GPU clusters, training pipelines, and customer image data. Your enterprise clients in fashion e-commerce require strict data protection. And your ML models themselves are valuable IP that needs safeguarding.
Legacy VPN is painful for ML teams — it doesn't integrate well with Jupyter environments, experiment tracking, or cloud GPU providers. Zero Trust provides browser-based access to specific resources (notebooks, clusters, data stores) with device verification and full audit trails.
Would you be open to a brief conversation about how Ximilar approaches ML infrastructure access security?
Best,
[Your name]
Hook: VPN performance pain + remote work permanence. "Your competitors replaced VPN and saw 40% faster remote access."
Proof Points: 60% faster access, consolidate 3+ tools into 1, SOC2/GDPR compliant.