At the company we are evaluating using DocuSign. Could you tell me the pros and cons of using their products based on your experience?

810 views1 Upvote4 Comments

Director in Manufacturing, 1,001 - 5,000 employees
I was involved in the purchase and was surprised at cost. We already had several small contracts we were just consolidating from different divisions. Leadership above felt we didn’t negotiate enough of a discount. Since we had so much we didn’t have any leverage. If you can, negotiate with solid alternatives so if too pricey you can walk away....
3 1 Reply
Director in Manufacturing, 1,001 - 5,000 employees

As a young man I always had my preferred solution before we negotiated price. As a wiser old man I never negotiated price until I had at least one other completely viable alternative solution. Never entered into negotiations when I’m not willing to walk away ....

Chair and Professor, Startup CTO in Education, 5,001 - 10,000 employees
It’s a nice tool.
Senior Director, Defense Programs in Software, 5,001 - 10,000 employees
Pro: I performed the initial security review of DocuSign (eSignature, gen, negotiate) for initial FedRAMP authorization. I was impressed with their security & compliance posture. I also thought the API was well thought out.

Con: There’s some effort for enablement to spur adoption and the best user experiences. It’s worth putting the effort in.

Content you might like

CTO in Software, 201 - 500 employees
Without a doubt - Technical Debt! It's a ball and chain that creates an ever increasing drag on any organization, stifles innovation, and prevents transformation.
Read More Comments
42k views131 Upvotes319 Comments

Ability to scale with demand (e.g. incoming requests)21%

Incoming privacy laws and their impact37%

Cost (including staff resources allocated)14%

End user experience10%

Security risks13%

Human error6%



1.2k views2 Upvotes

Patch management: to reduce attack surface and avoid system misconfigurations40%

Malware and ransomware prevention: to protect endpoints from social engineering attacks59%

Malware and fileless malware detection and response: to protect against malicious software49%

Threat Hunting: to detect unknown threats that are acting or dormant in your environment and have bypassed the security controls33%

Not planning to change endpoint security strategy10%