Skip to main content

Company Analysis Example

This example demonstrates how to perform comprehensive company analysis using Phoenix MCP tools. We'll analyze a company from multiple angles: firmographic, technographic, and intent data.

Scenario

You're an Account Executive researching Salesforce as a potential customer for your enterprise security product. You need to understand:

  1. Basic company information
  2. Their technology stack
  3. Department-level technology usage
  4. Recent buying signals
  5. Security spending patterns

Step 1: Get Basic Company Information

Start with firmographic data to understand the company basics.

MCP Tool Call

{
"tool": "company_firmographic",
"parameters": {
"companyDomain": "salesforce.com"
}
}

Example Response

{
"data": {
"companyName": "Salesforce",
"domain": "salesforce.com",
"industry": "Enterprise Software",
"employeeCount": 73000,
"revenueRange": "$10B - $50B",
"location": {
"city": "San Francisco",
"state": "CA",
"country": "United States"
},
"foundedYear": 1999,
"publiclyTraded": true,
"description": "Cloud-based CRM and enterprise software solutions"
},
"metadata": {
"usedProvider": "hginsights",
"executionTimeMs": 342
}
}

Key Insights

  • ✅ Enterprise size (73K employees)
  • ✅ Significant revenue ($10B+)
  • ✅ Headquartered in San Francisco
  • ✅ Publicly traded (likely has budget)

Step 2: Analyze Technology Stack

Next, check their technology stack to understand what they're using and identify potential fit or replacement opportunities.

MCP Tool Call

{
"tool": "company_technographic",
"parameters": {
"companyDomain": "salesforce.com"
}
}

Example Response

{
"data": {
"technologies": [
{
"category": "Cloud Infrastructure",
"products": [
{ "name": "AWS", "usageLevel": "Heavy" },
{ "name": "Google Cloud", "usageLevel": "Moderate" }
]
},
{
"category": "Security",
"products": [
{ "name": "Okta", "usageLevel": "Heavy" },
{ "name": "Palo Alto Networks", "usageLevel": "Moderate" },
{ "name": "CrowdStrike", "usageLevel": "Moderate" }
]
},
{
"category": "Development Tools",
"products": [
{ "name": "GitHub", "usageLevel": "Heavy" },
{ "name": "Jenkins", "usageLevel": "Moderate" },
{ "name": "Docker", "usageLevel": "Heavy" }
]
}
],
"totalCategories": 24,
"totalProducts": 187
}
}

Key Insights

  • ✅ Heavy AWS user (good for cloud security products)
  • ⚠️ Already using security products (Okta, Palo Alto, CrowdStrike)
  • ✅ Modern development stack (GitHub, Docker)
  • 💡 Opportunity: Multi-cloud security (AWS + GCP)

Step 3: Check Departmental Technology Usage

Use FAI (Functional Area Intelligence) to understand which departments use which technologies.

MCP Tool Call

{
"tool": "company_fai",
"parameters": {
"companyDomain": "salesforce.com"
}
}

Example Response

{
"data": {
"departments": [
{
"name": "Engineering",
"employeeCount": 15000,
"technologies": ["AWS", "GitHub", "Docker", "Jenkins"],
"spendingLevel": "Very High"
},
{
"name": "IT/Security",
"employeeCount": 2500,
"technologies": ["Okta", "Palo Alto Networks", "CrowdStrike"],
"spendingLevel": "High"
},
{
"name": "Sales",
"employeeCount": 22000,
"technologies": ["Salesforce", "Outreach", "LinkedIn Sales Navigator"],
"spendingLevel": "High"
}
]
}
}

Key Insights

  • ✅ Large IT/Security team (2,500 people)
  • ✅ High security spending
  • 💡 Contact: Focus on Security and Engineering teams
  • 💡 Scale: Security product must support 73K users

Step 4: Identify Buying Signals

Check for recent intent signals that indicate buying interest.

MCP Tool Call

{
"tool": "company_intent",
"parameters": {
"companyDomain": "salesforce.com"
}
}

Example Response

{
"data": {
"intentSignals": [
{
"topic": "Cloud Security",
"score": 85,
"trend": "Increasing",
"lastUpdated": "2025-10-15"
},
{
"topic": "Zero Trust Architecture",
"score": 72,
"trend": "Increasing",
"lastUpdated": "2025-10-12"
},
{
"topic": "API Security",
"score": 68,
"trend": "Stable",
"lastUpdated": "2025-10-18"
}
],
"overallIntentScore": 78
}
}

Key Insights

  • 🔥 High intent for Cloud Security (score: 85)
  • 🔥 Growing interest in Zero Trust (trend: Increasing)
  • ⏰ Recent activity (last updated within 1 week)
  • 💡 Timing: NOW is a good time to reach out

Step 5: Analyze Security Spending

Check their spending patterns in security categories.

MCP Tool Call

{
"tool": "company_spend",
"parameters": {
"companyDomain": "salesforce.com",
"spendCategory": "Security"
}
}

Example Response

{
"data": {
"category": "Security",
"totalSpend": "$45M - $60M",
"yearOverYearGrowth": "+23%",
"breakdown": [
{
"subcategory": "Identity & Access Management",
"spend": "$15M - $20M",
"products": ["Okta", "Active Directory"]
},
{
"subcategory": "Network Security",
"spend": "$12M - $15M",
"products": ["Palo Alto Networks", "Cisco"]
},
{
"subcategory": "Endpoint Security",
"spend": "$8M - $12M",
"products": ["CrowdStrike", "Carbon Black"]
}
]
}
}

Key Insights

  • ✅ Significant security budget ($45-60M)
  • ✅ Growing budget (+23% YoY)
  • 💡 Budget authority: Security has funding
  • 💡 Opportunity: Could allocate $2-5M for new security product

Summary & Next Steps

Company Profile: Salesforce

Qualification Status: ✅ Highly Qualified

Key Facts:

  • Enterprise company (73K employees, $10B+ revenue)
  • Heavy cloud infrastructure user (AWS primary)
  • Mature security posture (existing tools in place)
  • Large security team (2,500 people)
  • Strong buying signals (Cloud Security intent: 85)
  • Substantial security budget ($45-60M, growing 23%)

Best Approach:

  1. Target Departments: IT/Security + Engineering
  2. Value Proposition: Multi-cloud security, Zero Trust architecture
  3. Competitive Angle: Complement existing tools, address gaps
  4. Budget: $2-5M deal potential
  5. Timing: Strike now (high intent signals)

Recommended Actions:

  1. Research specific security pain points in multi-cloud environments
  2. Prepare Zero Trust architecture discussion
  3. Identify contacts in Security and Engineering teams
  4. Build ROI case based on $45-60M security spend
  5. Highlight integration with existing stack (Okta, AWS)

Code Example: Complete Workflow

Here's how to execute this entire workflow programmatically:

// 1. Firmographic
const firmographic = await phoenixMCP.callTool('company_firmographic', {
companyDomain: 'salesforce.com'
});

// 2. Technographic
const technographic = await phoenixMCP.callTool('company_technographic', {
companyDomain: 'salesforce.com'
});

// 3. FAI
const fai = await phoenixMCP.callTool('company_fai', {
companyDomain: 'salesforce.com'
});

// 4. Intent
const intent = await phoenixMCP.callTool('company_intent', {
companyDomain: 'salesforce.com'
});

// 5. Spending
const spending = await phoenixMCP.callTool('company_spend', {
companyDomain: 'salesforce.com',
spendCategory: 'Security'
});

// Combine and analyze
const analysis = {
company: firmographic.data,
technologies: technographic.data,
departments: fai.data,
buyingSignals: intent.data,
spending: spending.data,
qualificationScore: calculateScore({
employeeCount: firmographic.data.employeeCount,
intentScore: intent.data.overallIntentScore,
securitySpend: spending.data.totalSpend
})
};

console.log('Company Analysis:', analysis);