Client Profiler - Sales Intel for Cyber
Pricing
Pay per event
Client Profiler - Sales Intel for Cyber
AI Sales Intelligence for Cybersecurity teams. Combines threat profiling, financial analysis, and LinkedIn contacts in one comprehensive report.
Pricing
Pay per event
Rating
0.0
(0)
Developer

Peach Studio
Actor stats
0
Bookmarked
1
Total users
0
Monthly active users
3 days ago
Last modified
Categories
Share
Client Profiler
AI-powered sales intelligence for cybersecurity teams. Turn prospects into clients with comprehensive reports combining threat intelligence, financial analysis, and decision-maker contacts.
By PEACH STUDIO
Intelligence-Driven Sales
Client Profiler implements an intelligence-driven sales approach - understanding not just who your prospect is, but what pain they're experiencing, why they need to act now, and who makes the buying decision.
Instead of cold outreach, you get:
- The Pain - Threat actors, incidents, and attack surface showing real security risk
- The Opportunity - Financial capacity and investment readiness to buy
- The Deadline - Regulatory compliance pressure creating urgency
- The Approach - Decision-maker contacts with personalized engagement strategies
What You Get
Every report includes 6 strategic parts:
Part I: The Opportunity
- Financial capacity analysis (revenue, IT budget, investment readiness 0-100)
- Market position and funding history
- AI-powered budget availability assessment
Part II: The Pain
- Threat actors targeting their sector (MITRE ATT&CK mapped)
- Historical security incidents and campaigns
- Attack surface analysis (subdomains, exposed services, cloud infrastructure)
- AI-powered threat severity scoring (0-100)
Part III: The Deadline
- Regulatory pressure (CRA, NIS2, DORA, GDPR, CMMC, HIPAA, PCI-DSS)
- Compliance deadlines with urgency levels (IMMEDIATE/HIGH/MEDIUM/LOW)
- Cost of non-compliance and timeline pressure
Part IV: The Approach
- Decision-maker contacts (CISO, CIO, CEO, VP Security, Founders)
- Persona categorization and service mapping
- Up to 30 LinkedIn profiles with outreach URLs
Part V: The Campaign
- AI-generated engagement strategies (multi-touch campaigns)
- Competitive positioning and objection handling
- Personalized messaging for each decision-maker persona
Part VI: Action Plan
- Immediate actions (0-7 days)
- Short-term actions (7-30 days)
- Medium-term actions (30-90 days)
- Revenue targets and strategic milestones
Professional Deliverables:
- Comprehensive markdown report (8,000+ characters)
- Professionally branded PDF export
- Structured JSON for CRM integration
- Public PDF URL for sharing
How It Works
Client Profiler automatically generates comprehensive reports in two stages:
Stage 1: Threat Intelligence (included in all tiers)
- Identifies threat actors targeting your prospect's industry
- Maps attack techniques to MITRE ATT&CK framework
- Analyzes attack surface (subdomains, exposed services)
- Reviews historical security incidents
Stage 2: Sales Enrichment (runs automatically)
- Financial intelligence (revenue, employees, IT budget estimation)
- Contact discovery (LinkedIn decision-makers - optional)
- Regulatory compliance pressure (CRA, NIS2, DORA, GDPR, etc.)
- AI-powered engagement strategies
- Service opportunity mapping
- Competitive positioning
Final Output:
- 6-part strategic targeting report (8,000+ characters)
- Professional branded PDF
- Structured JSON for CRM integration
- Public sharing URL
Execution Time: ~5 minutes total | Fully Automated - No manual steps required
Use Cases
1. Cybersecurity MSSPs
For: Sales teams, account executives, BDRs
"We use Client Profiler to qualify enterprise prospects before our first call. The threat intelligence shows their pain, the regulatory analysis creates urgency, and the contact intelligence gives us direct access to decision-makers. Our close rate increased 40%."
{"companyName": "Acme Manufacturing","country": "US","sector": "Manufacturing","qualityTier": "premium","enableContactIntelligence": true}
2. M&A Due Diligence
For: Private equity, corporate development, cyber risk teams
"Client Profiler accelerates our cybersecurity due diligence from weeks to minutes. We get a complete threat + financial picture instantly. The AI analyses help us assess cyber risk as a quantifiable financial liability."
{"companyName": "Acquisition Target Corp","country": "DE","sector": "Financial Services","qualityTier": "premium"}
3. Account-Based Marketing
For: Marketing teams, demand generation, ABM specialists
"Perfect for ABM campaigns. We get personalized engagement strategies for each decision-maker persona, backed by real threat intelligence. The competitive positioning section helps our sales team differentiate effectively."
{"companyName": "Enterprise Target","country": "UK","qualityTier": "standard","enableContactIntelligence": true,"maxContacts": 20}
4. Security Consultants
For: Advisory firms, vCISO services, security assessments
"Client Profiler replaces 20+ hours of manual research per prospect. The 6-part report structure aligns perfectly with our discovery process. Clients love the professional PDF deliverables."
{"companyName": "Consulting Client","website": "client.com","sector": "Healthcare","qualityTier": "premium"}
Pricing
All-In-One Pricing
Includes Threat Profiler ($2) + Sales Intelligence
All prices below include both threat intelligence generation AND sales enrichment. No hidden costs.
| Tier | AI Engine | Threat Cost | Sales Cost | Total | What You Get |
|---|---|---|---|---|---|
| Standard | Gemini 2.5 Flash | $2 | $5 | $7 | Complete 6-part report |
| Premium | Gemini 2.5 Flash | $2 | $30 | $32 | Executive-grade insights |
| BYOK Standard | Your Gemini key | $0.50 | $1 | $1.50 | 79% discount |
| BYOK Premium | Your Gemini key | $0.50 | $5 | $5.50 | 83% discount |
Add-Ons (Optional)
| Add-On | Description | Cost |
|---|---|---|
| Contact Intelligence | LinkedIn scraping for up to 30 decision-makers (CISO, CIO, CEO, VPs) | +$8 |
Example Pricing
| Configuration | Base Cost | Add-Ons | Total |
|---|---|---|---|
| Standard Report | $7 | - | $7 |
| Standard + Contacts | $7 | +$8 | $15 ⭐ |
| Premium Report | $32 | - | $32 |
| Premium + Contacts | $32 | +$8 | $40 |
| BYOK Standard | $1.50 | - | $1.50 |
| BYOK Standard + Contacts | $1.50 | +$8 | $9.50 |
| BYOK Premium | $5.50 | - | $5.50 |
| BYOK Premium + Contacts | $5.50 | +$8 | $13.50 ⭐ |
⭐ = Recommended configurations
Note: Contact intelligence is enabled by default. Uncheck the box if you want to save $8.
Cost vs. Manual Research
| Method | Time | Cost | Output |
|---|---|---|---|
| Manual Research | 20+ hours | $2,000+ | Notes & spreadsheets |
| Client Profiler Premium | 5 minutes | $40 | Professional PDF + JSON + CRM-ready data |
| Savings | 99.6% less time | 98% less cost | Better format |
Quick Start
Minimal Input (Auto-Detection)
{"companyName": "ASML","country": "Netherlands"}
- Sector auto-detected from company research
- Website auto-discovered via Google Search
- Threat Profiler runs automatically
- Cost: $15 (Standard $7 + Contacts $8)
Recommended Input
{"companyName": "ASML","country": "Netherlands","sector": "Manufacturing","website": "asml.com","qualityTier": "standard","enableContactIntelligence": true}
- Explicit sector for better threat actor targeting
- Direct website speeds up attack surface analysis
- Standard tier for cost-effectiveness
- Contacts enabled for decision-maker access
- Cost: $15 (Standard $7 + Contacts $8)
Premium with BYOK (Best Value)
{"companyName": "ASML","country": "Netherlands","sector": "Manufacturing","website": "asml.com","qualityTier": "premium","enableContactIntelligence": true,"googleApiKey": "YOUR_GOOGLE_API_KEY_HERE"}
- Premium insights at 83% discount
- Executive-grade analysis
- All features included
- Cost: $13.50 (BYOK Premium $5.50 + Contacts $8)
Dataset Reuse (Faster Execution)
{"companyName": "ASML","country": "Netherlands","threatProfileDatasetId": "aQZQBhVwVgAPAfL6P","qualityTier": "standard","enableContactIntelligence": true}
- Skips threat profiling (already done)
- Reuses existing Threat Profiler dataset
- Same price, faster results (~2 minutes instead of ~5)
- Perfect for iterative analysis
- Cost: $15 (same as fresh run)
Output
Dataset Output (Structured JSON)
{"companyName": "ASML","country": "Netherlands","website": "asml.com","sector": "Manufacturing","riskLevel": "CRITICAL","revenueCategory": "Enterprise","qualityTier": "premium","report": "# Strategic Targeting Report: ASML\n\n...","reportLength": 8337,"pdfUrl": "https://api.apify.com/v2/key-value-stores/.../report.pdf","pdfAvailable": true,"generatedAt": "2026-02-01T00:00:00.000000Z","threatIntelligence": {"riskLevel": "CRITICAL","dataQuality": "HIGH","threatActorCount": 8,"incidentCount": 5,"recentIncidents": 3,"totalSubdomains": 247,"exposedServices": 18,"criticalExposures": 3,"nationStateActors": 3},"financialIntelligence": {"revenue": "$2.5B","revenueYear": "2023","revenueCategory": "Enterprise","employees": "5,000-10,000","employeeRange": "Large","estimatedITBudget": "$125M","estimatedCyberBudget": "$12.5M","publiclyTraded": true,"fundingHistory": null},"contactIntelligence": {"totalContacts": 12,"decisionMakers": [{"name": "John Smith","headline": "Chief Information Security Officer","location": "Netherlands","profileUrl": "https://linkedin.com/in/...","persona": "Security Leader","priority": "CRITICAL","serviceRecommendations": [...]}],"personas": {"Executive": 3,"Security Leader": 5,"IT Leader": 4}},"regulations": [{"name": "NIS2 Directive","jurisdiction": "EU","deadline": "2024-10-17","urgency": "HIGH","daysUntilDeadline": 259,"description": "Network and Information Security Directive 2","applicability": "Critical infrastructure, manufacturing sector"}],"serviceOpportunities": [{"service": "Threat Intelligence Platform","painPoints": ["Nation-state threat actors", "Supply chain attacks"],"urgency": "HIGH","estimatedDealSize": "$500K-$2M","timeline": "0-90 days","complexity": "High","personas": ["CISO", "Security Director"]}],"aiAnalyses": {"financialCapacity": {"investmentReadinessScore": 85,"budgetAvailability": "High - significant IT/cyber budget","roiPotential": "Strong ROI potential for threat intelligence","fundingRecommendations": "Multi-year phased approach recommended","phasedAllocationStrategy": "..."},"threatSeverity": {"overallThreatScore": 82,"attackLikelihood": "High","potentialImpact": {"financial": "Very High - $100M+ potential losses","operational": "Critical - manufacturing disruption","reputational": "Severe - supply chain trust erosion"},"attackVectorAnalysis": [...],"riskMitigationPriorities": [...],"threatTrendAnalysis": "..."},"competitivePositioning": {"marketContext": "Manufacturing sector under increased threat","differentiationStrategy": {"tagline": "Threat-informed defense for critical infrastructure","keyDifferentiators": [...]},"valuePropositions": {...},"objectionHandling": {...},"positioningStatements": {"forCISO": "...","forCEO": "...","forBoard": "..."},"marketTimingArguments": [...]}},"threatData": {"risk_level": "CRITICAL","threat_actors": [...],"incidents": [...],"attack_surface": {...}}}
6-Part Strategic Report
The markdown report includes:
- Implementation Status - Development progress tracker
- Part I: The Opportunity - Financial capacity, market position, investment readiness
- Part II: The Pain - Threat actors (MITRE ATT&CK), incidents, attack surface
- Part III: The Deadline - Regulatory pressure, compliance deadlines, urgency levels
- Part IV: The Approach - Decision-maker contacts, personas, service mapping
- Part V: The Campaign - AI engagement strategies, competitive positioning
- Part VI: Action Plan - Immediate/short/medium actions, revenue targets, milestones
- Appendices - Data sources, compliance deadlines, infrastructure summary, MITRE coverage
Professional PDF
- A4 format with professional branding
- Color-coded risk levels and sections
- Clean typography and layout
- Page numbering and navigation
- Ready for client presentations
- Public URL for easy sharing
Intelligence Sources
Threat Intelligence:
- MITRE ATT&CK framework for threat actors and techniques
- Public security incident databases
- Attack surface analysis (subdomains, exposed services)
- Cloud infrastructure detection (AWS, Azure, GCP)
Financial Intelligence:
- Public company data (revenue, employees, funding)
- AI-powered budget estimation
- Investment readiness scoring
Contact Intelligence (Optional Add-On):
- LinkedIn decision-maker discovery
- No authentication required
- Automatic persona categorization (CISO, CIO, CEO, VPs)
Regulatory Intelligence:
- EU regulations (CRA, NIS2, DORA, GDPR)
- US regulations (CMMC, HIPAA, PCI-DSS)
- Automatic deadline tracking and urgency scoring
AI Analysis: Google Gemini 2.5 Flash for financial capacity, threat severity, and competitive positioning
Requirements
Minimal:
- Company name
- Country
Recommended:
- Company name
- Country
- Sector (improves threat actor targeting)
- Website (enables attack surface analysis)
Optional:
- Quality tier (standard/premium)
- Contact intelligence toggle
- Google API key (BYOK pricing - save 79-83%)
- Threat Profile dataset ID (faster execution)
- Max contacts limit (3-20)
Troubleshooting
Q: Why does it cost $7 minimum instead of $5? A: Client Profiler always calls Threat Profiler first ($2). The all-in-one pricing ($7) includes both threat profiling ($2) and sales intelligence ($5).
Q: Can I skip threat profiling to save money?
A: No. Threat intelligence is required for Parts II and V of the report. However, you can reuse an existing Threat Profiler dataset with threatProfileDatasetId for faster execution (same price).
Q: Contact intelligence costs $8 - is it worth it? A: If you need decision-maker access (CISOs, CIOs, VPs), absolutely. Without it, you get no contact information in Part IV. It's enabled by default - uncheck to save $8.
Q: What's the difference between Standard and Premium? A: Same AI model (Gemini 2.5 Flash), but Premium uses enhanced prompts for deeper insights, better competitive positioning, and executive-grade analysis. Premium is 4.6x more expensive ($32 vs $7).
Q: Should I use BYOK pricing? A: If you have a Google AI API key and plan to run multiple reports, yes. BYOK saves 79-83% on costs ($1.50-$5.50 instead of $7-$32).
Q: How long does it take to run? A: ~5 minutes total. Threat Profiler takes ~3 minutes, sales enrichment takes ~2 minutes. With dataset reuse, ~2 minutes total.
Q: Can I integrate this with my CRM? A: Yes! The output is structured JSON with all data fields. Use the Apify API to fetch results and push to Salesforce, HubSpot, etc.
Q: What if the company has no public data? A: The Actor handles missing data gracefully. Financial intelligence may be limited, but threat profiling and regulatory analysis still work. You'll get a report, but some sections may be shorter.
Why Choose Client Profiler
✅ Complete Intelligence Solution:
- Threat intelligence with MITRE ATT&CK mapping
- Financial analysis and investment readiness scoring
- Decision-maker contact discovery (LinkedIn)
- Regulatory compliance pressure analysis
- AI-generated engagement strategies
- Professional PDF reports with branding
✅ Cost-Effective:
- 98% cheaper than manual research ($40 vs $2,000+)
- 79-83% discount with BYOK (Bring Your Own Key)
✅ Production-Ready:
- Comprehensive 8,000+ character reports
- Professional PDF export for client sharing
- Structured JSON for CRM integration
- Fast execution (~5 minutes)
Built by PEACH STUDIO for the Apify $1M Challenge
Transform prospects into clients with intelligence-driven sales.