Secondary research
To validate our idea and gain insights into its business potential, we conducted secondary research, including competitor analysis and literature review. I played a crucial role in employing the Red Ocean strategy, where we aimed to distinguish our product with a unique selling proposition (USP). Our literature review revealed that voice authentication is poised to be the next significant advancement in security technology. Based on this finding, I spearheaded the decision to incorporate voice authentication into our product, setting it apart from other password managers.