13
How Should Market Challengers Attack Market Leaders?

Presentation3

Embed Size (px)

Citation preview

Page 1: Presentation3

How Should Market Challengers Attack Market Leaders?

Page 2: Presentation3

ATTACK THE MARKET LEADER

ATTACK THE FIRMS OF IT’S OWN SIZE

ATTACK SMALL LOCAL AND REGIONABLE FIRMS

Page 3: Presentation3

Attack The Market LeaderHigh risk but potentially high-payoff strategy

Canon Grabbed Large Chunk Of Xerox Market By Introducing Desk Copiers

Page 4: Presentation3

Attack The Under Financed Companies Or Local And Small Regional FirmsThese firms have aging products, are charging excessive prices, or are not satisfying customers in other ways

Many Market Challengers have become Market Leaders by Acquisition and Mergers only.

Page 5: Presentation3

Choosing A General Attack Strategy

Page 6: Presentation3
Page 7: Presentation3

FRONTAL ATTACKMatching Opponent’s Product , Advertising , Pricing , And Distribution .Modified Frontal Attack Slightly Modifies Strategies From Opponent .

Page 8: Presentation3

FLANK ATTACK

To Serve The Uncovered Market NeedsTo Attack At Underperformed Areas Of OpponentTo Fill The Gaps Developed Due To Shifting Market Trends

Ariat’s Boots launched new comfortable shoes to sweep out pre-existing companies

Page 9: Presentation3

Launching Grand Offensive Attack On Several Fronts

Sun Microsystems’s Attack On Microsoft

Makes Sense When Challenger Commands Superior Resources

Page 10: Presentation3

Diversifying into unrelated products.Bypass Attack

Diversifying into new geographical markets.Leapfrogging into new technologies.

Page 11: Presentation3

1997-PEPSI 1998-COCACOLA Pepsi’s Bypass Attack On Coca-Cola In Late 1990’s

Pepsi Purchased Tropicana In 1998 Competing Coca-cola’s Minute Maid

Page 12: Presentation3

Google used technological leapfrogging to overtake Yahoo! and become the market leader in search.

Challenger patiently researches and develops the next technology, shifting the battleground to its own territory.

Page 13: Presentation3

Guerrilla attacks consist of small and intermittent attacks.

Include price cuts, promotional blitz, and occasional legal action to harass opponent . Can Be Expensive And Must Be Backed By Stronger Attacks.