Beruflich Dokumente
Kultur Dokumente
Cyberoam
QUEST ASSURANCE SERVICES
This report is a proposal for Cyberoam Pvt. Ltd to expand its operations
to the IT and Security Audit market.
TABLE OF CONTENTS
Serial no.
Topic
Page no.
Introduction
Company Selected
Market Potential
Marketing
Revenue Model
10
Pricing
10
10
Revenue Projections
11
11
Cost Break-down
12
12
13
INTRODUCTION
CYBER SECURITY
Computer security, also known as cybersecurity or IT security, is the protection of
information systems from theft or damage to the hardware, the software, and to the
information on them, as well as from disruption or misdirection of the services they provide.
It includes controlling physical access to the hardware, as well as protecting against harm that
may come via network access, data and code injection, and due to malpractice by operators,
whether intentional, accidental, or due to them being tricked into deviating from secure
procedures.
The field is of growing importance due to the increasing reliance on computer systems and
the Internet in most societies, wireless networks such as Bluetooth and Wi-Fi - and the
growth of "smart" devices, including smartphones, televisions and tiny devices as part of the
Internet of Things.
1|Page
COMPANY SELECTED
CYBEROAM PVT. LTD
Cyberoam a Sophos Company, secures organizations with its wide range of product
offerings at the network gateway. Cyberoam leverages the power of multi-core processors,
offering enterprise-grade performance, in its appliances.
Cyberoams product offerings include:
Cyberoam NetGenie
JUSTIFICATION
2|Page
Research all operating systems, software applications and data center equipment
operating within the data center
Network vulnerabilities
Controls
Behavioral audit
3|Page
MARKET POTENTIAL
In the last few years, India has seen a boom in the IT industry. The online market has grown
significantly with online retailers and service providers gaining significant market share over
a small period of time. But the same has not been supported with an equally well developed
IT safeguard structure. As more and more information is fed and processed online, the
number of people who become directly vulnerable in case a cyber-attack happens has
increased multi-fold, as is evident from the graph shown above.
With the growing vulnerability of consumer data online, the need to establish and review IT
systems adopted by companies working in this sector has also increased. This is where our
role as IT and Security Auditors comes in. With no major players in the market presently
providing such service, the scope of growth is huge, both nation-wide and internationally.
This is where we, as Security and IT audit service providers enter the market. With an already
established clientele for our existing products and services, we can easily provide this as an
add-on service to them. Along with that, we can also get many more clients who would want
to opt for this service due to
SERVICE DESCRIPTION
We plan on providing both one time as well as long term solutions to our clients. Basically,
we will be open to take one-time contracts under which we audit and review the systems only
once and submit our report on the same. But our major focus would be on establishing long
term ties with our clients under which we provide them with continuous review and audit
services.
Through this service, we also plan on marketing the other services that we already provide in
the market. Post every audit that we conduct, we will submit our review along with which we
will tell them the areas which need immediate attention and how we can help provide
solutions to these problems. It will be up to the client whether he wants to use our services or
approach any other service provider for the same.
5|Page
The employees of this division fall under the following job titles:
Software Engineers
Hackers
Coders
Each Project Manager is answerable to the Division Head. The size of each Project Team is
determined by the supervisory committee headed by the CEO (Interim Head) and eventually
the Division Head.
6|Page
RECRUITMENT STRATEGIES
1) Conducting Hackathons
A hackathon (also known as a hack day, hackfest or codefest) is an event in which
computer programmers and others involved in software development, including
graphic designers, interface designers and project managers, collaborate intensively
on software projects. Such events will be organised by the Company and the winners
or key performers of said event will be recruited into the organisation.
2) Employee Referrals
Owing to the existing employee base of the Cyberoam family, employee referrals will
be a beneficial option to recruit. This systems ensures that the employees being
recruited are well aware of the organisation environment.
SELECTION PROCESS
Application
Review
Qualitative
Assessment
Cognitive
Process
Profile
Background
Check
Legal Record
Checks
Job Offered0.01%
7|Page
MARKETING
Cyberoam understands that it operates in a dynamic environment where the products,
markets, customers and needs change rapidly and continuously. Hence our marketing
strategies include both conventional and unconventional techniques of marketing. As our
target audience is very restrictive we could focus on B2B model of marketing
BRANDING
Your brand is the way you define yourself.
As the Cyberoam is expanding and starting a new department branding has to take place from
the scratch. Starting from the name of the company to its promotion everything must have a
proper flow of ideas.
3. Public Image
The public and market plays a major role in shaping the reputation of our brand. Its a
B2B market and we constantly need to be in touch with our customer. This can only be
achieved by aggressive marketing automation.
4. Promotion
In todays world, a smart ad plus a smart use of social media can produce a fresh
identity, even if its to promote an IT audit company. We believe our marketing
strategies can help build the need for the product in the market immediately.
8|Page
5. Social media
There is another world that exists online and we need to make ourselves
visible. The
Company must be very active at all such platforms from blogging to emails. This will
increase the trust that your clients have on you and will also help in attraction of new
customer.
MARKETING STRATEGIES
Marketing automation refers to software platform and technologies designed for marketing
departments to more effectively market on multiple channels such as emails, social media,
websites, etc. and automate repetitive task. Quest, being a IT audit company has a specific
audience which can we targeted only through formal ways of promotion.
Marketing automation is a very economical process. As Quest is a new department this could
help it market its brand in the cheapest possible way.
All out campaigns will we posted via this software, which will automatically send it to our
existing and potential customer
The Unseen Criminal Campaign
New hacking threats have emerged in the past couple of years and with it has increased
worldwide
concern
for
cyber
and medium
scale
9|Page
REVENUE MODEL
The major revenue streams for this division would be the fee charged by us for providing this
service to the clients.
The revenue model will depend on two factors:
REVENUE STREAMS
ONE TIME
RECURRING
Basic review
Basic review
Extensive review
Extensive review
PRICING
Pricing has been based on the revenue streams stated above.
DURATION
ONE-TIME
RECURRING (annual)
Rs. 45,000
Rs. 4,50,000
Rs. 62,000
Rs. 6,00,000
Complete review
Rs. 80,000
Rs. 7,80,000
10 | P a g e
REVENUE PROJECTIONS
Based on the market analysis conducted by us, and based on the demand for such services in
the market, we expect to get following number of clients in the market.
CLIENT PROJECTIONS
DURATION
ONE-TIME
RECURRING (annual)
80
25
65
20
Complete review
50
12
DURATION
ONE-TIME
RECURRING (annual)
Rs. 36,00,000
Rs. 1,12,50,000
Rs. 40,30,000
Rs. 1,20,00,000
Complete review
Rs. 40,00,000
Rs. 93,60,000
REVENUE PROJECTIONS
Rs. 3,26,10,000
11 | P a g e
COST BREAK-DOWN
COST OF RUNNING OPERATIONS
Designation
Number
Salary
Amount
Division Head
1,80,000
1,80,000
Project Managers
1,20,000
3,60,000
Software Engineers
10
80,000
8,00,000
Hackers
40,000
3,20,000
Data Analytics
25,000
1,50,000
Customer Relations
40,000
2,40,000
Coders
50,000
2,00,000
Depreciation
Number of
Cost of one
Cost of
Rate of
Annual
Computers
computer
Computers
depreciation
depreciation
40
40,000
16,00,000
15%
2,40,000
Marketing
The marketing department has been allotted Rs. 12,00,000 for conducting the marketing
campaigns for Quest Assurance Services.
12 | P a g e
PARTICULARS
Revenue from Operations
Year 1
(INR)
Year 2
(INR)
Year 3
(INR)
4,42,40,000
4,86,64,000
5,59,63,600
4,42,40,000
4,86,64,000
5,59,63,600
Cost of Revenue
1,76,96,000
1,94,65,600
2,23,85,440
2,82,00,000
3,10,20,000
3,41,22,000
2,40,000
2,40,000
2,40,000
12,00,000
10,00,000
8,00,000
Other Expenses
80,000
96,000
1,15,200
Total Expenses
4,74,16,000
5,18,21,600
5,76,62,640
-31,76,000
-31,57,600
-16,99,040
-31,76,000
-31,57,600
-16,99,040
EBT
Provision for Tax
EAT
13 | P a g e