Dissertation
Transcript: ExistingPatents Cost of Development Cost of Selling Cost-benefit analysis Budgetary planning Reactions in Market Market & Environment Existing Players $ 16.5 Million Globally In Size 44% of them are acquired By Major Players Like Juniper, Cisco, Symantec, Mc Afee, Trend Micro, IBM & CA Share for top 5 vendors Dropped from 60% since 2006 The information security market is in a continuous state of consolidation Fast Movers : Kaspersky labs, AVG, Checkpoint Market Growth factor : Quality of Product, Better Detection Rates, Better Support Enter market or Not Technological Product Overview Existing supply chain for available Product Convincing skills for new products selling Who are these ?? Software Sellers?? Network and infrastructure provider small & medium business Threat Networks Compititor Entry Model Nikhil Firke 10030241180 Their Simialr products Problem Mapping New Entrtants Bargaining Power of customers Strategies Targets Customers Businessing Web Application Security Framework Competitive Advantage Porter's Model Mapping Similar Products from Cisco, Kaspersky, Checkpoint Stregth : Software + hardware, faster analysis, still unique in nature Weakness : Maturity and knowledge base with respect to competitors, Opportunities : Scope for product in market Exapnasion with a efficient and effective hardware Cloud Computing : Expected to reach $241b By 2020; Currently $41b Mobile Connectivity & Mobile Broadband : $4.1b by 2015 Technological Trends in new Softwares and Products Market Penetration & Product Management Live Analytics Operational Market Channels Honeypot System Entry Barriers Bargaining Power of supplier Alternatives R & D Budgets Competitive Rivalry In Industry Price Wars Alternatives & options Web Request Analyzer Finantial Selection of Entry & Revenue Based model Security as a business Growth and global slowdowns of economies Increased Support from Govt initiatives New legal amendments in laws Economies of scale Problems that can appear Proposed Solution Giving Support to customer Managing resources for development, updations, support, expansions Capability to serve the customers with respect to locations Logistical handling for distributions Managing regular updates to customers and product Technological Trends Sunk Costs Customers : B2B Product Cost Limitations International trade Restrictions Legal options Alternatives & Options Out of Business Collabrations Rollling out Operations & Supporting Level Work Security software Market growth Project to $4 billion by 2015 Increasing Security Demand from cyber threats & changing technologies Increased level of organized threats for Enterprises The ever-consolidating security Market Never consolidated Increased level of fragmentation in Industry Legal Political & Economical Simultaneous Quality Management (cc) image by nuonsolarteam on Flickr Involvement of technical risks Technical support for implementation & deployment Product's technical testing with flaws removal before launch Substitute Products Spark Solutions Available Strategic & Management New players with similar products Existing Majors with ongoing innvations Their channel strategies and their effectiveness Product cost as a competitor New Threat Complete Testing Various Perspectives Two stage Analyser Entering Market Problem Limit pricing Development : Virtul Teams, cross geographic operations Operations : Channel partners, Vendors, etc Phase 1: Local Level Sites and servers [B2B] Phase 2 : National Level Scaling Phase 3 : Sequential Rollout for operations and management Compitition Law Monopoly & Dominance M&A Public Sector regulations IPR Increasing market Reach Clear goals specification Processes for Daily operations Long term goals Firm's strategic alignment Product Management strategies Adaptive Neural Network Factors That Favours