Safesurf's Business Analysis

Improved Essays
SafeSurf has a diverse mix of distribution channels that currently sell the company’s internet security products. As a result, the company will continue to place approximately 65% of products in our largest retailers Walmart, which has over 5,000 stores in the United States (Walmart, 2016), and Best Buy which has over 1000 (Statista, 2016). The remaining 35% being equally distributed between, Kmart, Target, and HHGregg. The company website has always been a strong source of advertisement and sales and the company projects it will continue to be a major influence, especially with the added features that can be downloaded from the site. By the end of 2017, SafeSurf will be offered as an ala carte for Xfinity cable subscribers for a year. Customers …show more content…
• Internet sales: Initial purchases made online will receive ala carte computer clean up services at no additional cost. Promotion will begin in November through January over the next three years.
Besides sales promotions, SafeSurf intends to enhance advertising of their products by heightening brand awareness on social media channels. The company will therefore form a social media team that will be devoted to responding to consumer concerns, and uploading information regarding cybercrime. Videos and tutorials will also be developed that the media team will upload to YouTube in an attempt to provide consumers with the tools needed surf safely.
Process
SafeSurf’s internet security programs follow the same process in design and distribution and are all used for the same purpose, which is to prevent cyberattacks, identify theft, and the installation of harmful viruses or spyware on consumer’s personal computers or devices. Each of the products utilize the same programming, customer service and support functions. That being said, consumers that purchase more advanced packages that not only provide protection but also maintenance and networking firewalls, can be customized based on the customer’s needs. In addition, the number of packages provided to each retail store has been customized based on accessibility
…show more content…
To continue with that pattern, SafeSurf has participated in job expos at major college and universities that have at least 60% of the student body set to graduate with a major in computer engineering, information technology, software analytics, and other programming related fields. In addition, SafeSurf accepts over 50 college interns a year. Once onboard, SafeSurf hosts a four-week training to go over all the products tools and features that are included in our internet security packages. In addition, customer focus and service training is conducted to ensure technicians are humanistic and not robotic. As new technologies emerge, and new forms of cyberattacks occur, technicians are sent to additional

Related Documents

  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    ABC Company has a few diverse equipment and software needs to meet the prerequisites of their network. We've investigated the different pieces of equipment and software to suit the needs of the company. We've looked into what every building will require with respect to what benefit every site gives and decided their needs based on those results. Servers…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network.…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Hacker Access: The team focused on patch management, firewall strictness, DNS redundancy, IDPS, authentication, and role-based access control to reduce network access…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Looking over everyone’s names and once again looks like old home week. Think I have had prior courses with almost everyone here. This is my eighth Cybersecurity master course and will complete my degree next year. I am currently working at Tinker AFB in Oklahoma for the DISA “Defense Information Systems Agency” as a Solaris system administrator. I have been doing this type of work for almost twenty years, even before retiring from twenty years active duty in the US Navy as a CTM1 “Cryptologic Technician Maintenance” first class petty officer.…

    • 199 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Cyber Surety is one of the jobs I'm interested in pursuing in the Air Force. They are responsible for preventing, detecting, and repelling cyber-attacks. They also ensure the security of computer networks and online communications. All in all, they play defense and defend the military's cyber operations. I'm interested in this job because it's something that I can see myself doing for four years and actually enjoy it.…

    • 585 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    “The vision of Tim Hoffman & Associates, LLC is to protect the world’s data and overall quality of life one customer at a time by providing the best quality service in the areas of cybersecurity, education, and consulting. Moreover, our aspiration is to keep the confidentially, integrity, and availability of our patron’s information as a central focus.”…

    • 57 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    First and foremost, a parent’s number one goal is to be one hundred percent sure that their kids are secure and blissful. Therefore, if spyware ever becomes necessary to fulfill this desire, then it must occur because it is the parent’s duty to be aware of their children’s habits. Coben explains that using spyware is a “scary, but a good idea” (1) as he considers spyware as a system to help parents monitor their kids and be assured of their safety. At first, parents may suppose that using the software is deceiving and that it should never even be considered. But, if they start to ponder on it, then they will understand its importance and effectiveness.…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Scott Driscoll from Internet Safety Concepts presented the information to approximately 35-40 people, mostly parents of North Haven School students one evening in October…

    • 1534 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    At the time, Facebook and Myspace were big amongst the adult communities. With a steady amount of children accessing computers and the internet, parents did not want their kids to associate themselves with the adult group. This sparked Lane Merrifield, a father himself, to create a virtual world where kids could interact with each other in a safe but fun community with no advertising and negative messages. “Kids had too much advertising in their lives and we didn’t want to add to that clutter” –Lane Merrifield (2013) With Lance Priebe developing the game, and Lane Merrifield and Dave Krysko making the business model, in 2005, the trio launched Club Penguin, with 1.4 million users five months after initial launch. Access to basic website…

    • 271 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Patriot Act Benefits

    • 305 Words
    • 2 Pages

    There are many benefits to the Patriot Act. The act has given authorities the tools they need to combat and prevent terrorism. It has also given a lot of protection. A large number of potential terrorist plots have been avoided and terrorist convicted due to the use of the Patriot Act enablement. Lastly, it has given protection of Constitutional Rights.…

    • 305 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    NextEra Energy, Inc. (NYSE: NEE) is a leading clean energy company that is required to be compliant with the NERC CIP cyber security regulations. The Siemens Security Center was purchased for the Port Everglades Energy Center because This product would allow the site improve the cyber security protection for the site and increase the level of automation For the execution of the NERC CIP mandated tasks. We are pleased with the increase in cyber security capability associated With the Siemens Security Center and will continue to work with Siemens to improve the functionality of the Security Center. Base on the results of the work that is currently in progress at Port Everglades we plan to budget for Siemens Security Centers at our other Siemens…

    • 125 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Safe4Search: Threat Summary Safe4Search is a nasty Chrome extension by SafeForSearch.net that is labeled as a potentially unwanted program (PUP) and adware. So you should definitely be very careful if it has been installed on your computer without your knowledge. According to its official website, it has popular viral video from around the internet. But, this extension is generally referred as dubious adware. That is promoted through other free downloads as a tool, where this is especially useful to online shoppers because Safe4Search is to surf the Internet to its users.…

    • 292 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    "Should you invest considerable time browsing the web, you'll need safety towards on the internet risks. Because of Norton Security Standard, you're guarded towards several harmful software program. Regardless of whether you're financial on the internet, contacting buddies or even talking by way of Immediate Messaging, your own safety is definitely upon as well as up-to-date. Crucial functions consist of: Quick as well as Light-weight. Super-fast generate check out period.…

    • 196 Words
    • 1 Pages
    Improved Essays
  • Great Essays

    Toyota – Internal and External environment analysis. Internal business environment. The internal business environment is composed elements within the organization. It includes factors within that have an impact on the approach and success of your companies operations.…

    • 1423 Words
    • 6 Pages
    Great Essays