Summary
The Internet acts as one of the most great inventions of human beings, to a large extent, to a large extent, have changed human production, life and thinking. Since the 1990s, network users have grown geometric levels, and many companies are seeing huge business opportunities to carry out online business, and e-commerce. However, in the open network, the transaction is made, and the information security is gradually become the bottleneck of e-commerce development. For individuals, worry that the information and personal data are not safe, or encounter online "black shop"; for online operators The authenticity of the user must become the premise of Wang Online transactions, otherwise it will be difficult to prevent fraud. In order to truly understand the user's views on e-commerce, the 21CN website has a network security survey, and the important analysis results are as follows:
Question 1: "Are you worried that someone uses your name to use your name?
Answer: "It has happened" 14.59%, "very worried" and "sometimes worried" account for 77.47%.
Question 2: "Are you worried that you have been modified by files or emails you sent or accepted online?"
Answer: "There is" 12.26%, "very worried" and "sometimes worried" account for 80.96%.
Question 3: "Are you worried about your true identity of the files you accept online and email?"
Answer: 14.13% of "It has been used", "very worried" and "sometimes worried" account for 79.34%.
From these questions and corresponding answers, network security issues are increasingly more and more user understanding and is becoming one of the important factors affecting people's network attitudes and network behavior. For companies engaged in online information security, there is an endless business opportunity.
1, the company's composition and management
The company's management organization has the easiest line of linear, composed of several parties of the board, general manager, the market department, the Finance Department, Production Department, and Human Resources. The board is the highest rights institution, the general manager is responsible for the board of directors, and the four departments of the subordinates, in the first year of investment, 1 general manager, 3 production department, the Ministry of Finance, the Ministry of Human Resources, 2 people After the development of the company, 1-2 people increased at the production department each year, and other departments were treated.
The initial management team's composition: Bachelor of two mathematics students, responsible for the core work of the production department; 3 economics master, responsible for financial, market and human resources development.
2, products and services
For enterprises, products and services are the cornerstone of the company. The PKI safety information product of the company is powerful, and the advantage is highlighted. Specifically, the product features include certified structures, certificate libraries, certificates, key backups,
Key recovery, automatic key update, key history management, cross-authentication, client software, authentication, integrity, confidentiality, security timestamp, fair, undeniable support, security time archiving, etc. Applicability of the product is as long as there is basic network support, we will provide you with complete information security services. Let you have no worries.
For a product, the product advantage is the most competitive, the company's product advantages have
■ It is easy to use, well known interface;
■ The service provided by the infrastructure is predicted and effective;
■ Applications do not have to understand how the infrastructure provides services;
At present, the philosophy of "software is the service" is getting deeform in the heart, which is particularly prominent in network security products. Information security services are no longer limited to after-sales service. In this regard, we will provide services from pre-consultation, safety risk assessment, safety projects to safety training, after-sales technical support, product update, product update.
3, market
In order to further understand the latest conditions and problems encountered in my country's e-commerce development, we have organized this market survey to develop and produce corresponding products to meet the needs of the market. This survey takes 48 companies from all walks of life as a sample, and the sample enterprises use a random way. In the selected enterprise, 58.33% of the company's business scope includes 20.83% of the business development to overseas. 12.25% of business management is limited in Hubei Province and Central South. Therefore, this survey basically reflects the situation of my country's enterprises in network construction and e-commerce. The survey results show that the company has a company that is "very worried" or "more worry", only 8.7% of the company not only is self-information security. In addition, according to the information we got, the area of network security software sales in 2000 is: North China, East China and South China, accounting for 79.4% of domestic market share, while China, Northeast, Northwest and Southwest District accounts for 20.6%. . According to this information, we will position the initial target market in China's most worried corporate information security enterprise, with the development of the company, continuously expand the target market, and finally seize the market share of absolute advantages.
4, market strategy
Brand: Brands are an important part of the overall concept of the product. A good brand can improve the product's price, which helps new products are accepted by consumers as soon as possible. Therefore, brand building should serve the company's market development strategy. Brand propaganda must be propagated as a carrier. The overall idea is:
(1) Propaganda network information security knowledge through mass media.
(2) The second phase, publicizes information about network key, information encryption, network identity authentication, and marketing network users.
(3) Promote the technical advantages of the company's PKI safety information products, product advantages and quality services to maximize the real demand for the current majority of network users.
Price: According to our investigation, we will determine competitive market positioning and price positioning. Our investigations believe that the cost of purchasing a comprehensive technology is more than 10,000 yuan, willing to buy information security products in 3,000 yuan, the company accounts for 76.2% of the total number of investigations. In the beginning of entrepreneurship. We set the product price at 11,800 yuan, after new product development or product improvement, we will lower the price of a generation of products, and the second-generation product price remains the original price.
Channel: Channel construction has become an important means of expanding the market in network security. Therefore, we will also establish a perfect channel to ensure that the vast number of online users can purchase our products in time and convenient and safely. In the early days, the target customer group is mainly the company, there are three channels, namely system integrators, chain software stores, and information security centers established around the world. In summary, we will maximize individual demand for different users from different perspectives, different ways, and different channels.
5, financial prediction and analysis
The financial prediction and analysis of the company will carry out several aspects
■ Cash flow analysis: The investment recovery period of the investment can be derived in the third year, and the balance of payments can be reached in the third year.
■ Analysis of the growth rate of profits: It can be obtained by an average of 45.7% in the first five years of profit growth.
■ ROA analysis: It can be obtained in the expected five years, ROA is 8.7%, 23.4%, 26%, 26.7%, 30%, respectively. The comprehensive utilization effect of total assets is better year, and the company has good financial results and grows well.
■ Analysis of equity multiplier: The proportion of rights in total assets is high, up to 90%, so companies still have large financing space, which is conducive to the continued and stable development of the company.
6, the company's development prospects
Through this market survey, we found that PKI technology has not only huge potential market demand, but also has a reality market driving force. The company's products meet the current needs of most companies in network information security. It is expected to provide high-quality after-sales service and favorable market propaganda and advertising effects through continuous development of new products, which can achieve expected market share and corporate profit objectives, and the development prospects are broad. 7, exit mechanism
There are many kinds of investors' exit, such as IPO (first public listing), acquisition, company repurchase, secondary sale, liquidation, cancellation, etc. We will treat investors with sincerity, we will do our utmost to develop companies, and do a good job in contact with foreign counterparts and related companies, and create a good environment for the company's steady development, and lay the foundation for the exiting of venture capital. Through the analysis of the specific circumstances of the Company, we believe that the acquisition and managers buy and break (MBO) can be used as a better exit program.