Académique Documents
Professionnel Documents
Culture Documents
PROFILE
TABLE OF CONTENTS
Chapter 1 Chapter 9
EXECUTIVE SUMMARY COMPETATIVE OVERVIEW
Chapter 2 Chapter 10
ORGANIZATION BRIEF TARGET INDUSTRY
Chapter 3 Chapter 11
RELEVANT EXPERIENCE SWOT ANALYSIS
Chapter 4 Chapter 12
TECHNOLOGY WE USE FINANCIAL ANALYSIS
Chapter 5 Chapter 13
TECHNOLOGY ROADMAP ENVIRONMENT & CONSTRAINTS
Chapter 6 Chapter 14
SECURITY RISK MANAGEMENT
Chapter 7 Chapter 15
PRODUCT OVERVIEW AND FEATURES QUALITY AND TRAINING MANAGEMENT
Chapter 8 Chapter 16
TARGET MARKET OFFICE LOCATION
EXECUTIVE
SUMMARY
OVERVIEW
We have developed Accounting and Financial
Management System a complete ERP based on
Cloud Technology.
ORGANIZATION
BRIEF
OVERVIEW
“EEZBOOK can increase the operational
effectiveness and efficiencies in your business
processes”
Mission: • Cooperation
• Security
RELEVANT
EXPERIENCE
OVERVIEW
“EEZBOOK can increase the operational
effectiveness and efficiencies in your business
processes”
Our close, first-hand knowledge of the corporate sector that Trading Sector
comes from successfully completing assignments for many
of the large and most recognizable clients, enable us to add
significant value to all phases of a project.
TECHNOLOGY WE
USE
OVERVIEW
Technology road mapping is the process of
integration of strategic and technology planning
for competitiveness. Technology planning is
becoming critical with the rapid development and
evolution of technologies. Technology road
mapping provides a tool for selecting which
technologies to pursue in what time frames.
In recent years, technological advances have motivated industries, companies and even governments to look for an improved
alignment between strategic objectives and technology management, preferably through the application of structured and
flexible approaches. The eSoft use state of the art technology to build its product.
JavaScript JavaScript
technologies
PHP 7.1.16 PHP 7.1.16 (Linux / Unix based Open Source - free redistribution, combination with MySQL
database)
Database
Browser
Google Chrome, Mozilla Firefox, Internet Explorer, Opera
compatibility
TECHNOLOGY
ROADMAP
OVERVIEW
A Technology Roadmap is “a plan that matches
short-term and long-term goals with specific
technology solutions to help meet those goals”. It
is important to mention that the goals and
objectives need to be defined properly at the
organizational level, enabling all the business units
be it business or IT to be guided accordingly for
subsequently setting the respective goals and
objectives at Business Unit (BU)-level.
A successful roadmap contains a clear statement of the desired outcome followed by a specific pathway for reaching it. a
specialised type of strategic plan that outlines activities an organisation can undertake over specified time frames to achieve
stated goals and outcomes.
The product–technology roadmap process developed at ESOFT aims at better integration of business and technology strategy
and improvement of the front end of the product creation process (the concept and idea phase). Teamwork, integral
involvement by the organization and good communication are essential characteristics of the process. Benefits include a
shared product–technology strategy and a cross-functional approach to product and technology planning and vision building.
Android App
EPIC
Data up loader
FEATURE
SECURI
SECURITY
OVERVIEW
EEZBOOK build it ERP on bases of 3 layers of
security. Cloud computing is made up of a variety of
layered elements, starting at the most basic physical
layer of storage and server infrastructure and
working up through the application and network
layers.
There are usually three models of cloud service to compare: Software as a Service (SaaS), Platform as a Service (PaaS), and
Infrastructure as a Service (IaaS). Each of these has its own benefits aass well variances and it is necessary to understand the
differences among SaaS, PaaS, and IaaS to know how to best choose one for your organization.
PaaS AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App Engine, Apache
Stratos, OpenShift
IaaS DigitalOcean, Linode, Rackspace, Amazon Web Services (AWS), Cisco Metapod,
Microsoft Azure, Google Compute Engine (GCE)
Security is essential part of today’s Modern cloud base applications. EEZBOOK always provide the highest level of data
security to its valuable clients. The security
ecurity in the cloud is much like security in your on
on-premises
premises data centers - only without
the costs of maintaining facilities and hardware. In the cloud, you don’t have to ma manage
nage physical servers or storage devices.
Instead, you use software-based
based security tools to monitor and protect the flow of information into and of out of your cloud
resources.
As enterprise applications and data continues to move towards software as a ser service
vice (SaaS), the need to evolve security
controls and strategies has become increasingly apparent. New developments are now required to access and store data and
applications. An evolving enterprise IT landscape calls for an evolving security strategy to kkeep
eep pace with it.
One of the benefits of cloud d services is that you can operate at scale and still remain secure. It is similar to how you
currently manage security, but now you have new ways of delivering security solutions that address new areas of
concern. Cloud security does not change the approa
approach
ch on how to manage security from preventing to detective and
corrective actions. but it does however give you the ability to perform these activities in a more agile manner.
Your data is secured within data centers and where some countries require data to be stored in their country,
choosing a provider that has multiple data centers across the world can help to achieve this.
Data storage often includes certain compliance requirements especially when storing credit card numbers or health
information. Many cloud
loud providers offer independent third party audit reports to attest that their internal process
exist and are effective in managing the security within their facilities where you store your data.
• Third-Party
Party Data Centers • In-House
House Data Centers
• Low Upfront Infrastructure • High Upfront Costs
Investments • Slow Scaling
• Quickly scalable • Lower Efficiency
• Efficient Resource • Longer Time To Market
Utilization • Higher Cost
• Reduced Time To Market
• Usage-Based Cost
Security is the core part of EEZBOOK ERP, it is secured with 3 layers of security. This includes the ability to protect
information, systems, and assets while delivering business value through proactive risk assessments and mitigation strategies.
Communication Layer
This includes communication between user computer/device to server. All the traffic between user and server is encrypted. It
is secured by 256-bit SSL certificates. Which is higher than the security required by the banks. This makes sure that traffic
between user and server remain encrypted and uncompromised.
Infrastructure Layer
Infrastructure layer means cloud and all the services in it, it includes Data Centers, Operating Systems, Server software
programs, Database services, Networking etc. We use Amazon AWS as our cloud provider. AWS is the best and market
leader in public cloud services. With AWS, you will benefit from a data center and network architecture built to meet the
requirements of the most security-sensitive organizations. Not only just passwords, we even have the ability to encrypt the
full databases as well.
Application Layer
This layer covers our software. Application layer security includes identity and access management, proactive protection
against known vulnerabilities e.g. SQL Injection, CSRF, XSS etc. and multi factor authentication.
Authentication Mechanism:
i- Least Privilege Principle: By default, no one is allowed to use our software. The admin has to define the credentials
and enable the user so that user can access with assigned privileges.
ii- Role Based Authentication: Each user is allowed with specific role/privileges, access to resources not allowed by
the role are denied. Whenever a page in our software is accessed, the credentials and privileges are checked before taking an
action. If required privileges are not received, action is not allowed.
iii- Multi Factor Authentication: can also be enabled by the admin, so that when a user logs in its registered mobile
phone receives a unique authentication code. On entering the received authentication code login is allowed.
iv- Credential Storage Policy: Passwords are saved with encryption string and salt hash to make it more secure.
Password expire policy can be set so that old passwords are expired.
• Implement a strong identity foundation: Implement the principle of least privilege and enforce separation of duties
with appropriate authorization for each interaction with AWS resources. Centralize privilege management and reduce or even
eliminate reliance on long-term credentials.
• Enable traceability: Monitor, alert, and audit actions and changes to environment in real time. Integrate logs and
metrics with systems to automatically respond and take action.
• Apply security at all layers: Rather than just focusing on protection of a single outer layer, AWS apply a defense-in-
depth approach with other security controls. Apply to all layers (e.g., edge network, VPC, subnet, load balancer, every
instance, operating system, and application).
• Automate security best practices: Automated software-based security mechanisms improve your ability to securely
scale more rapidly and cost effectively. Create secure architectures, including the implementation of controls that are defined
and managed as code in version-controlled templates.
• Protect data in transit and at rest: Classify your data into sensitivity levels and use mechanisms, such as encryption,
tokenization, and access control where appropriate.
• Prepare for security events: Prepare for an incident by having an incident management process that aligns to your
organizational requirements. Run incident response simulations and use tools with automation to increase your speed for
detection, investigation, and recovery.
https://aws.amazon.com/security/
OVERVIEW
ESOFT started to develop its ERP since 2010. First
we launch a Prototype version in 2012. This
prototype version was application based ERP. To
meet future challenges and for the sustainability
of the business and company, we started to design
and develop Cloud Based ERP Solution. In 2016 we
successfully launched an alpha version of the ERP
and finally we launched a completely tested Beta
version.
The Company has adopted a cloud-first strategy and over time will transition the majority of its key applications to the cloud,
and also leverage cloud to accelerate development and innovation.
“We believe that the modern computing era is going to change our lives drastically. The pace of change is unprecedented and
it’s still accelerating”
TARGET MARKET
OVERVIEW
The Company expects cloud computing to play a
huge role in transforming product, services,
strategy and play an important role in improving
the customer experience. It will accelerate
evolution distributing transformative and
innovative power more widely than ever before
and nowhere more so than in financial services
COMPETITIVE OVERVIEW
OVERVIEW
When it comes to our ERP system, we confidently
say that it helps your company. It gives our
company competitive advantages.
When it comes to our ERP system, we confidently say that it helps your company. It gives our company following
competitive advantages.
Distinction
In Pakistan we claim that we are the first and only Cloud Based Accounting, Financial and HRM ERP developers in local
market. We have a large canvas to cover the market. ESOFT is ready and fit to cover all areas related to Accounting,
Financial and HR Management.
TARGET INDUSTRY
OVERVIEW
Our marketing strategy is the approach and
continued efforts the marketing team will take to
achieve its goals. The strategy revolves around
how the team is planning to hit its goals, while
keeping marketing priorities in mind and to
remain aligned to the business objectives
We have a plan to target following sector wise industry to meet our objective. till 2023 we shall contact almost 500
companies to give effect of our core objectives
Power Sector 7 9 10 10 10 46
Trading Sector 5 5 18 18 18 64
Manufacturing 4 4 10 9 10 37
Construction 4 4 10 8 8 34
Town planners 4 4 10 8 8 34
Hospitality 4 4 4 4 4 20
Logistics 2 2 5 3 3 15
Education 8 12 7 7 7 41
SWOT ANALYSIS
OVERVIEW
The following strengths, weaknesses, opportunities, and threats (SWOT) analysis provides a snapshot of our strengths
and weaknesses and external opportunities and threats.
Strengths
Weaknesses
Opportunities
A huge gap in local market to capture by providing our strong, flexible, cost effective and reliable support to our
customers. No other local company is providing such ERP.
Business men have more management control over his business by using our ERP. They can boost their
budgeting and planning approaches, in time.
Changing marketplace that coincides with our product.
Chance to move with professional businessmen.
Growth market.
Technological changes.
Refocus on IT applications.
Threats
FINANCIAL PROJECTIONS
OVERVIEW
In future ESOFT would be a big exporter of its ERP
and will contribute in generation of economic
activity.
ESOFT is striving to achieve its goals vigorously. Following are the detail projections about our sales turnover,
expenses and profit. Till 2023 company is expecting about total sales of Rs.750 million. To achieve this goal,
we need initial findings to run our business.
By the following projections one may observe that in future ESOFT will become major contributor to the
economy, job provider and running its business successfully.
In future ESOFT would be a big exporter of its ERP and will contribute in ge
generation
neration of economic activity.
ENVIRONMENT &
CONSTRAINTS
OVERVIEW
Many companies are moving part or all of their
systems to the cloud in order to gain from the
benefits. This type of system provides, such as cost
savings and flexibility. However, cloud computing
is also a much more environment friendly choice,
when compared to running servers from within
your individual business.
Research suggests that for a large enterprise, making the switch would actually save 30,000 metric tonnes of CO2 within five
years, which is the equivalent to almost 6,000 cars off the road! Take some time to think about how many businesses there
are in Pakistan and across the world. If more businesses switched to a cloud based system, the positive environmental impact
would be astronomical.
How does the cloud make your business more Cloud computing also provides a number of non-IT
eco-friendly? environmental benefits. For example, it can reduce the
amount of travel required by staff, as employees can access
There are a number of ways to switch from your private / documents from anywhere with the cloud, allowing for
in-house servers to the cloud could make your business more flexibility and a potential reduction in travel,
more environment-friendly. Some of the major reasons are: depending on the business.
RISK
MANAGEMENT
The risk management road map is based on our four guiding principles:
Vision —What is the business vision and who will own the initiative?
Visibility —What needs to be done and what are the risks?
Accountability —Who is accountable and to whom?
Sustainability —How will it be monitored and measured?
Deliver role and process-based training Let our experts help you with our training
Certainly, employees in all roles affected by the ERP plan
Our successful ERP training covers not only system-related
implementation will require training to understand the topics, but also revised business processes. It takes into
software fundamentals and the over-arching of consideration each function’s unique business processes
organization. It will be more beneficial to you. But for the and training needs. It guides employees — at all levels of
training to be truly effective, it's essential that users also be the organization — through new functions and processes.
trained on the functions and processes relevant to their Our trainers will help you to build a training plan and
individual roles. This calls for your organization-wide change management strategy for your ERP implementation.
training. We plan training for everyone from top to bottom. We also offer three new ERP Cloud Learning Subscriptions
It means your executive and management teams, IT project that can make your training much more successful.
teams, functional users, and end users will participate in
training sessions
OFFICE LOCATION
HEAD OFFICE
5 th Floor Doctor Plaza, DHA -II Islamabad
+92-51-5162371
info@esoft.us
39 | P a g e EEZBOOK
EEZBOOK
Dec 29, 2018