Please use this identifier to cite or link to this item: http://hdl.handle.net/11718/17363
Title: Enter all infosec solutions: growing an ethical hacking business
Authors: Verma, Varsha
Pathak, Atul Arun
Bathini, Dharma Raju
Pereira, Arun
Keywords: Ethical hacking;Growth strategies;Information security;India
Issue Date: 2014
Publisher: Ivey Publishing
Citation: Verma, Varsha; Pathak, Atul Arun; Bathini, Dharma Raju and Pereira, Arun. Case Study: EnterAll InfoSec Solutions: Growing an Ethical Hacking Business. Business Cases Ivey Publishing.
Abstract: An ethical hacker had recently started his entrepreneurial venture, EnterAll InfoSec Solutions. A technologist who believed that “ethical hacking” had huge market potential, he and his partner were searching for a business model that would address the information security needs of corporate clients, public sector undertakings (PSUs) and government institutions. Ethical hacking was a specialized and relatively nascent field, and the entrepreneur foresaw many challenges in convincing customers to use the services of his start-up company. The immediate concerns were how to expand the business, identify an optimal business model, explore sources of funding and create a strong team. Learning Objective: The case is intended for use in undergraduate, master of business administration and postgraduate courses to facilitate discussions on entrepreneurship, strategic management, start-up firms’ growth strategies, information technology, data protection and ethical hacking. The learning objectives are as follows:To understand the strategic issues that emerge when an entrepreneur starts a business. Participants are expected to apply SWOT analysis and the strategy diamond model.To gain an overview of the Indian information security industry, the value proposition offered to clients by organizations in the information security industry and the challenges faced by new entrants in this industry.
URI: http://hdl.handle.net/11718/17363
Appears in Collections:Journal Articles

Files in This Item:
There are no files associated with this item.


Items in IIMA Institutional Repository are protected by copyright, with all rights reserved, unless otherwise indicated.