You are on page 1of 39

Esoft (Private) Ltd

PROFILE
TABLE OF CONTENTS

Chapter 1 Chapter 9
 EXECUTIVE SUMMARY  COMPETATIVE OVERVIEW
Chapter 2 Chapter 10
 ORGANIZATION BRIEF  TARGET INDUSTRY
Chapter 3 Chapter 11
 RELEVANT EXPERIENCE  SWOT ANALYSIS
Chapter 4 Chapter 12
 TECHNOLOGY WE USE  FINANCIAL ANALYSIS
Chapter 5 Chapter 13
 TECHNOLOGY ROADMAP  ENVIRONMENT & CONSTRAINTS
Chapter 6 Chapter 14
 SECURITY  RISK MANAGEMENT
Chapter 7 Chapter 15
 PRODUCT OVERVIEW AND FEATURES  QUALITY AND TRAINING MANAGEMENT
Chapter 8 Chapter 16
 TARGET MARKET  OFFICE LOCATION

2|Page EEZBOOK Dec 29, 2018


Chapter 1

EXECUTIVE
SUMMARY

OVERVIEW
We have developed Accounting and Financial
Management System a complete ERP based on
Cloud Technology.

3|Page EEZBOOK Dec 29, 2018


EXECUTIVE SUMMARY

Brief of our Cloud-Based Financial ERP Get Benefit of Disaster Recovery


Simply working through our cloud-based ERP through your Businesses of all sizes should be investing in robust disaster
smart device on internet makes life easy and fast of our recovery, but for smaller businesses that lack the required
customers. In past, people would run applications or cash and expertise, this is often more an ideal than the
programs from software installed on your physical reality. Our ERP is now helping organizations from small
computer or server in your building. Our ERP allows businesses to larger companies who have implemented
businessmen access to the same kinds of applications cloud-based real time backup and recovery solutions that
through the internet. save time, avoid large up-front investment and roll up third-
party expertise as part of the deal.
More simply we can say that it is easy just like updating
your facebook status, you'll use our ERP and manage your Save Capital-expenditure
business with strong control and can enables you in fast
We would like to cut out the high cost of hardware. You
decision making. In short, our ERP is more efficient and
simply pay as you go and enjoy a subscription-based model.
intelligent than existing applications. A study reveals that
by the end of 2020, it’s estimated that 90% of businesses Real Time Collaboration and Visibility
will be using cloud-based solutions in western world,
When your teams can access, edit and share documents
because it increases efficiency, improves internal control
anytime, from anywhere, they’re able to do more together,
and management over cash flow and offers many more
and do it better. Our ERP workflow and file sharing
benefits.
modules help them make updates in real time and gives
them full visibility of their collaborations.
Brief of our Cloud-Based Financial ERP
Freedom of work from anywhere
We are so ambitious and have following core objectives to
With our ERP, if you’ve got an internet connection you can
make life easy of our valuable customers with regard to
be at work. We are offering mobile app, you’re not
using our accounting and financial management solution, a
restricted by which device you’ve got to hand. Your
complete financial ERP.
businesses can offer more flexible working perks to
To Provide Flexibility employees so they can enjoy the work-life balance that suits
them.
We are providing cloud-based financial ERP that is ideal To Increase Your Competitiveness
for businesses with growing or fluctuating bandwidth Moving to our financial ERP gives access to enterprise-
demands. You will feel more flexible in decision making class technology, to our clients. It also allows smaller
and efficient while converting on our financial ERP. This businesses to act faster than big established competitors.
level of agility gives your business a real advantage over Pay-as-you-go service and cloud business applications
your competitors. That is why IT professionals rank mean small outfits can run with the smart brains can disrupt
operational agility’ as a top driver for cloud adoption. the market while the others lean and nimble.

Get Automatic Software Updates Eco-Friendly


The beauty of our ERP is that the servers are off-premise, Eco-friendly business practices can bring your significant
out of sight. Suppliers take care of them for you and roll out savings. If you use less electricity by switching to our
regular software updates – including security updates – so cloud-based system, turning out lights when possible, and
you don’t have to worry about wasting time maintaining the using the air conditioning just a tiny bit, you will have much
system yourself. Leaving you free to focus on the things lower utility bills
that matter, like growing your business.
4|Page EEZBOOK Dec 29, 2018
Chapter 2

ORGANIZATION
BRIEF

OVERVIEW
“EEZBOOK can increase the operational
effectiveness and efficiencies in your business
processes”

5|Page EEZBOOK Dec 29, 2018


Organization Brief

Company Brief Governing Body


The ESOFT (PRIVATE) LIMITED was established under Directors and Management is the governing body of the
the Pakistani laws of Companies Act, 2017 and is also Company.
registered with the Pakistan Software Export Board having
the objective to establish the business of IT and computer
programming and to sale and give licenses, to provide
Information Technology products and services to its
valuable customers.

Corporate Vision, Mission and Core


Values

Vision: Core Values


“EEZBOOK can increase the operational effectiveness The Company is committed to adhere highest professional
and efficiencies in your business processes” ethics and individual integrity and other values that include:

Mission: • Cooperation

Empowering every business to gain and retain customers • Collaboration


with most open, flexible and intuitive relationships by
providing accounting and financial management solutions • Responsiveness
to improve their productivity, internal control, reduce costs
and save time • Innovation

• Security

• To Take Care of the Customers on Equality

6|Page EEZBOOK Dec 29, 2018


Chapter 3

RELEVANT
EXPERIENCE

OVERVIEW
“EEZBOOK can increase the operational
effectiveness and efficiencies in your business
processes”

7|Page EEZBOOK Dec 29, 2018


Relevant Experience

Company Brief Sector we Cover


With nearly 10 years’ of complete Accounting and Following are various businesses sectors to whom we are
Financial ERP support services experience, ESOFT has providing our accounting and financial solutions for their
demonstrated its ability to successfully design, develop, better management and fast working environment.
implement and manage the operations and maintenance of
various finance departments of wide ranges of different Power Sector
corporate. We are nurturing effective partnerships with
various departments of the different businesses and
companies.

Through years of experience ESOFT has polished its


business model by finding the best and most cost-effective Construction Sector
methods to support our customers. The management runs a
decentralized organization, with a lean and focused
corporate staff that is relatively smooth, minimizing the
paperwork frequently seen in large sized companies.
Communal is readily available to support the customers.
Our each customer has the tools to run their organization,
Service Sector
feeding information to corporate for financial planning,
budgeting and control, payroll, receiving corporate
assistance with purchasing discounts, human resources, and
other support efforts.
Manufacturing Sector
Our EEZBOOK’s Accounting and Financial ERP is a
reliable, effective and accurate solution that provide
continual and virtually effortless and efficient
communications between finance department, management
and all stakeholders of a corporate.

Our close, first-hand knowledge of the corporate sector that Trading Sector
comes from successfully completing assignments for many
of the large and most recognizable clients, enable us to add
significant value to all phases of a project.

Whether we are providing valuable and efficient data


Our Enterprise Resource Planning is the integrated
management support for making feasibility studies, project
management of core business processes, in real-time and
budgeting and cost analyses, planning and scheduling,
mediated by software and technology. Our ERP is usually
assessments, or all of the above as part of our
referred to as a category of business-management software
comprehensive project management offering, we do so with
— typically a suite of integrated applications—that an
a difference in expertise and firm commitment to quality.
organization can use to collect, store, manage, and interpret
data from these many business activities

8|Page EEZBOOK Dec 29, 2018


Chapter 4

TECHNOLOGY WE
USE

OVERVIEW
Technology road mapping is the process of
integration of strategic and technology planning
for competitiveness. Technology planning is
becoming critical with the rapid development and
evolution of technologies. Technology road
mapping provides a tool for selecting which
technologies to pursue in what time frames.

9|Page EEZBOOK Dec 29, 2018


Technology

In recent years, technological advances have motivated industries, companies and even governments to look for an improved
alignment between strategic objectives and technology management, preferably through the application of structured and
flexible approaches. The eSoft use state of the art technology to build its product.

HTML HTML 5(HyperText Markup Language)

CSS 3 CSS 3(Cascading Style Sheets)


Client Side Scripting

JavaScript JavaScript
technologies

Ajax Ajax (Asynchronous JavaScript and XML)

jQuery jQuery (JavaScript Framework Library - commonly used in Ajax development)


Server Side
scripting

PHP 7.1.16 PHP 7.1.16 (Linux / Unix based Open Source - free redistribution, combination with MySQL
database)
Database

Database My SQL 5.7.21


Server

Server Apache 2.4.33


Framework

Framework Laravel 5.5 (open-source PHP web framework of 2018)


compatibility
Browser

Browser
Google Chrome, Mozilla Firefox, Internet Explorer, Opera
compatibility

10 | P a g e EEZBOOK Dec 29, 2018


Chapter 5

TECHNOLOGY
ROADMAP

OVERVIEW
A Technology Roadmap is “a plan that matches
short-term and long-term goals with specific
technology solutions to help meet those goals”. It
is important to mention that the goals and
objectives need to be defined properly at the
organizational level, enabling all the business units
be it business or IT to be guided accordingly for
subsequently setting the respective goals and
objectives at Business Unit (BU)-level.

(PDF) Technology Roadmap: A Strategic Business

11 | P a g e EEZBOOK Dec 29, 2018


Key elements of a successful roadmap

A successful roadmap contains a clear statement of the desired outcome followed by a specific pathway for reaching it. a
specialised type of strategic plan that outlines activities an organisation can undertake over specified time frames to achieve
stated goals and outcomes.

The logic of a roadmap Goals


If designed correctly, a successful roadmap should provide A clear and concise set of targets that, if achieved, will
the ability to link any project or activity back through this result in the desired outcome; quantified goals (e.g.
logical structure to understand how the project or activity “improve cash inflow by 25% in two years”) provide the
ultimately contributes to the achievement of the roadmap most specific guidance.
goals. Simply writing a roadmap is not enough — the true
measure of success is whether or not the roadmap is Milestones
implemented and achieves the organisation’s desired The interim performance targets for achieving the goals,
outcome. Such progress can be tracked with proper pegged to specific dates (e.g. “improve the cash inflow by
monitoring indicators as presented later in this document. 2% per year during the next five years without delaying
payments.”).

Gaps and barriers


A list of any potential gaps in knowledge, technology
limitations, market structural barriers, regulatory
Goals limitations, public acceptance or other barriers to achieving
the goals and milestones

Milestones Action items


Actions that can be taken to overcome any gaps or barriers
that stand in the way of achieving the goals; typical solution
Gaps and barriers actions include technology development and deployment,
development of regulations and standards, policy
formulation, creation of financing mechanisms, and public
Action items engagement.

Priorities and timelines


Priorities and timelines
A list of the most important actions that need to be taken in
order to achieve the goals and the time frames, taking into
account interconnections among those actions and
stakeholder roles and relationships

12 | P a g e EEZBOOK Dec 29, 2018


EEZBOOK TECHNOLOGY

The product–technology roadmap process developed at ESOFT aims at better integration of business and technology strategy
and improvement of the front end of the product creation process (the concept and idea phase). Teamwork, integral
involvement by the organization and good communication are essential characteristics of the process. Benefits include a
shared product–technology strategy and a cross-functional approach to product and technology planning and vision building.

Q1 2019 Q2 2019 Q3 2019 Q4 2019

Milestone RELEASE 1.1 RELEASE 1.2


Mobile App Launch
INFRASTRUCTU

Android App
EPIC

Filer Status Auto Update Connection with Banks


FEATURE
Laravel upgrade Performance Mysql upgrade
ENHANCMENT
FEATURE

API Supplier Portal


EPIC

Enhancements reporting and Dashboards Customer Portal Auditor panel


FEATURE

DATA Warehouse Internal Tools


EPIC
TOOLS

Data up loader
FEATURE
SECURI

Security Policy Audit Log Single Sign - ON ISO Certification


FEATURE

Sharing Permission Menu Updates


FEATURE
UX

Drag-and-Drop Refine Loader Spinner New Branding Live Massaging


ENHANCMENT

13 | P a g e EEZBOOK Dec 29, 2018


Chapter 6

SECURITY

OVERVIEW
EEZBOOK build it ERP on bases of 3 layers of
security. Cloud computing is made up of a variety of
layered elements, starting at the most basic physical
layer of storage and server infrastructure and
working up through the application and network
layers.

14 | P a g e EEZBOOK Dec 29, 2018


WHAT IS CLOUD APPLICATION

Cloud is an extremely hot topic from businesses


businesses;; it is still a pretty broad concept that covers a lot of online territory. As you
begin to consider switching your business to the cloud, whether it be for application or infrastructure deployment, it is more mor
important than ever to understand thee differences and advantages of the various cloud services.

There are usually three models of cloud service to compare: Software as a Service (SaaS), Platform as a Service (PaaS), and
Infrastructure as a Service (IaaS). Each of these has its own benefits aass well variances and it is necessary to understand the
differences among SaaS, PaaS, and IaaS to know how to best choose one for your organization.

On - Premise Infrastructure Platform as Software as a


as a Service Service Service
• Application • Application • Application • Application
• Data • Data • Data • Data
• Runtime • Runtime • Runtime • Runtime
• Middleware • Middleware • Middleware • Middleware
• O/S • O/S • O/S • O/S
• Virtualization • Virtualization • Virtualization • Virtualization
• Services • Services • Services • Services
• Storage • Storage • Storage • Storage
• Networking • Networking • Networking • Networking

Common Examples of SaaS, PaaS, & IaaS

Platform Type Common Examples


SaaS Google Apps, Dropbox, Salesforce, Cisco WebEx, Concur, GoToMeeting

PaaS AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App Engine, Apache
Stratos, OpenShift
IaaS DigitalOcean, Linode, Rackspace, Amazon Web Services (AWS), Cisco Metapod,
Microsoft Azure, Google Compute Engine (GCE)

15 | P a g e EEZBOOK Dec 29, 2018


SECURITY

Security is essential part of today’s Modern cloud base applications. EEZBOOK always provide the highest level of data
security to its valuable clients. The security
ecurity in the cloud is much like security in your on
on-premises
premises data centers - only without
the costs of maintaining facilities and hardware. In the cloud, you don’t have to ma manage
nage physical servers or storage devices.
Instead, you use software-based
based security tools to monitor and protect the flow of information into and of out of your cloud
resources.

As enterprise applications and data continues to move towards software as a ser service
vice (SaaS), the need to evolve security
controls and strategies has become increasingly apparent. New developments are now required to access and store data and
applications. An evolving enterprise IT landscape calls for an evolving security strategy to kkeep
eep pace with it.

Cloud computing security is a fast-growing


growing service that provides many of the same functionalities as traditional IT security.
This includes protecting critical information from theft, data leakage and deletion.

 One of the benefits of cloud d services is that you can operate at scale and still remain secure. It is similar to how you
currently manage security, but now you have new ways of delivering security solutions that address new areas of
concern. Cloud security does not change the approa
approach
ch on how to manage security from preventing to detective and
corrective actions. but it does however give you the ability to perform these activities in a more agile manner.
 Your data is secured within data centers and where some countries require data to be stored in their country,
choosing a provider that has multiple data centers across the world can help to achieve this.
 Data storage often includes certain compliance requirements especially when storing credit card numbers or health
information. Many cloud
loud providers offer independent third party audit reports to attest that their internal process
exist and are effective in managing the security within their facilities where you store your data.

Cloud Security Traditional IT Security

• Third-Party
Party Data Centers • In-House
House Data Centers
• Low Upfront Infrastructure • High Upfront Costs
Investments • Slow Scaling
• Quickly scalable • Lower Efficiency
• Efficient Resource • Longer Time To Market
Utilization • Higher Cost
• Reduced Time To Market
• Usage-Based Cost

16 | P a g e EEZBOOK Dec 29, 2018


EEZBOOK

Security is the core part of EEZBOOK ERP, it is secured with 3 layers of security. This includes the ability to protect
information, systems, and assets while delivering business value through proactive risk assessments and mitigation strategies.

The three layers of our security are

Communication Layer

This includes communication between user computer/device to server. All the traffic between user and server is encrypted. It
is secured by 256-bit SSL certificates. Which is higher than the security required by the banks. This makes sure that traffic
between user and server remain encrypted and uncompromised.

Infrastructure Layer

Infrastructure layer means cloud and all the services in it, it includes Data Centers, Operating Systems, Server software
programs, Database services, Networking etc. We use Amazon AWS as our cloud provider. AWS is the best and market
leader in public cloud services. With AWS, you will benefit from a data center and network architecture built to meet the
requirements of the most security-sensitive organizations. Not only just passwords, we even have the ability to encrypt the
full databases as well.

Application Layer

This layer covers our software. Application layer security includes identity and access management, proactive protection
against known vulnerabilities e.g. SQL Injection, CSRF, XSS etc. and multi factor authentication.

Authentication Mechanism:

i- Least Privilege Principle: By default, no one is allowed to use our software. The admin has to define the credentials
and enable the user so that user can access with assigned privileges.

ii- Role Based Authentication: Each user is allowed with specific role/privileges, access to resources not allowed by
the role are denied. Whenever a page in our software is accessed, the credentials and privileges are checked before taking an
action. If required privileges are not received, action is not allowed.

iii- Multi Factor Authentication: can also be enabled by the admin, so that when a user logs in its registered mobile
phone receives a unique authentication code. On entering the received authentication code login is allowed.

iv- Credential Storage Policy: Passwords are saved with encryption string and salt hash to make it more secure.
Password expire policy can be set so that old passwords are expired.

17 | P a g e EEZBOOK Dec 29, 2018


Cloud Security Principles

There are seven design principles for security in the cloud:

• Implement a strong identity foundation: Implement the principle of least privilege and enforce separation of duties
with appropriate authorization for each interaction with AWS resources. Centralize privilege management and reduce or even
eliminate reliance on long-term credentials.

• Enable traceability: Monitor, alert, and audit actions and changes to environment in real time. Integrate logs and
metrics with systems to automatically respond and take action.

• Apply security at all layers: Rather than just focusing on protection of a single outer layer, AWS apply a defense-in-
depth approach with other security controls. Apply to all layers (e.g., edge network, VPC, subnet, load balancer, every
instance, operating system, and application).

• Automate security best practices: Automated software-based security mechanisms improve your ability to securely
scale more rapidly and cost effectively. Create secure architectures, including the implementation of controls that are defined
and managed as code in version-controlled templates.

• Protect data in transit and at rest: Classify your data into sensitivity levels and use mechanisms, such as encryption,
tokenization, and access control where appropriate.

• Prepare for security events: Prepare for an incident by having an incident management process that aligns to your
organizational requirements. Run incident response simulations and use tools with automation to increase your speed for
detection, investigation, and recovery.

Further reading for AWS Cloud Security

https://aws.amazon.com/security/

18 | P a g e EEZBOOK Dec 29, 2018


Chapter 7

PRODUCT OVERVIEW AND


FEATURES

OVERVIEW
ESOFT started to develop its ERP since 2010. First
we launch a Prototype version in 2012. This
prototype version was application based ERP. To
meet future challenges and for the sustainability
of the business and company, we started to design
and develop Cloud Based ERP Solution. In 2016 we
successfully launched an alpha version of the ERP
and finally we launched a completely tested Beta
version.

19 | P a g e EEZBOOK Dec 29, 2018


Product Features
The Company expects cloud computing to play a huge role in transforming product, services, strategy and play an important
role in improving the customer experience. It will accelerate evolution distributing transformative and innovative power
more widely than ever before and nowhere more so than in financial services.

The Company has adopted a cloud-first strategy and over time will transition the majority of its key applications to the cloud,
and also leverage cloud to accelerate development and innovation.

“We believe that the modern computing era is going to change our lives drastically. The pace of change is unprecedented and
it’s still accelerating”

EEZBOOK FINANCIALS EEZBOOK TAXATION


Easy to Use and Accessible with Strong Management Multi Tax Treasury Management With Fairness, Adequacy,
Control Multi Currency Environment, Integration with Simplicity, Transparency, and Administrative Ease. Get
other Modules. Facilitates to Use .Analytical Techniques automated tax return to file FBR on monthly basis

EEZBOOK BUDGETING EEZBOOK PROJECT MANAGEMENT


Easily define and manage estimated budget in more than Provides specialized planning and tracking tools designed to
one currency. Tag payments against budget heads and get meet the unique needs of engineer-to-order and make-to-
utilization reports. Give comments for over or under order manufacturers. Business benefits include increased on-
utilizations with reasons. Enjoy controlling power for time project completion, improved profitability and
strong decision making. customer satisfaction, optimized use of valuable personnel
and equipment, increased visibility and control over project
EEZBOOK PAYABLE costs and improved accuracy of service-based estimates and
Track all money you owe other companies. Meet your quotes
obligations and get discounts. Monitor your cash outflows.
Dynamically automate and manage payment process. EEZBOOK RECEIVABLE
Streamline invoice approval and payment. Access reports
Customers are the lifeline of any business. Track all money
anytime, anywhere with graphic presentations
your company is owed not collected yet. Track all invoices
you've sent for products or services to your customers.
EEZBOOK HRM Improve cash management by automating receivable
Captures employee information, ranging from contact processes. Integrated with all other EEZBOOK’s modules.
information to employee benefits. Reduces workload and Define sales and recovery policy. Track bid money as well
conducts human resource tasks more efficiently. Allows HR as advance amounts received. Graphical presentations with
managers to determine employee development plans. details of reports

EEZBOOK PAYROLL EEZBOOK INVENTORY AND ASSET


Payroll Management. Management control over payroll MANAGEMENT
Manage Inventory purchasing, receiving, issuing and, in
process. Reduce administrative costs, paperwork, Manual some cases, the return of inventory items. EEZBOOK ERP
process and Duplicate data entry employee's self-service system can tailor the entire process through built-in
portal. Integrated with GL Module. Easy processing with workflows to include workflow approvals for requisitions.
less effort. Advances & loan management. Track employees Tag all your assets, and get depreciation calculations as per
payroll history department wise and Grade wise. Payroll tax your policy. Record adjustments related transfer, disposal of
management Get easy access & reports anywhere any time assets. Get integration with other main financial modules

20 | P a g e EEZBOOK Dec 29, 2018


Chapter 8

TARGET MARKET

OVERVIEW
The Company expects cloud computing to play a
huge role in transforming product, services,
strategy and play an important role in improving
the customer experience. It will accelerate
evolution distributing transformative and
innovative power more widely than ever before
and nowhere more so than in financial services

21 | P a g e EEZBOOK Dec 29, 2018


Target Market
Over the years, ESOFT has worked extensively with and developed particular knowledge of the unique management
challenges faced by companies, organizations like traders, manufactur
manufacturers,
ers, distributors, professional services organizations. It
intends to fully leverage this expertise going forward, as customers expect industry
industry-specific, out-of
of the-box
the solutions in the
Cloud. Specifically, this provides ESOFT with a total addressable mark market
et of roughly 10,000 companies that meet our
minimum annual revenue threshold.

The local market threshold comprised of following business sectors.

Public Sector / Organizations Private Sector Companies/ Organizations

● Power Generation Organizations ● Power Generation Companies (Thermal


( /
● Oil and Gas Companies Hydroelectric/ Wind/Solar)
● Ministries / Foundations ● Construction Companies
● Universities / Colleges / Schools ● Real Estates
● Constructions Companies ● Town Planners
● Manufacturing Companies ● Trading Companies
● Service Industry ● Education Sector
● Service Industry
● Retailers
● E-Commerce
Commerce (POS Solutions)
● IT Industry / Software Developers (future add ins)

22 | P a g e EEZBOOK Dec 29, 2018


Chapter 9

COMPETITIVE OVERVIEW

OVERVIEW
When it comes to our ERP system, we confidently
say that it helps your company. It gives our
company competitive advantages.

23 | P a g e EEZBOOK Dec 29, 2018


Competitive Overview
ERP provides businesses flow management and includes manufacturing, accounting, sales and customer relationship
management. For almost two decades, on-premise
premise ERP has been adopted very commonly in the industry. Accompanied
with the emergence of cloud computing technologies in the late 2000s, there is an increasing trend for companies to
migrate their previously internal ERP applications and databases into the cloud.

When it comes to our ERP system, we confidently say that it helps your company. It gives our company following
competitive advantages.

● Cost effective / Affordable


● Application based
● More Flexible
● Cloud-Based / Web Based
● Providing superior quality of information
● Integration with existing systems

Distinction
In Pakistan we claim that we are the first and only Cloud Based Accounting, Financial and HRM ERP developers in local
market. We have a large canvas to cover the market. ESOFT is ready and fit to cover all areas related to Accounting,
Financial and HR Management.

24 | P a g e EEZBOOK Dec 29, 2018


Chapter 10

TARGET INDUSTRY

OVERVIEW
Our marketing strategy is the approach and
continued efforts the marketing team will take to
achieve its goals. The strategy revolves around
how the team is planning to hit its goals, while
keeping marketing priorities in mind and to
remain aligned to the business objectives

25 | P a g e EEZBOOK Dec 29, 2018


Target Industry

We have a plan to target following sector wise industry to meet our objective. till 2023 we shall contact almost 500
companies to give effect of our core objectives

Industry 2019 2020 2021 2022 2023 Total

Power Sector 7 9 10 10 10 46

Service Sector 16 23 57 52 61 209

Trading Sector 5 5 18 18 18 64

Manufacturing 4 4 10 9 10 37

Construction 4 4 10 8 8 34

Town planners 4 4 10 8 8 34

Hospitality 4 4 4 4 4 20

Logistics 2 2 5 3 3 15

Education 8 12 7 7 7 41

Total 54 67 131 119 129 500

26 | P a g e EEZBOOK Dec 29, 2018


Chapter 11

SWOT ANALYSIS

OVERVIEW

27 | P a g e EEZBOOK Dec 29, 2018


Swot Analysis

The following strengths, weaknesses, opportunities, and threats (SWOT) analysis provides a snapshot of our strengths
and weaknesses and external opportunities and threats.

Strengths

 Sole locally complete ERP provider in Pakistan


 Strong and Reliable products and product support.
 Esoft is extremely knowledgeable about the third-party marketplace, and its team is also personally dedicated to
making the business a success.
 Active and committed advisory council.

Weaknesses

 No Membership of Cloud Partner Network.


 ISO Certifications.
 Less resources to capture foreign market.

Opportunities

 A huge gap in local market to capture by providing our strong, flexible, cost effective and reliable support to our
customers. No other local company is providing such ERP.
 Business men have more management control over his business by using our ERP. They can boost their
budgeting and planning approaches, in time.
 Changing marketplace that coincides with our product.
 Chance to move with professional businessmen.
 Growth market.
 Technological changes.
 Refocus on IT applications.

Threats

 Less capital and finances


 Foreign Competitors—all foreign competitors are likely to have deeper pockets than ESOFT’s ERP Solution.
 Offerings can be duplicated by knowledgeable experts.
 Limited knowledge of customers about Cloud Technologies.
 Economies of scale in larger companies such as Oracle.

28 | P a g e EEZBOOK Dec 29, 2018


Chapter 12

FINANCIAL PROJECTIONS

OVERVIEW
In future ESOFT would be a big exporter of its ERP
and will contribute in generation of economic
activity.

29 | P a g e EEZBOOK Dec 29, 2018


Financial Projections

ESOFT is striving to achieve its goals vigorously. Following are the detail projections about our sales turnover,
expenses and profit. Till 2023 company is expecting about total sales of Rs.750 million. To achieve this goal,
we need initial findings to run our business.

By the following projections one may observe that in future ESOFT will become major contributor to the
economy, job provider and running its business successfully.

In future ESOFT would be a big exporter of its ERP and will contribute in ge
generation
neration of economic activity.

30 | P a g e EEZBOOK Dec 29, 2018


Chapter 13

ENVIRONMENT &
CONSTRAINTS

OVERVIEW
Many companies are moving part or all of their
systems to the cloud in order to gain from the
benefits. This type of system provides, such as cost
savings and flexibility. However, cloud computing
is also a much more environment friendly choice,
when compared to running servers from within
your individual business.

31 | P a g e EEZBOOK Dec 29, 2018


Cloud Computing is a more Environment Friendly Choice

Research suggests that for a large enterprise, making the switch would actually save 30,000 metric tonnes of CO2 within five
years, which is the equivalent to almost 6,000 cars off the road! Take some time to think about how many businesses there
are in Pakistan and across the world. If more businesses switched to a cloud based system, the positive environmental impact
would be astronomical.

How does the cloud make your business more Cloud computing also provides a number of non-IT
eco-friendly? environmental benefits. For example, it can reduce the
amount of travel required by staff, as employees can access
There are a number of ways to switch from your private / documents from anywhere with the cloud, allowing for
in-house servers to the cloud could make your business more flexibility and a potential reduction in travel,
more environment-friendly. Some of the major reasons are: depending on the business.

Using full capacity – As we talk about businesses, you are Constraints


unlikely to be utilizing the full capacity of your server. With
the cloud, server capacity is shared between different Many organizations benefit from the agility, scale, and pay-
businesses. Resources are allocated so that there are no idle per-use billing that cloud services offer. However, as with
machines, and utilisation rates are much higher. This means any infrastructure service, the suitability of cloud
fewer machines are needed and less energy is wasted. computing for your specific use case should be assessed in
a risk-based evaluation. Build in time for research and
Energy efficiency – While small businesses may not be planning to understand how the cloud will affect your
greatly affected by the energy saving they could achieve business. Following are some constraints considered by
without in-house servers. Large data centres would see vast some people; however these are very well manageable.
energy saving with a cloud-based system. They can also
buy cloud server space in larger amounts, helping the
business save money and energy in the long-term.
• Downtime
Better climate control – Servers get very hot, so it is • Security and Privacy
important to have a high quality cooling system, which • Vulnerability to Attack
• Limited control and flexibility
further adds to the cost of in-house servers. Since the cloud
works on a much larger scale, it can use more efficient
layouts to keep servers cool.

32 | P a g e EEZBOOK Dec 29, 2018


Chapter 14

RISK
MANAGEMENT

33 | P a g e EEZBOOK Dec 29, 2018


Risk Management

The risk management road map is based on our four guiding principles:
Vision —What is the business vision and who will own the initiative?
Visibility —What needs to be done and what are the risks?
Accountability —Who is accountable and to whom?
Sustainability —How will it be monitored and measured?

Constant Vigilance and Continuous Mature IT processes is followed


Monitoring
We have adopted constant vigilance and continuous All cloud-based systems development and technical
monitoring of risk to the information assets, including infrastructure processes is aligned with policy, meet agreed
ensuring compliance with appropriate laws, regulations, business requirements, be well documented and
policies and frameworks. This is related to the governance communicated to all stakeholders, and be appropriately
dimension of ESOFT. We acquire briefings from internal resourced The risk manager ensures that relevant policies
and/or external technical experts to understand the are in place and communicated, and that a mapping of
technology and its alignment to the business objectives. policy clauses to the assessment framework is included. A
gap analysis is then performed against IT development and
Management own the risks support processes and included in the risk and control
profile
The management of the ESOFT owns the risk associated
with its use of cloud services, and has established, direct,
monitor and evaluate adequate risk management on an on- Management and Security Evaluation by
going basis. Client
Information risk and security, as well as its monitoring and
management, is considered in all decisions. This is related
Your all concerned staff must have to the architecture dimension of EEZBOOK. However,
knowledge of the cloud your risk manager must involve in all aspects of the
All users of the EEZBOOK should have knowledge of the initiative, including vendor evaluation and management,
system and its risk (commensurate with their role in the technology review, security assessment and design, and the
organization), understand their responsibilities and be final investment decision.
accountable for their use of the system.
Comply with Regulatory, Legal, Contractual
ESOFT must know who is using the EEZBOOK and Policy Obligations
We ensure that the necessary background checks, We comply with regulatory, legal, contractual and policy
segregation of duties, least privilege and user access review obligations; uphold the values of integrity and client
controls are in place in the business, IT and cloud service commitment; and ensure that all use is appropriate and
provider. This will require working with the IT manager authorized. Our operational risk manager works with the
and the possible engagement of external assessment compliance manager to ensure that all policies, regulations
organizations. Appropriate security controls must be in and employee codes of conduct are in place; training is
place for all users of the EEZBOOK performed; and compliance is periodically reviewed. The
operational risk manager works with the IT risk manager
We monitor risk and client manager to ensure that processes are in place to
similarly assess compliance within the client premises.
Our cloud-based technology is developed or acquired
enables transparent and timely reporting of information risk Best practices is followed
and is supported by well-documented and communicated Our cloud-based systems development and technical
monitoring and escalation processes. Our operational risk infrastructure related processes is considered contemporary
manager and departmental IT risk manager works together technology and controls to address emerging information
to develop an ongoing cloud risk and security monitoring, risk identified through internal and external monitoring.
reporting and escalation process.

34 | P a g e EEZBOOK Dec 29, 2018


Chapter 15

QUALITY AND TRAINING


MANAGEMENT

35 | P a g e EEZBOOK Dec 29, 2018


Quality and Training Management

Training is aligned with our change We avoid the “one-and-done” approach


management strategy Effective training is more than an IT milestone; it is an
interactive process, one that includes classes, workshops,
Including change management as a part of our ERP
and “how to” sessions throughout the lifecycle of the
implementation strategy will accelerate adoption and reduce
implementation. A one-time training session won’t work.
risks and improve quality of work performing of the users.
Our users will typically have many different tasks to
Add to this a well-executed training plan will ease the
complete using our new ERP software and will not be able
transition process for impacted teams, making them more
to retain all of the critical information in a one-time
likely to embrace new processes.
training.

Deliver role and process-based training Let our experts help you with our training
Certainly, employees in all roles affected by the ERP plan
Our successful ERP training covers not only system-related
implementation will require training to understand the topics, but also revised business processes. It takes into
software fundamentals and the over-arching of consideration each function’s unique business processes
organization. It will be more beneficial to you. But for the and training needs. It guides employees — at all levels of
training to be truly effective, it's essential that users also be the organization — through new functions and processes.
trained on the functions and processes relevant to their Our trainers will help you to build a training plan and
individual roles. This calls for your organization-wide change management strategy for your ERP implementation.
training. We plan training for everyone from top to bottom. We also offer three new ERP Cloud Learning Subscriptions
It means your executive and management teams, IT project that can make your training much more successful.
teams, functional users, and end users will participate in
training sessions

We don’t pinch our ERP training budget


When considering how much to budget for our training
plan, we consider all the organizations and personnel that
need to be trained. We think about all the components that
will go into our training roll out. We cover all following
challenges for holding training sessions.

Who will coordinate the training?


Which training content you will need?
How much custom content you will develop?
What is the process we plan to use for rolling out the
training?

Although it is our responsibility related to above challenges.


However, the right training budget for our organization will
depend on each project and our strategy, and we ensure to
allocate sufficient budget for our training needs so you have
the resources to do it right.

36 | P a g e EEZBOOK Dec 29, 2018


Chapter 16

OFFICE LOCATION

37 | P a g e EEZBOOK Dec 29, 2018


Location

HEAD OFFICE
5 th Floor Doctor Plaza, DHA -II Islamabad
+92-51-5162371
info@esoft.us

38 | P a g e EEZBOOK Dec 29, 2018


eSOFT | 5TH Floor Doctor Plaza, DHA-II Islamabad Pakistan
T: +92 51 5162371 | E: info@esoft.us | W: www.esoft.us | P: www.eezbook.com

39 | P a g e EEZBOOK
EEZBOOK
Dec 29, 2018

You might also like