SlideShare a Scribd company logo
1 of 11
iSpy India Pvt. Ltd.
(ELECTRONIC INSURANCE)
Submitted To: Prof. Swati Shukla
Submitted By: Jatin Mittal
Anugreh Kumar
Ishan Bhasin
Introduction of the Sector
 Information technology (IT) is a branch of knowledge concerned with the development,
management, and use of computer-based information systems. In its initial modern sense,
during its inception, it was named so because in all accuracy it was the best provided
understood term to patent the work undertaken.
 India, being a knowledge hub in the IT and ITES sectors have until now given
employment to around 9 million people, spanning horizons of profit scorching over 100
billion dollar revenue, catalyzing the Indian economy to new leaps and bounds.
 Naturally as the IT sectors of the world are on constant increment, there arises constant
need to upgrade existing technology and invent novel ones. At this juncture, the newly
formed ISPY industries have calculatedly studied the cyber market, and collaborated and
reinvented both the antivirus and insurance sectors, dealing directly or indirectly with IT
portals and the functionality of superior technologies.
 It is called the ‘Electronic Insurance’
Introduction of Product
 As the name Electronic Insurance implies, it is a redesigned branch of software
engineering designed to capacitate both the advantages of a competitive antivirus
software, as well as the beneficiaries of a hefty insurance policy.
 Therefore, for modern companies today, which deal with the stress of being
technologically equipped with information, as well as secure encrypted monetary assets,
a revolutionized collaboration of both antivirus and insurance is almost essential.
 Thus the concept of ‘One software does it all’ is the created product of ISPY industries to
add a sophisticated convenience to companies of a higher requirement of professionalism.
 Now to cure the ambiguity of how an antivirus software actually detects a virus. It
has three phases:
1. Signature scan
2. Heuristic scan
3. Rootkit detection
4. Real time protection
ISPY industries has compiled together a fifth virus detection software, called the Trojan
Mirror. Trojan mirror allows access of 1% of a virus willingly, traps it, decodes it, creates an
encryption coded exactly like the virus and sends it back to the source, leaving the sender in
automatic destruction.
Process of Installation
 The customer gets in contact with the ISPY industry and confirms their interest and
participation in the product
 An agent is then sent with an ‘Electronic Bracelet’, which is similar to a bank vault but
for delicate information.
 Once the shipment has arrived, the agent organizes the set up of the control room with the
help of the technical staff available. This process takes around 18-23 days.
 The requisite software is installed into the entire systems internal hardware.
What the Electronic Insurance does
 In hindsight, the electronic insurance is said to nullify the turbulence of suggestively
volatile stock markets.
 Basic Functionality: As aforementioned, the primary personality of the electronic
insurance is to detect any devious penetrating pirate from entering and accessing any
information that is supposed to be concealed from the general public.
 Bad Debt Tracker: This is the punchline marketing component of the software which
makes it untouchable to any competition. It involves systematic data collection and
analysis into folders, namely profitable transactions, idle transactions, reasonless
transactions and malicious transactions.
 Insurance: This is the specialization of the software, for any information lost, stolen,
misrepresented or manipulated which comes under the consideration of the supervision of
the electronic insurance as per the deal finalized by the company and market, will be fully
and dutifully reimbursed by the ISPY industries.
Data collection and analysis
 The main competitors in this sector of the industry are the various antivirus softwares that
currently protect the computech management of the multi national corporations of the
world, as well as the computers for domestic use.
 The electronic insurance does not cater to the domestic circuit and deals only with
companies with financial regulations. It is not a simple cd-rom that is inserted and
installed, it is a structure of complex coding framework, built-in to the hardware of the
computer.
Benefits of our Product
 Taking for example firm X, which has a total monetary transaction of 100 crores in a
year. At least 45 lakh is spent on software updates and safety regulations of money, etc.
Still there are always abnormal losses ranging from 1-25 lakh.
 After installing the electronic insurance, the company will have to pay only 20 lakh a
year, and completely forget any hassles or formalities about their transactions.
 With the bad debt tracker, the company is also alerted about any potential fraudulent
deals and alerts the management personnel and subsequently freezes the assets.
Cost Analysis
 The initial capital required to establish the technical hardware and programming
softwares was around 12 million USD, and the working costs per organization would be
approximately 32% of the revenue earned by them.
 Depending on the size of the organization, the control room for the software would be set
up, therefore if a company requiring managing and protection of assets of 100 crore, to
set up the necessary technicalities would be anywhere between 65-90 lakh, depending on
the strength and frequency of the monetary transactions made.
 If the organization is handling more monetary transactions, then their establishment cost
would be higher than that of a company which requires more of safety of information.
IT Exports
 The following is a chart on the amount of IT
exports made in a year which amount for
currently 69.1 billion USD.
 This is expected to increase the total exports
as the net value of monetary transaction
undertaken by all these firms is an
approximate overall of 169 billion USD.
 Indian export increment of approximately
0.367 %, and the industry is expected to grow
at a steady rate of 4% per annum
Conclusion
 The electronic insurance is all set and ready to revolutionize the Indian IT sector and
responsible for the 15% estimated growth of export growth in FY 2012-13, in comparison
to 9.4% growth in FY 2011-12.
 ISPY industries has created pie charts based on the balance sheets of financial reports of
all major companies which have requested a demonstration. A trained employee will be
sent to each company and provide a presentation.
 ISPY forms the middle-man connection and in turn saves major insurance hassles and
downpayments on credit and financial electronic transactions.
 The product invented by ISPY industries proves that entertaining brilliance and
innovation can be critical to the improvement of business and commercial standards of
sophistication.

More Related Content

What's hot

Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDr. Raghavendra GS
 
Security Analysis in Digital India
Security Analysis in Digital IndiaSecurity Analysis in Digital India
Security Analysis in Digital Indiajournal ijrtem
 
Insurance 2030: AI Accelerating The Change
Insurance 2030: AI Accelerating The ChangeInsurance 2030: AI Accelerating The Change
Insurance 2030: AI Accelerating The ChangeArtivatic.ai
 
"We will do faster than our competitors" S K sharma
"We will do faster than our competitors" S K sharma"We will do faster than our competitors" S K sharma
"We will do faster than our competitors" S K sharmaG_swain
 
Insurance Applications of Machine Learning - The 9th International Istanbul I...
Insurance Applications of Machine Learning - The 9th International Istanbul I...Insurance Applications of Machine Learning - The 9th International Istanbul I...
Insurance Applications of Machine Learning - The 9th International Istanbul I...SigortaTatbikatcilariDernegi
 
Internet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sInternet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sIRJET Journal
 
Technology and Innovation in Insurance– Present and Future Technology in Indi...
Technology and Innovation in Insurance– Present and Future Technology in Indi...Technology and Innovation in Insurance– Present and Future Technology in Indi...
Technology and Innovation in Insurance– Present and Future Technology in Indi...Dr. Amarjeet Singh
 
Top 10 greatest ai trends in business 2020
Top 10 greatest ai trends in business 2020 Top 10 greatest ai trends in business 2020
Top 10 greatest ai trends in business 2020 Jnr Masero
 
Indonesia enterprise ict market size 2020
Indonesia enterprise ict market size   2020Indonesia enterprise ict market size   2020
Indonesia enterprise ict market size 2020Adolfo Ahmad
 
The Outlook of IoT in India - Rajesh Jha
The Outlook of IoT in India - Rajesh JhaThe Outlook of IoT in India - Rajesh Jha
The Outlook of IoT in India - Rajesh JhaRajesh Jha
 
The internet of things – The next wave - Insurance
The internet of things – The next wave - InsuranceThe internet of things – The next wave - Insurance
The internet of things – The next wave - InsuranceArqiva
 
The Internet of Things in insurance
The Internet of Things in insurance The Internet of Things in insurance
The Internet of Things in insurance Andrea Silvello
 
The Connected Insurance Observatory
The Connected Insurance ObservatoryThe Connected Insurance Observatory
The Connected Insurance ObservatoryMatteo Carbone
 
Insurtech what’s in it for the customer
Insurtech what’s in it for the customerInsurtech what’s in it for the customer
Insurtech what’s in it for the customerMatteo Carbone
 
The indian io t start up landscape and challenges
The indian io t start up landscape and challengesThe indian io t start up landscape and challenges
The indian io t start up landscape and challengesContractIQ
 
Mihai Raneti, Founder & CEO of CyberSwarm Inc.-Cybersecurity for the future: ...
Mihai Raneti, Founder & CEO of CyberSwarm Inc.-Cybersecurity for the future: ...Mihai Raneti, Founder & CEO of CyberSwarm Inc.-Cybersecurity for the future: ...
Mihai Raneti, Founder & CEO of CyberSwarm Inc.-Cybersecurity for the future: ...Codiax
 
AI : Animal Like Abilities in Applied AI, What can go wrong?
AI : Animal Like Abilities in Applied AI, What can go wrong?AI : Animal Like Abilities in Applied AI, What can go wrong?
AI : Animal Like Abilities in Applied AI, What can go wrong?Jari Koister
 
IRJET- E-Commerce for Economic Development in Nigeria
IRJET- E-Commerce for Economic Development in NigeriaIRJET- E-Commerce for Economic Development in Nigeria
IRJET- E-Commerce for Economic Development in NigeriaIRJET Journal
 

What's hot (20)

Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
 
Security Analysis in Digital India
Security Analysis in Digital IndiaSecurity Analysis in Digital India
Security Analysis in Digital India
 
Insurance 2030: AI Accelerating The Change
Insurance 2030: AI Accelerating The ChangeInsurance 2030: AI Accelerating The Change
Insurance 2030: AI Accelerating The Change
 
"We will do faster than our competitors" S K sharma
"We will do faster than our competitors" S K sharma"We will do faster than our competitors" S K sharma
"We will do faster than our competitors" S K sharma
 
Insurance Applications of Machine Learning - The 9th International Istanbul I...
Insurance Applications of Machine Learning - The 9th International Istanbul I...Insurance Applications of Machine Learning - The 9th International Istanbul I...
Insurance Applications of Machine Learning - The 9th International Istanbul I...
 
Women in Technology Leadership
Women in Technology LeadershipWomen in Technology Leadership
Women in Technology Leadership
 
Internet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’sInternet of Things Based Central Monitoring System for ATM’s
Internet of Things Based Central Monitoring System for ATM’s
 
Technology and Innovation in Insurance– Present and Future Technology in Indi...
Technology and Innovation in Insurance– Present and Future Technology in Indi...Technology and Innovation in Insurance– Present and Future Technology in Indi...
Technology and Innovation in Insurance– Present and Future Technology in Indi...
 
Top 10 greatest ai trends in business 2020
Top 10 greatest ai trends in business 2020 Top 10 greatest ai trends in business 2020
Top 10 greatest ai trends in business 2020
 
Indonesia enterprise ict market size 2020
Indonesia enterprise ict market size   2020Indonesia enterprise ict market size   2020
Indonesia enterprise ict market size 2020
 
The Outlook of IoT in India - Rajesh Jha
The Outlook of IoT in India - Rajesh JhaThe Outlook of IoT in India - Rajesh Jha
The Outlook of IoT in India - Rajesh Jha
 
The internet of things – The next wave - Insurance
The internet of things – The next wave - InsuranceThe internet of things – The next wave - Insurance
The internet of things – The next wave - Insurance
 
The Internet of Things in insurance
The Internet of Things in insurance The Internet of Things in insurance
The Internet of Things in insurance
 
The Connected Insurance Observatory
The Connected Insurance ObservatoryThe Connected Insurance Observatory
The Connected Insurance Observatory
 
Insurtech what’s in it for the customer
Insurtech what’s in it for the customerInsurtech what’s in it for the customer
Insurtech what’s in it for the customer
 
The indian io t start up landscape and challenges
The indian io t start up landscape and challengesThe indian io t start up landscape and challenges
The indian io t start up landscape and challenges
 
Mihai Raneti, Founder & CEO of CyberSwarm Inc.-Cybersecurity for the future: ...
Mihai Raneti, Founder & CEO of CyberSwarm Inc.-Cybersecurity for the future: ...Mihai Raneti, Founder & CEO of CyberSwarm Inc.-Cybersecurity for the future: ...
Mihai Raneti, Founder & CEO of CyberSwarm Inc.-Cybersecurity for the future: ...
 
What is io t (2)
What is io t  (2)What is io t  (2)
What is io t (2)
 
AI : Animal Like Abilities in Applied AI, What can go wrong?
AI : Animal Like Abilities in Applied AI, What can go wrong?AI : Animal Like Abilities in Applied AI, What can go wrong?
AI : Animal Like Abilities in Applied AI, What can go wrong?
 
IRJET- E-Commerce for Economic Development in Nigeria
IRJET- E-Commerce for Economic Development in NigeriaIRJET- E-Commerce for Economic Development in Nigeria
IRJET- E-Commerce for Economic Development in Nigeria
 

Viewers also liked

Final pres
Final presFinal pres
Final presscprek
 
Min reviews pres
Min reviews presMin reviews pres
Min reviews presscprek
 
Gibraltar parts2010
Gibraltar parts2010Gibraltar parts2010
Gibraltar parts2010beta345
 
MVP Presentation
MVP PresentationMVP Presentation
MVP Presentationscprek
 
Company profile Gruppo Pozzi
Company profile Gruppo PozziCompany profile Gruppo Pozzi
Company profile Gruppo PozziGruppo Pozzi Srl
 
Francophone countries
Francophone countriesFrancophone countries
Francophone countriesJatin Mittal
 
Technological implication of e business
Technological implication of e businessTechnological implication of e business
Technological implication of e businessAnurag Garg
 
UNIT-III-OPTICAL COMMUNICATION
UNIT-III-OPTICAL COMMUNICATIONUNIT-III-OPTICAL COMMUNICATION
UNIT-III-OPTICAL COMMUNICATIONexcelmeape
 
Accounting Standard 4
Accounting Standard 4Accounting Standard 4
Accounting Standard 4Jatin Mittal
 
Evolution of Indian Banking System
Evolution of Indian Banking SystemEvolution of Indian Banking System
Evolution of Indian Banking SystemJatin Mittal
 
Green house effect (1)
Green house effect (1)Green house effect (1)
Green house effect (1)Anurag Garg
 

Viewers also liked (16)

Final pres
Final presFinal pres
Final pres
 
Min reviews pres
Min reviews presMin reviews pres
Min reviews pres
 
Gibraltar parts2010
Gibraltar parts2010Gibraltar parts2010
Gibraltar parts2010
 
How to install windows 7
How to install windows 7How to install windows 7
How to install windows 7
 
Ciudades inteligentes
Ciudades inteligentesCiudades inteligentes
Ciudades inteligentes
 
MVP Presentation
MVP PresentationMVP Presentation
MVP Presentation
 
Westchester County Presentation at 2013 Long Island Sound Citizens Summit
Westchester County Presentation at 2013 Long Island Sound Citizens SummitWestchester County Presentation at 2013 Long Island Sound Citizens Summit
Westchester County Presentation at 2013 Long Island Sound Citizens Summit
 
Company profile Gruppo Pozzi
Company profile Gruppo PozziCompany profile Gruppo Pozzi
Company profile Gruppo Pozzi
 
Francophone countries
Francophone countriesFrancophone countries
Francophone countries
 
American Littoral Society Presentation at the 2013 Long Island Sound Citizens...
American Littoral Society Presentation at the 2013 Long Island Sound Citizens...American Littoral Society Presentation at the 2013 Long Island Sound Citizens...
American Littoral Society Presentation at the 2013 Long Island Sound Citizens...
 
Technological implication of e business
Technological implication of e businessTechnological implication of e business
Technological implication of e business
 
UNIT-III-OPTICAL COMMUNICATION
UNIT-III-OPTICAL COMMUNICATIONUNIT-III-OPTICAL COMMUNICATION
UNIT-III-OPTICAL COMMUNICATION
 
01 basic programming in c++
01 basic programming in c++01 basic programming in c++
01 basic programming in c++
 
Accounting Standard 4
Accounting Standard 4Accounting Standard 4
Accounting Standard 4
 
Evolution of Indian Banking System
Evolution of Indian Banking SystemEvolution of Indian Banking System
Evolution of Indian Banking System
 
Green house effect (1)
Green house effect (1)Green house effect (1)
Green house effect (1)
 

Similar to EXIM Policies

Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
Internet of Things is Poised to Transform the Insurance Sector
Internet of Things is Poised to Transform the Insurance SectorInternet of Things is Poised to Transform the Insurance Sector
Internet of Things is Poised to Transform the Insurance SectorPaasmer
 
Insurtech Cyber Boxer
Insurtech Cyber BoxerInsurtech Cyber Boxer
Insurtech Cyber BoxerAmit Rai
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech applicationnimbleappgenie
 
Internet of Things- IoT Monetization Models
Internet of Things- IoT Monetization ModelsInternet of Things- IoT Monetization Models
Internet of Things- IoT Monetization ModelsSubrahmanyam KVJ
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOThe Economist Media Businesses
 
ppt IT industry
ppt IT industryppt IT industry
ppt IT industryYash Joshi
 
Monetizing the internet of things extracting value from the connectivity o...
Monetizing  the internet of things   extracting value from the connectivity o...Monetizing  the internet of things   extracting value from the connectivity o...
Monetizing the internet of things extracting value from the connectivity o...Rick Bouter
 
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...Capgemini
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesTestbytes
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesTestbytes
 
VITBS IT REPORT
VITBS IT REPORTVITBS IT REPORT
VITBS IT REPORTmsdvraja
 
IoT - threats and opportunities to the organization
IoT - threats and opportunities to the organizationIoT - threats and opportunities to the organization
IoT - threats and opportunities to the organizationThieu Nguyen Bao Chau
 
Employing Telematics to Transform Workers' Compensation
Employing Telematics to Transform Workers' CompensationEmploying Telematics to Transform Workers' Compensation
Employing Telematics to Transform Workers' CompensationCognizant
 
Get Ready For What's New In Insurance Technology Trends For 2021
Get Ready For What's New In Insurance Technology Trends For 2021Get Ready For What's New In Insurance Technology Trends For 2021
Get Ready For What's New In Insurance Technology Trends For 2021Mindbowser Inc
 
The state of the whole AI & ML sector in Europe and North America – research ...
The state of the whole AI & ML sector in Europe and North America – research ...The state of the whole AI & ML sector in Europe and North America – research ...
The state of the whole AI & ML sector in Europe and North America – research ...Mindtrek
 
IoT - Insurance Industry Adoption
IoT - Insurance Industry Adoption IoT - Insurance Industry Adoption
IoT - Insurance Industry Adoption Ashwani Kumar
 

Similar to EXIM Policies (20)

Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Internet of Things is Poised to Transform the Insurance Sector
Internet of Things is Poised to Transform the Insurance SectorInternet of Things is Poised to Transform the Insurance Sector
Internet of Things is Poised to Transform the Insurance Sector
 
Insurtech Cyber Boxer
Insurtech Cyber BoxerInsurtech Cyber Boxer
Insurtech Cyber Boxer
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
Internet of Things- IoT Monetization Models
Internet of Things- IoT Monetization ModelsInternet of Things- IoT Monetization Models
Internet of Things- IoT Monetization Models
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
ppt IT industry
ppt IT industryppt IT industry
ppt IT industry
 
5-Unit (CAB).pdf
5-Unit (CAB).pdf5-Unit (CAB).pdf
5-Unit (CAB).pdf
 
Monetizing the internet of things extracting value from the connectivity o...
Monetizing  the internet of things   extracting value from the connectivity o...Monetizing  the internet of things   extracting value from the connectivity o...
Monetizing the internet of things extracting value from the connectivity o...
 
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
 
Essay It
Essay ItEssay It
Essay It
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
 
Reviving exports
Reviving exportsReviving exports
Reviving exports
 
VITBS IT REPORT
VITBS IT REPORTVITBS IT REPORT
VITBS IT REPORT
 
IoT - threats and opportunities to the organization
IoT - threats and opportunities to the organizationIoT - threats and opportunities to the organization
IoT - threats and opportunities to the organization
 
Employing Telematics to Transform Workers' Compensation
Employing Telematics to Transform Workers' CompensationEmploying Telematics to Transform Workers' Compensation
Employing Telematics to Transform Workers' Compensation
 
Get Ready For What's New In Insurance Technology Trends For 2021
Get Ready For What's New In Insurance Technology Trends For 2021Get Ready For What's New In Insurance Technology Trends For 2021
Get Ready For What's New In Insurance Technology Trends For 2021
 
The state of the whole AI & ML sector in Europe and North America – research ...
The state of the whole AI & ML sector in Europe and North America – research ...The state of the whole AI & ML sector in Europe and North America – research ...
The state of the whole AI & ML sector in Europe and North America – research ...
 
IoT - Insurance Industry Adoption
IoT - Insurance Industry Adoption IoT - Insurance Industry Adoption
IoT - Insurance Industry Adoption
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 

Recently uploaded (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 

EXIM Policies

  • 1. iSpy India Pvt. Ltd. (ELECTRONIC INSURANCE) Submitted To: Prof. Swati Shukla Submitted By: Jatin Mittal Anugreh Kumar Ishan Bhasin
  • 2. Introduction of the Sector  Information technology (IT) is a branch of knowledge concerned with the development, management, and use of computer-based information systems. In its initial modern sense, during its inception, it was named so because in all accuracy it was the best provided understood term to patent the work undertaken.  India, being a knowledge hub in the IT and ITES sectors have until now given employment to around 9 million people, spanning horizons of profit scorching over 100 billion dollar revenue, catalyzing the Indian economy to new leaps and bounds.  Naturally as the IT sectors of the world are on constant increment, there arises constant need to upgrade existing technology and invent novel ones. At this juncture, the newly formed ISPY industries have calculatedly studied the cyber market, and collaborated and reinvented both the antivirus and insurance sectors, dealing directly or indirectly with IT portals and the functionality of superior technologies.  It is called the ‘Electronic Insurance’
  • 3. Introduction of Product  As the name Electronic Insurance implies, it is a redesigned branch of software engineering designed to capacitate both the advantages of a competitive antivirus software, as well as the beneficiaries of a hefty insurance policy.  Therefore, for modern companies today, which deal with the stress of being technologically equipped with information, as well as secure encrypted monetary assets, a revolutionized collaboration of both antivirus and insurance is almost essential.  Thus the concept of ‘One software does it all’ is the created product of ISPY industries to add a sophisticated convenience to companies of a higher requirement of professionalism.
  • 4.  Now to cure the ambiguity of how an antivirus software actually detects a virus. It has three phases: 1. Signature scan 2. Heuristic scan 3. Rootkit detection 4. Real time protection ISPY industries has compiled together a fifth virus detection software, called the Trojan Mirror. Trojan mirror allows access of 1% of a virus willingly, traps it, decodes it, creates an encryption coded exactly like the virus and sends it back to the source, leaving the sender in automatic destruction.
  • 5. Process of Installation  The customer gets in contact with the ISPY industry and confirms their interest and participation in the product  An agent is then sent with an ‘Electronic Bracelet’, which is similar to a bank vault but for delicate information.  Once the shipment has arrived, the agent organizes the set up of the control room with the help of the technical staff available. This process takes around 18-23 days.  The requisite software is installed into the entire systems internal hardware.
  • 6. What the Electronic Insurance does  In hindsight, the electronic insurance is said to nullify the turbulence of suggestively volatile stock markets.  Basic Functionality: As aforementioned, the primary personality of the electronic insurance is to detect any devious penetrating pirate from entering and accessing any information that is supposed to be concealed from the general public.  Bad Debt Tracker: This is the punchline marketing component of the software which makes it untouchable to any competition. It involves systematic data collection and analysis into folders, namely profitable transactions, idle transactions, reasonless transactions and malicious transactions.  Insurance: This is the specialization of the software, for any information lost, stolen, misrepresented or manipulated which comes under the consideration of the supervision of the electronic insurance as per the deal finalized by the company and market, will be fully and dutifully reimbursed by the ISPY industries.
  • 7. Data collection and analysis  The main competitors in this sector of the industry are the various antivirus softwares that currently protect the computech management of the multi national corporations of the world, as well as the computers for domestic use.  The electronic insurance does not cater to the domestic circuit and deals only with companies with financial regulations. It is not a simple cd-rom that is inserted and installed, it is a structure of complex coding framework, built-in to the hardware of the computer.
  • 8. Benefits of our Product  Taking for example firm X, which has a total monetary transaction of 100 crores in a year. At least 45 lakh is spent on software updates and safety regulations of money, etc. Still there are always abnormal losses ranging from 1-25 lakh.  After installing the electronic insurance, the company will have to pay only 20 lakh a year, and completely forget any hassles or formalities about their transactions.  With the bad debt tracker, the company is also alerted about any potential fraudulent deals and alerts the management personnel and subsequently freezes the assets.
  • 9. Cost Analysis  The initial capital required to establish the technical hardware and programming softwares was around 12 million USD, and the working costs per organization would be approximately 32% of the revenue earned by them.  Depending on the size of the organization, the control room for the software would be set up, therefore if a company requiring managing and protection of assets of 100 crore, to set up the necessary technicalities would be anywhere between 65-90 lakh, depending on the strength and frequency of the monetary transactions made.  If the organization is handling more monetary transactions, then their establishment cost would be higher than that of a company which requires more of safety of information.
  • 10. IT Exports  The following is a chart on the amount of IT exports made in a year which amount for currently 69.1 billion USD.  This is expected to increase the total exports as the net value of monetary transaction undertaken by all these firms is an approximate overall of 169 billion USD.  Indian export increment of approximately 0.367 %, and the industry is expected to grow at a steady rate of 4% per annum
  • 11. Conclusion  The electronic insurance is all set and ready to revolutionize the Indian IT sector and responsible for the 15% estimated growth of export growth in FY 2012-13, in comparison to 9.4% growth in FY 2011-12.  ISPY industries has created pie charts based on the balance sheets of financial reports of all major companies which have requested a demonstration. A trained employee will be sent to each company and provide a presentation.  ISPY forms the middle-man connection and in turn saves major insurance hassles and downpayments on credit and financial electronic transactions.  The product invented by ISPY industries proves that entertaining brilliance and innovation can be critical to the improvement of business and commercial standards of sophistication.