SlideShare a Scribd company logo
Introducing SECURE
THE PEOPLE
Overview
SECURE THE PEOPLE is a specialized company in the New
Information and Communication Technologies. We assist
Companies and Individuals to achieve their objectives by
methods based on the protection of people and property,
marketing communication and optimization of IT
resources.
Our objective
Our objective is to accompany you in your growth by helping
you meet your challenges with the 3S strategy we have
in place:
1. Electronic Security
2. Safety Marketing
3. Information Security
Working Principles
Our principle of work is exclusively based on the
quality approach. Our quality goal is to offer our
customers services that meet all of their
expectations by providing:
1. A SERVICE organization and adapting to specific
requirements,
2. Respect for benefits in the price and negotiated
deadlines,
3. COMPETITIVENESS its offering through innovation,
technical choices and cost control,
4. The safety of people and respect for the
environment.
Vision, Mission & Values
The SECURE THE PEOPLE Vision is to be known and
recognized company on its business activities as the
preferred reference for businesses and individuals
through monitoring based on the quality of the service
offered. SECURE THE PEOPLE is a business relationship
based on trust to a strategic partnership and sustainable
3S with its customers. Our mission is to provide all
public companies and organizations, whatever their size,
professional service, unmatched by providing the best
security solutions available. Innovative solutions based
on their needs and meet their expectations in respect of
security. The SECURE THE PEOPLE values based on:
Quality, Efficiency, Safety, Respect.
The project idea
 The choice of these services is closely related to my
professional experience, the needs of companies in terms of
general safety equipment and especially to a growing market.
 Indeed, we are a service company specializing in the
installation, maintenance and sale of equipment and
surveillance system, computer service and communication via
sms.
 Finally, the security market is booming in Ivory Coast,
especially after the events of the post-election crisis of 2010
and the will of the government to make the Ivory Coast an
emerging country by 2020. We want to bring our expertise in
new technologies of information and communication for the
emerging building our country
OUR SERVICES
 ELECTRONIC SECURITY
We provide electronic security services in the
area:
• CCTV IP cameras and analog
• Burglar and transmission of SMS alerts alarm
• GPS geolocation
• access control fingerprint and badges
• the electrified fence and barbed
• fire safety
 Security Marketing
We make available to our customers as part of the
security Marketing, our SMS sending platform
and our lead bank to enable them to make the
communication oriented on target, directly
affect their prospects and reach their objective.
Finally, our web shopping center is the first in
West Africa or our customers, various vendors
will open a shop to sell and buy easily online all
their products safely.
 Security Marketing
We provide all IT services for installation, maintenance, and
development of all IT architectures. So we come to the
setting up of servers, networks, backups, databases, etc.
In order to ensure the efficiency of our products and the
efficiency of our services, we look to the leaders of our
various sectors. We include:
Our suppliers and brands
In order to ensure quality service standards in force in our country, our
team is composed of industry professionals. We organize départemant
with well-defined responsibilities and an evolving career profile.
We have:
 Branch with head and his Assistant Manager
 IT Reponsable and his Assistant
 The Finance Manager and Assistant
 The Technical Manager and 05 technicians
 The Sales Manager and 10 Commercial
In order to participate in the policy of employability, We are the first
company to integrate directly into our administration graduates
without experience to make a career with them following a well defined
job profile.
Our team
After a market study in the year 2015, we reached these
conclusions.
electronic security services, marketing and IT are luxuries
reserved for large enterprises, institutions and large
households.
These services are only present in the economic capital of
Ivory Coast.
So therefore we data for client objectives touching only
small and medium enterprises and institutions, small
households. Our focus remains untapped field by other
competitors in 60 other cities of Ivory Coast.
Our Clients
Any launch of a service requires a good marketing plan. So
SECURE THE PEOPLE, to ensure the durability of its
services after market studies has acquired the marketing
mix plan:
Marketing plan
Business plan
Our business plan focuses on current standards.
According to figures of simulations, we
achieved:
 Our sales target is: 3,600,000 FCFA / month
 Our monthly expense is: 1,250,000 FCFA /
month
 Our monthly income is: 2,350,000
These figures allow us to ensure project perenity
and make a successful fiscal year to reinvest
for growth.
Progress of the Project
Our project in its implementation will be as follows:
 Prospecting for business
 The technical study
 The proposal of the quote
 Payment of 60% of the quotation by the customer
 The development of the execution plan Work
 Delivery of construction
 The recovery of the remaining 40%
 Monitoring
NB: The communication between us and the customers and
suppliers will not be done by email and phone call.
Launch of activities and results
From the beginning of this year 2016, we started our
activities in the informal with a group of 4 people. We
worked in our homes, for Internet, churches and we
have had positive results.
With this result, we have taken steps to break the informal
that is to say to be born now and work.
Since the beginning of our activities, we had 06 customers
and make a profit of 360,000 FCFA. We can do better,
once organized into business in a room with working
equipment.
Our needs
Facing our growing desire to realize our dream while providing quality
service in key areas of our business, we began to seek funding. Our
needs today are not funding in large amounts, but the possibility for us
to open a local, to put the work materials.
Indeed we need:
 06 months of rent paid
 17 computers
 02 printers
 02 scanners
 4 offices (tables and chairs)
 Office Supplies
 Benches, tables, etc.
Wholesale our opening of our local budget and Operating method amounted
to 4,350,000 FCFA
We are open for any help to finance the said project.
To know us more
We invite you to visit our internet
presence:
 website:
www.securethepeople.hebfree.org
 Online Shop:
www.securethepeople.hebfree.org/shop/
We are currently building our digital
identity.

More Related Content

Similar to Presentazione progetto "Secure the People"

Point To Business Services Brouchure
Point To Business Services BrouchurePoint To Business Services Brouchure
Point To Business Services Brouchure
Point To Business Services
 
Madhura Credentials.
Madhura Credentials.Madhura Credentials.
Madhura Credentials.
idealbala
 
I-Bytes Telecommunication & Media Industry
I-Bytes Telecommunication & Media  IndustryI-Bytes Telecommunication & Media  Industry
I-Bytes Telecommunication & Media Industry
EGBG Services
 
Best Seo outsourcing company ,Web Development in chennai
Best Seo outsourcing company ,Web Development in chennaiBest Seo outsourcing company ,Web Development in chennai
Best Seo outsourcing company ,Web Development in chennai
cloudpeermedia
 
IT Services Hotel & Property Management Software : Pure Weblopment
IT Services  Hotel & Property Management Software : Pure WeblopmentIT Services  Hotel & Property Management Software : Pure Weblopment
IT Services Hotel & Property Management Software : Pure Weblopment
Pure Weblopment Limited
 
Pitechnogies it company
Pitechnogies it companyPitechnogies it company
Pitechnogies it company
Pi Technologies Pvt.Ltd.
 
AIT Brochure for Web
AIT Brochure for WebAIT Brochure for Web
AIT Brochure for Web
Fariz Iskandar
 
Innotec company presentation
Innotec company presentationInnotec company presentation
Innotec company presentation
Chris Georgiev
 
About us.
About us.About us.
i360 Group Services - Web Development, SEO
i360 Group Services - Web Development, SEOi360 Group Services - Web Development, SEO
i360 Group Services - Web Development, SEO
Bill Sterrett
 
Intin Digital Marketing.pdf
Intin Digital Marketing.pdfIntin Digital Marketing.pdf
Intin Digital Marketing.pdf
SushantaRay2
 
Company Profile Viami Global Services LLP
Company Profile Viami Global Services LLPCompany Profile Viami Global Services LLP
Company Profile Viami Global Services LLP
Viami Global Services LLP
 
ITC_Company_Profile.pdf
ITC_Company_Profile.pdfITC_Company_Profile.pdf
ITC_Company_Profile.pdf
BluGraphCommunicatio
 
Profile of Shariff Infotech
Profile of Shariff InfotechProfile of Shariff Infotech
Profile of Shariff Infotech
Mohammed Yunus
 
Wisdom Agency's General Credentials 2022
Wisdom Agency's General Credentials 2022Wisdom Agency's General Credentials 2022
Wisdom Agency's General Credentials 2022
Minh H. Nguyen
 
Systemco profile
Systemco profileSystemco profile
Systemco profile
systemco.net
 
Standard-Development-Presentation-EN
Standard-Development-Presentation-ENStandard-Development-Presentation-EN
Standard-Development-Presentation-EN
Sbarcea Constantin Mihai
 
Standard-Development-Presentation-ENG (1)
Standard-Development-Presentation-ENG (1)Standard-Development-Presentation-ENG (1)
Standard-Development-Presentation-ENG (1)
Adrian Nitu
 
Orange Business Services brand book GB 2021
Orange Business Services brand book GB 2021Orange Business Services brand book GB 2021
Orange Business Services brand book GB 2021
chrisleech10
 
LBM Overview
LBM OverviewLBM Overview
LBM Overview
markbates
 

Similar to Presentazione progetto "Secure the People" (20)

Point To Business Services Brouchure
Point To Business Services BrouchurePoint To Business Services Brouchure
Point To Business Services Brouchure
 
Madhura Credentials.
Madhura Credentials.Madhura Credentials.
Madhura Credentials.
 
I-Bytes Telecommunication & Media Industry
I-Bytes Telecommunication & Media  IndustryI-Bytes Telecommunication & Media  Industry
I-Bytes Telecommunication & Media Industry
 
Best Seo outsourcing company ,Web Development in chennai
Best Seo outsourcing company ,Web Development in chennaiBest Seo outsourcing company ,Web Development in chennai
Best Seo outsourcing company ,Web Development in chennai
 
IT Services Hotel & Property Management Software : Pure Weblopment
IT Services  Hotel & Property Management Software : Pure WeblopmentIT Services  Hotel & Property Management Software : Pure Weblopment
IT Services Hotel & Property Management Software : Pure Weblopment
 
Pitechnogies it company
Pitechnogies it companyPitechnogies it company
Pitechnogies it company
 
AIT Brochure for Web
AIT Brochure for WebAIT Brochure for Web
AIT Brochure for Web
 
Innotec company presentation
Innotec company presentationInnotec company presentation
Innotec company presentation
 
About us.
About us.About us.
About us.
 
i360 Group Services - Web Development, SEO
i360 Group Services - Web Development, SEOi360 Group Services - Web Development, SEO
i360 Group Services - Web Development, SEO
 
Intin Digital Marketing.pdf
Intin Digital Marketing.pdfIntin Digital Marketing.pdf
Intin Digital Marketing.pdf
 
Company Profile Viami Global Services LLP
Company Profile Viami Global Services LLPCompany Profile Viami Global Services LLP
Company Profile Viami Global Services LLP
 
ITC_Company_Profile.pdf
ITC_Company_Profile.pdfITC_Company_Profile.pdf
ITC_Company_Profile.pdf
 
Profile of Shariff Infotech
Profile of Shariff InfotechProfile of Shariff Infotech
Profile of Shariff Infotech
 
Wisdom Agency's General Credentials 2022
Wisdom Agency's General Credentials 2022Wisdom Agency's General Credentials 2022
Wisdom Agency's General Credentials 2022
 
Systemco profile
Systemco profileSystemco profile
Systemco profile
 
Standard-Development-Presentation-EN
Standard-Development-Presentation-ENStandard-Development-Presentation-EN
Standard-Development-Presentation-EN
 
Standard-Development-Presentation-ENG (1)
Standard-Development-Presentation-ENG (1)Standard-Development-Presentation-ENG (1)
Standard-Development-Presentation-ENG (1)
 
Orange Business Services brand book GB 2021
Orange Business Services brand book GB 2021Orange Business Services brand book GB 2021
Orange Business Services brand book GB 2021
 
LBM Overview
LBM OverviewLBM Overview
LBM Overview
 

More from Claudio Tancini

Presenti in rete workshop wordpress novembre 2019 v1.0
Presenti in rete workshop wordpress novembre 2019 v1.0Presenti in rete workshop wordpress novembre 2019 v1.0
Presenti in rete workshop wordpress novembre 2019 v1.0
Claudio Tancini
 
Cooperazione internazionale help3 - knowledge transfer
Cooperazione internazionale   help3 - knowledge transferCooperazione internazionale   help3 - knowledge transfer
Cooperazione internazionale help3 - knowledge transfer
Claudio Tancini
 
Informatica solidale settembre 2019
Informatica solidale settembre 2019Informatica solidale settembre 2019
Informatica solidale settembre 2019
Claudio Tancini
 
Help3&Informatica Solidale - knowledge transfer for international cooperation...
Help3&Informatica Solidale - knowledge transfer for international cooperation...Help3&Informatica Solidale - knowledge transfer for international cooperation...
Help3&Informatica Solidale - knowledge transfer for international cooperation...
Claudio Tancini
 
Help3 Project - knowledge transfer tools
Help3  Project - knowledge transfer toolsHelp3  Project - knowledge transfer tools
Help3 Project - knowledge transfer tools
Claudio Tancini
 
La importanza di un codice etico per i professionisti ict giugno 2019
La importanza di un codice etico per i professionisti ict giugno 2019La importanza di un codice etico per i professionisti ict giugno 2019
La importanza di un codice etico per i professionisti ict giugno 2019
Claudio Tancini
 
Web reputation per le organizzazioni non profit
Web reputation per le organizzazioni non profitWeb reputation per le organizzazioni non profit
Web reputation per le organizzazioni non profit
Claudio Tancini
 
Informatica Solidale Dicembre 2018
Informatica Solidale Dicembre 2018Informatica Solidale Dicembre 2018
Informatica Solidale Dicembre 2018
Claudio Tancini
 
Informatica solidale ottobre 2018 v0.1
Informatica solidale ottobre 2018 v0.1Informatica solidale ottobre 2018 v0.1
Informatica solidale ottobre 2018 v0.1
Claudio Tancini
 
Workshop civicrm
Workshop civicrmWorkshop civicrm
Workshop civicrm
Claudio Tancini
 
Il percorso per la adozione del codice etico per i Professionisti IT
Il percorso per la adozione del codice etico per i Professionisti ITIl percorso per la adozione del codice etico per i Professionisti IT
Il percorso per la adozione del codice etico per i Professionisti IT
Claudio Tancini
 
Help3 presentazione al convegno e geh’17 desio 10-07-2017
Help3 presentazione al convegno e geh’17   desio 10-07-2017Help3 presentazione al convegno e geh’17   desio 10-07-2017
Help3 presentazione al convegno e geh’17 desio 10-07-2017
Claudio Tancini
 
Combattere concretamente il Digital Divide attraverso l’Impegno Sociale
Combattere concretamente il Digital Divide attraverso l’Impegno SocialeCombattere concretamente il Digital Divide attraverso l’Impegno Sociale
Combattere concretamente il Digital Divide attraverso l’Impegno Sociale
Claudio Tancini
 
Social network-per-il-non-profit
Social network-per-il-non-profitSocial network-per-il-non-profit
Social network-per-il-non-profit
Claudio Tancini
 
The New Reality: Being a Responsible Computing Professional requires more tha...
The New Reality: Being a Responsible Computing Professional requires more tha...The New Reality: Being a Responsible Computing Professional requires more tha...
The New Reality: Being a Responsible Computing Professional requires more tha...
Claudio Tancini
 
Etica e Informatica
Etica e InformaticaEtica e Informatica
Etica e Informatica
Claudio Tancini
 
EthosIT- Introduzione
EthosIT- IntroduzioneEthosIT- Introduzione
EthosIT- Introduzione
Claudio Tancini
 
Ethos it kick off 28 settembre 2016
Ethos it kick off 28 settembre 2016Ethos it kick off 28 settembre 2016
Ethos it kick off 28 settembre 2016
Claudio Tancini
 
Open source e cloud per il non profit - settembre 2016 -
Open source e cloud per il non profit - settembre 2016 -Open source e cloud per il non profit - settembre 2016 -
Open source e cloud per il non profit - settembre 2016 -
Claudio Tancini
 
Informatica solidale IoT and social development_may 2016_v0
Informatica solidale IoT and social development_may  2016_v0Informatica solidale IoT and social development_may  2016_v0
Informatica solidale IoT and social development_may 2016_v0
Claudio Tancini
 

More from Claudio Tancini (20)

Presenti in rete workshop wordpress novembre 2019 v1.0
Presenti in rete workshop wordpress novembre 2019 v1.0Presenti in rete workshop wordpress novembre 2019 v1.0
Presenti in rete workshop wordpress novembre 2019 v1.0
 
Cooperazione internazionale help3 - knowledge transfer
Cooperazione internazionale   help3 - knowledge transferCooperazione internazionale   help3 - knowledge transfer
Cooperazione internazionale help3 - knowledge transfer
 
Informatica solidale settembre 2019
Informatica solidale settembre 2019Informatica solidale settembre 2019
Informatica solidale settembre 2019
 
Help3&Informatica Solidale - knowledge transfer for international cooperation...
Help3&Informatica Solidale - knowledge transfer for international cooperation...Help3&Informatica Solidale - knowledge transfer for international cooperation...
Help3&Informatica Solidale - knowledge transfer for international cooperation...
 
Help3 Project - knowledge transfer tools
Help3  Project - knowledge transfer toolsHelp3  Project - knowledge transfer tools
Help3 Project - knowledge transfer tools
 
La importanza di un codice etico per i professionisti ict giugno 2019
La importanza di un codice etico per i professionisti ict giugno 2019La importanza di un codice etico per i professionisti ict giugno 2019
La importanza di un codice etico per i professionisti ict giugno 2019
 
Web reputation per le organizzazioni non profit
Web reputation per le organizzazioni non profitWeb reputation per le organizzazioni non profit
Web reputation per le organizzazioni non profit
 
Informatica Solidale Dicembre 2018
Informatica Solidale Dicembre 2018Informatica Solidale Dicembre 2018
Informatica Solidale Dicembre 2018
 
Informatica solidale ottobre 2018 v0.1
Informatica solidale ottobre 2018 v0.1Informatica solidale ottobre 2018 v0.1
Informatica solidale ottobre 2018 v0.1
 
Workshop civicrm
Workshop civicrmWorkshop civicrm
Workshop civicrm
 
Il percorso per la adozione del codice etico per i Professionisti IT
Il percorso per la adozione del codice etico per i Professionisti ITIl percorso per la adozione del codice etico per i Professionisti IT
Il percorso per la adozione del codice etico per i Professionisti IT
 
Help3 presentazione al convegno e geh’17 desio 10-07-2017
Help3 presentazione al convegno e geh’17   desio 10-07-2017Help3 presentazione al convegno e geh’17   desio 10-07-2017
Help3 presentazione al convegno e geh’17 desio 10-07-2017
 
Combattere concretamente il Digital Divide attraverso l’Impegno Sociale
Combattere concretamente il Digital Divide attraverso l’Impegno SocialeCombattere concretamente il Digital Divide attraverso l’Impegno Sociale
Combattere concretamente il Digital Divide attraverso l’Impegno Sociale
 
Social network-per-il-non-profit
Social network-per-il-non-profitSocial network-per-il-non-profit
Social network-per-il-non-profit
 
The New Reality: Being a Responsible Computing Professional requires more tha...
The New Reality: Being a Responsible Computing Professional requires more tha...The New Reality: Being a Responsible Computing Professional requires more tha...
The New Reality: Being a Responsible Computing Professional requires more tha...
 
Etica e Informatica
Etica e InformaticaEtica e Informatica
Etica e Informatica
 
EthosIT- Introduzione
EthosIT- IntroduzioneEthosIT- Introduzione
EthosIT- Introduzione
 
Ethos it kick off 28 settembre 2016
Ethos it kick off 28 settembre 2016Ethos it kick off 28 settembre 2016
Ethos it kick off 28 settembre 2016
 
Open source e cloud per il non profit - settembre 2016 -
Open source e cloud per il non profit - settembre 2016 -Open source e cloud per il non profit - settembre 2016 -
Open source e cloud per il non profit - settembre 2016 -
 
Informatica solidale IoT and social development_may 2016_v0
Informatica solidale IoT and social development_may  2016_v0Informatica solidale IoT and social development_may  2016_v0
Informatica solidale IoT and social development_may 2016_v0
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

Presentazione progetto "Secure the People"

  • 2. Overview SECURE THE PEOPLE is a specialized company in the New Information and Communication Technologies. We assist Companies and Individuals to achieve their objectives by methods based on the protection of people and property, marketing communication and optimization of IT resources. Our objective Our objective is to accompany you in your growth by helping you meet your challenges with the 3S strategy we have in place: 1. Electronic Security 2. Safety Marketing 3. Information Security
  • 3. Working Principles Our principle of work is exclusively based on the quality approach. Our quality goal is to offer our customers services that meet all of their expectations by providing: 1. A SERVICE organization and adapting to specific requirements, 2. Respect for benefits in the price and negotiated deadlines, 3. COMPETITIVENESS its offering through innovation, technical choices and cost control, 4. The safety of people and respect for the environment.
  • 4. Vision, Mission & Values The SECURE THE PEOPLE Vision is to be known and recognized company on its business activities as the preferred reference for businesses and individuals through monitoring based on the quality of the service offered. SECURE THE PEOPLE is a business relationship based on trust to a strategic partnership and sustainable 3S with its customers. Our mission is to provide all public companies and organizations, whatever their size, professional service, unmatched by providing the best security solutions available. Innovative solutions based on their needs and meet their expectations in respect of security. The SECURE THE PEOPLE values based on: Quality, Efficiency, Safety, Respect.
  • 5. The project idea  The choice of these services is closely related to my professional experience, the needs of companies in terms of general safety equipment and especially to a growing market.  Indeed, we are a service company specializing in the installation, maintenance and sale of equipment and surveillance system, computer service and communication via sms.  Finally, the security market is booming in Ivory Coast, especially after the events of the post-election crisis of 2010 and the will of the government to make the Ivory Coast an emerging country by 2020. We want to bring our expertise in new technologies of information and communication for the emerging building our country
  • 6. OUR SERVICES  ELECTRONIC SECURITY We provide electronic security services in the area: • CCTV IP cameras and analog • Burglar and transmission of SMS alerts alarm • GPS geolocation • access control fingerprint and badges • the electrified fence and barbed • fire safety
  • 7.  Security Marketing We make available to our customers as part of the security Marketing, our SMS sending platform and our lead bank to enable them to make the communication oriented on target, directly affect their prospects and reach their objective. Finally, our web shopping center is the first in West Africa or our customers, various vendors will open a shop to sell and buy easily online all their products safely.
  • 8.  Security Marketing We provide all IT services for installation, maintenance, and development of all IT architectures. So we come to the setting up of servers, networks, backups, databases, etc.
  • 9. In order to ensure the efficiency of our products and the efficiency of our services, we look to the leaders of our various sectors. We include: Our suppliers and brands
  • 10. In order to ensure quality service standards in force in our country, our team is composed of industry professionals. We organize départemant with well-defined responsibilities and an evolving career profile. We have:  Branch with head and his Assistant Manager  IT Reponsable and his Assistant  The Finance Manager and Assistant  The Technical Manager and 05 technicians  The Sales Manager and 10 Commercial In order to participate in the policy of employability, We are the first company to integrate directly into our administration graduates without experience to make a career with them following a well defined job profile. Our team
  • 11. After a market study in the year 2015, we reached these conclusions. electronic security services, marketing and IT are luxuries reserved for large enterprises, institutions and large households. These services are only present in the economic capital of Ivory Coast. So therefore we data for client objectives touching only small and medium enterprises and institutions, small households. Our focus remains untapped field by other competitors in 60 other cities of Ivory Coast. Our Clients
  • 12. Any launch of a service requires a good marketing plan. So SECURE THE PEOPLE, to ensure the durability of its services after market studies has acquired the marketing mix plan: Marketing plan
  • 13. Business plan Our business plan focuses on current standards. According to figures of simulations, we achieved:  Our sales target is: 3,600,000 FCFA / month  Our monthly expense is: 1,250,000 FCFA / month  Our monthly income is: 2,350,000 These figures allow us to ensure project perenity and make a successful fiscal year to reinvest for growth.
  • 14. Progress of the Project Our project in its implementation will be as follows:  Prospecting for business  The technical study  The proposal of the quote  Payment of 60% of the quotation by the customer  The development of the execution plan Work  Delivery of construction  The recovery of the remaining 40%  Monitoring NB: The communication between us and the customers and suppliers will not be done by email and phone call.
  • 15. Launch of activities and results From the beginning of this year 2016, we started our activities in the informal with a group of 4 people. We worked in our homes, for Internet, churches and we have had positive results. With this result, we have taken steps to break the informal that is to say to be born now and work. Since the beginning of our activities, we had 06 customers and make a profit of 360,000 FCFA. We can do better, once organized into business in a room with working equipment.
  • 16. Our needs Facing our growing desire to realize our dream while providing quality service in key areas of our business, we began to seek funding. Our needs today are not funding in large amounts, but the possibility for us to open a local, to put the work materials. Indeed we need:  06 months of rent paid  17 computers  02 printers  02 scanners  4 offices (tables and chairs)  Office Supplies  Benches, tables, etc. Wholesale our opening of our local budget and Operating method amounted to 4,350,000 FCFA We are open for any help to finance the said project.
  • 17. To know us more We invite you to visit our internet presence:  website: www.securethepeople.hebfree.org  Online Shop: www.securethepeople.hebfree.org/shop/ We are currently building our digital identity.