Live Demo Session: Unified Infotech PVT LTD

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 35

Design & Development, Hosting, Maintenance and Marketing for E-commerce (B2B) Portal

Central Footwear Training Institute, Agra

Tender No. CFTI/Admin 3(30)/2020-21/143, Dated: 18.12.2021

Live Demo Session

Unified Infotech Pvt Ltd


Company Profile
Empowering Businesses Globally

2
Achievements

Unified Infotech is an Award Winning technology company,


that plan, design and develops sophisticated digital solutions
that fuels business efficiency, through a combination of design
thinking approach coupled with the latest technologies.

From 2010, we are committed to achieving and pushing the


level of performance at all times. Leveraging the power of
technology, we deliver end-to-end solutions for multi-million
dollar funded start-ups to small and medium enterprises. Art and
culture inspire us too, and our office presence at New York and
Kolkata is a true reflection.

3
Awards

Unified Infotech is an Award Winning technology company


working with Fortune 500’s, Enterprises, Government
Agencies, SME’s and forward-thinking Start-Ups around the
globe as their end-to-end solution partners for custom-
tailored web, mobile app, and cloud application and digital
marketing solutions.

4
Our Services

For 10+ years now, we’ve mastered the top web and mobile technologies to deliver projects that have raked in investments.
A trusted market leader in developing high performing web fronts for every business

Web Development Mobile Apps Consulting


 Web App  Enterprise
 iOS
 Web Design  Startup
 Android
 PWA  Government Projects
 React
 Enterprise Mobility

5
Similar Project Handled
By Unified Infotech

London Rag: E-marketplace for range of women's clothing,


footwear and accessories, from the latest trends in fashion
worldwide.

Link: https://www.londonrag.com/

6
Similar Project Handled
By Unified Infotech

Appellation: Premium Wine Marketplace connecting


Producers, Retailers, Wholesalers, Importers and Buyers,
it has functionality to cover several rules and regulation
applicable for the seller and buyerbased on the
state/locations.

Link: https://uat.appellation.io/

7
Designing of B2B Portal

1. Strategy Workshop - Bringing Alignment

Whether creating a new product from scratch or revamping


current experience, we work as a UX UI consultant to have a
collaborative approach involving key stakeholders to get
everybody’s knowledge and understanding of the project. This
brings alignment in terms of end-user persona and business
needs.

8
Designing of B2B Portal

2. Defining User Persona - Knowing the users first

To understand your requirements better, we create detailed user


personas to define your audiences. We believe it is a crucial
responsibility as a leading UX UI design agency. Then, we devise the
outcome to do further qualitative and quantitative research and
analytics.

9
Designing of B2B Portal

3. Empathy Mapping - Walking into users’ shoes

The benefits of doing empathy mapping are manifold. We believe it


removes bias from our designs and aligns the team on a single, shared
understanding of the user’s empathy like what they head, see, do, or
listen. We then discover weaknesses in our research, uncovers user
needs that the user themselves may not even be aware of, understand
what drives users’ behaviors which finally guide us towards

10
Designing of B2B Portal

4. Mind Mapping and Card Sorting - Divergence to Convergence

This is the step where we involve product owners, developers,


managers and finally, designers to throw every data we’ve collected on
the wall. We then group each of them on sticky notes/cards. The sorted
map should have similar and related components of an application in
chunks giving us a base to form a menu structure from a high-level
view. The Result? A seamless UX that is approved by everyone.

11
Designing of B2B Portal

5. Architecting Information - Building the application map


Information Architecture helps us in creating a plan that prevents
findability and usability disasters - leading to costly redesigns. This is
why incorporate Information Architecture a.k.a. IA is a huge part of
our UX UI design services. It helps us to focus on organizing,
structuring, and effectively labeling content so that users find
information and complete intended tasks.

12
Proposed Home Page Mockup

13

Link: https://projects.invisionapp.com/share/URZW7CZYC5F#/screens/442072399_CFTI_AGRA_HOME_PAGE
Proposed Home Page Mockup

14

Link: https://projects.invisionapp.com/share/URZW7CZYC5F#/screens/442072399_CFTI_AGRA_HOME_PAGE
Proposed Home Page Mockup

15
Proposed Home Page Mockup

16

Link: https://projects.invisionapp.com/share/URZW7CZYC5F#/screens/442072399_CFTI_AGRA_HOME_PAGE
Proposed Home Page Mockup

17

Link: https://projects.invisionapp.com/share/URZW7CZYC5F#/screens/442072399_CFTI_AGRA_HOME_PAGE
Development of B2B Portal

Link Buyer Functionality


Link: https://www.xmind.net/m/LBUADF/

18
Development of B2B Portal

Seller Functionality
Link: https://www.xmind.net/m/XrrCTi/

19
Development of B2B Portal

Admin Functionality
Link: https://www.xmind.net/m/6p3QYW/

20
Development of B2B Portal

Technology Stack

21
Hosting of B2B Portal

Dedicated Cloud based sever:


• 8-16 GB RAM
• 2-4 Core Processor
• Storage 80-200 GB SSD
• 4 TB Data Transfer

For Security:
• RAID
• Backup Server
• SSL enabled with 256 bits encryption
• Firewall & Antimalware installation (Free Version)
• Source code of the B2B website & app will be property of CFTI Agra.

22
Maintenance of B2B Portal

Unified will give maintenance support of B2B portal which will start from post Go-Live Date, which may be further
extended on mutual agreement.

 Daily check of the website and all pages to ensure they are opening properly and confirming the same through e-
mail daily.
 Prompt rectification of bugs in the web application within 24 hours of identification of the same.
 Rectification and treatment of virus and malware within 48 hours of affecting the web application.
 Find technical & functional errors in the web applications and removing them.
 Find all non-operative functions in the web applications and make them operative.
 Monthly checking of the web application for dead links and functional bottleneck.
 Monthly back-up and archiving of the entire database and content of the website and applications.
 Providing a semi-annual backup to the entire web application.
 Technical support for any server related issues or problems and coordination with server service providers.

23
Maintenance of B2B Portal
Downtime and related Maintenance Support :
 
Unified Infotech and Support Team will take 12 to 24 hrs to response and allocate
resources to recover and start fixing any downtime after being reported by concerned
authorities or stakeholders by email or phone call to Unified Infotech. This support will
continue till AMC contract for the proposed solution ends.

Contact Details of Support Team:


Email: contacts@unifiedinfotech.net
Contact No.: +91 (33)-4060-2205

Support Escalation and Resolution Mechanism :


 
Support Escalation starts upon below mentioned conditions

• Support Team doesn’t response to issue raised within 24 hrs after email or phone call.
• Support Team is not responding further for 24 hrs after resolution process initiated but
still not resolved.

Please find escalation matrix to be followed which starts from contacting person from Level 1 to Level 3 maintaining
waiting time mentioned against each.
24
Digital Marketing Strategy for B2B Portal

• Utilize (and keep building) your email list. Even in a brick-and-mortar store,
it’s important to have a strong email marketing strategy. Collect as many
email addresses as you can customers, prospective customers, people
interested in your events, etc. When you launch, you’ll be able to send an
email to all of those people letting them know that they can visit your store
online.
• Boost your organic social presence. With your online business, you’ll want
to take every opportunity to boost your digital engagement. One of the
easiest and most effective ways is to give a little extra love to your social
media channels, and make sure they’re stocked with vibrant images and
engaging videos.

25
Digital Marketing Strategy for B2B
Portal
• Optimize your site for SEO. Search engine optimization (SEO)
encompasses many things, and trying to optimize can lead you down
a deep, deep rabbit hole. Here are a few things to keep in mind if
you’re just starting out.
• Create interesting, useful content. Creating great content for people
looking to buy your product is a great way to bring traffic to your site
and provide helpful information that positions your brand as an
authoritative voice in your vertical.
• Try out Google Ads. Using Google Ads for search engine marketing
gives you an opportunity to bid on keywords, so that you can show
up first in search engine results pages. Getting the coveted “top spot”
is what search engine optimization is all about — but, a head’s
up, Google Ads will still show up first.  
26
Digital Marketing Strategy for B2B Portal

 Advertise on social platforms, Social media is a great place to focus ad spending


because you know people are spending time on social platforms. If you were
going to buy a billboard, which road would be the best one to put it on? Think
about social media advertising like this, too. If your audience spends a lot of time
on Instagram but not Twitter, you’ll want to focus your spending on Instagram.
 Partner with complementary brands. Create partnerships with other brands to
cross-promote. Find a business with a similar target audience, but a
complementary product. That way, each business partner is reaching a whole new
yet relevant audience. For example, if you sell outdoor gear, a relevant partnership
could be with a brand focused on hiking shoes.

27
Digital Marketing Strategy for B2B Portal

• Participate in online events and discussions. As online communication and


events surge, there may be opportunities to increase brand awareness with
target communities. Leverage your expertise by participating in webinars or
virtual conferences to get the word out about your business.
• Consider using influencer marketing. Influencers are people who have large
online audiences, and have the power to “influence” that audience’s
purchasing behaviour. Working with the right influencer can get your product in
front of a huge number of potential customers, increasing your brand
awareness. To make the best use of influencer marketing, make sure your
targeted influencer’s following aligns with your target audience, and that their
values align with your brand. Common influencer marketing tactics include an
influencer writing a blog post about your product, posting social media content
reviewing or demonstrating your product, or talking about your product at an
28
event.
Proposed USP of B2B portal
Unified Infotech has grown beyond the geographical boundaries with presence in Kolkata, India and New York City, USA and
hence, brings international skill-sets and industry best practices as value additions. We will secure following things as per
Development & technology perspective.

• Usability
• Security
• Agility
• Availability
• Reliability
• Performance

Our proposed solution will focus on following things with respect to customers and finance perspective

• Revenue and Profitability


• Brand recognition
• Customer loyalty
• Customer retention
• Share of wallet
• Cross-selling ratio
• Customer satisfaction
29
Additional Deliverables with software

• Implementation of Test Cases: Every test is specified by a document setting out the conditions of implementation, test inputs
and expected results. Each test case will have its associated test procedure with instructions for performing the test and
depending on the type of test this procedure should be expressed as a web test.
• Installation Manual: This document provides the necessary instructions for installing the product.
• Support Material for End Users: This document contains instructions for using the product according to different user
profiles.
• The Source Code of the Solution: This will be submitted in draft or final solution form.
• Product: The file of the solution will be packaged using the appropriate mechanisms to facilitate their installation.
• Training: General Training Plan for will be provided by Unified Infotech.

30
Website Additional Security Features
Unified Infotech will follow security standards as proposed by Open Web Application Security Project (OWASP). Few of the
important points for which Unified Infotech will take all measures to take care of:

• Injection: Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as
part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing
data without proper authorization.
• Broken Authentication: Application functions related to authentication and session management are often implemented incorrectly,
allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other
users’ identities temporarily or permanently
• Sensitive Data Exposure: Many web applications and APIs do not properly protect sensitive data, such as financial, healthcare, and
PII. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive
data may be compromised without extra protection, such as encryption at rest or in transit, and requires special precautions when
exchanged with the browser.
• XML External Entities (XXE): Many older or poorly configured XML processors evaluate external entity references within XML
documents. External entities can be used to disclose internal files using the file URI handler, internal file shares, internal port
scanning, remote code execution, and denial of service attacks.
• Broken Access Control: Restrictions on what authenticated users are allowed to do are often not properly enforced. Attackers can
exploit these flaws to access unauthorized functionality and/or data, such as access other users' accounts, view sensitive files,
modify other users’ data, change access rights, etc.
31
Website Additional Security Features

• Security Miss-configuration: Security miss-configuration is the most commonly seen issue. This is commonly a result of insecure
default configurations, incomplete or ad hoc configurations, open cloud storage, miss-configured HTTP headers, and verbose error
messages containing sensitive information. Not only must all operating systems, frameworks, libraries, and applications be securely
configured, but they must be patched and upgraded in a timely fashion.
• Cross-Site Scripting (XSS): XSS flaws occur whenever an application includes untrusted data in a new web page without proper
validation or escaping or updates an existing web page with user-supplied data using a browser API that can create HTML or
JavaScript. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or
redirect the user to malicious sites.
• Insecure Deserialization: Insecure deserialization often leads to remote code execution. Even if deserialization flaws do not result in
remote code execution, they can be used to perform attacks, including replay attacks, injection attacks, and privilege escalation
attacks.
• Using Components with Known Vulnerabilities: Components, such as libraries, frameworks, and other software modules, run with
the same privileges as the application. If a vulnerable component is exploited, such an attack can facilitate serious data loss or
server takeover. Applications and APIs using components with known vulnerabilities may undermine application defences and
enable various attacks and impacts.
• Insufficient Logging & Monitoring: Insufficient logging and monitoring, coupled with missing or ineffective integration with
incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or
destroy data. Most breach studies show time to detect a breach is over 200 days, typically detected by external parties rather than
internal processes or monitoring.
32
Application Security and Risk to be considered

33
Application Compliances
STQC

Unified Infotech will maintain Standardisation Testing and Quality Certification (STQC) for proposed application to
developed. Standardisation Testing and Quality Certification (STQC)Directorate is an attached office of the Ministry of
Electronics and Information Technology, Government of India, provides quality assurance services in the area of Electronics
and IT through countrywide network of laboratories and centres. The services include Testing, Calibration, IT & e-Governance,
Training and Certification to public and private organizations.
 
In the area of IT & e-Governance, STQC provides Quality assurance services for Software testing, Information Security and IT
Service Management by conducting testing, training, audit and certifications.

Web Content Accessibility Guidelines (WCAG)

Web Content Accessibility Guidelines (WCAG) standard is how to make web content more accessible to people with
disabilities. Web “content” generally refers to the information in a web page or web application, including:

• Natural information such as text, images, and sounds


• Code or markup that defines structure, presentation, etc.

34
THANK
YOU!
Our Location

INDIA

DN 53, Salt Lake City, Sec V, Kolkata-700091


+91 9874300880
contacts@unifiedinfotech.net

USA

79 Madison Avenue, New York, NY 10016


+1 (800)-820-9286 
contacts@unifiedinfotech.net

You might also like