Live Demo Session: Unified Infotech PVT LTD
Live Demo Session: Unified Infotech PVT LTD
Live Demo Session: Unified Infotech PVT LTD
2
Achievements
3
Awards
4
Our Services
For 10+ years now, we’ve mastered the top web and mobile technologies to deliver projects that have raked in investments.
A trusted market leader in developing high performing web fronts for every business
5
Similar Project Handled
By Unified Infotech
Link: https://www.londonrag.com/
6
Similar Project Handled
By Unified Infotech
Link: https://uat.appellation.io/
7
Designing of B2B Portal
8
Designing of B2B Portal
9
Designing of B2B Portal
10
Designing of B2B Portal
11
Designing of B2B Portal
12
Proposed Home Page Mockup
13
Link: https://projects.invisionapp.com/share/URZW7CZYC5F#/screens/442072399_CFTI_AGRA_HOME_PAGE
Proposed Home Page Mockup
14
Link: https://projects.invisionapp.com/share/URZW7CZYC5F#/screens/442072399_CFTI_AGRA_HOME_PAGE
Proposed Home Page Mockup
15
Proposed Home Page Mockup
16
Link: https://projects.invisionapp.com/share/URZW7CZYC5F#/screens/442072399_CFTI_AGRA_HOME_PAGE
Proposed Home Page Mockup
17
Link: https://projects.invisionapp.com/share/URZW7CZYC5F#/screens/442072399_CFTI_AGRA_HOME_PAGE
Development of B2B Portal
18
Development of B2B Portal
Seller Functionality
Link: https://www.xmind.net/m/XrrCTi/
19
Development of B2B Portal
Admin Functionality
Link: https://www.xmind.net/m/6p3QYW/
20
Development of B2B Portal
Technology Stack
21
Hosting of B2B Portal
For Security:
• RAID
• Backup Server
• SSL enabled with 256 bits encryption
• Firewall & Antimalware installation (Free Version)
• Source code of the B2B website & app will be property of CFTI Agra.
22
Maintenance of B2B Portal
Unified will give maintenance support of B2B portal which will start from post Go-Live Date, which may be further
extended on mutual agreement.
Daily check of the website and all pages to ensure they are opening properly and confirming the same through e-
mail daily.
Prompt rectification of bugs in the web application within 24 hours of identification of the same.
Rectification and treatment of virus and malware within 48 hours of affecting the web application.
Find technical & functional errors in the web applications and removing them.
Find all non-operative functions in the web applications and make them operative.
Monthly checking of the web application for dead links and functional bottleneck.
Monthly back-up and archiving of the entire database and content of the website and applications.
Providing a semi-annual backup to the entire web application.
Technical support for any server related issues or problems and coordination with server service providers.
23
Maintenance of B2B Portal
Downtime and related Maintenance Support :
Unified Infotech and Support Team will take 12 to 24 hrs to response and allocate
resources to recover and start fixing any downtime after being reported by concerned
authorities or stakeholders by email or phone call to Unified Infotech. This support will
continue till AMC contract for the proposed solution ends.
• Support Team doesn’t response to issue raised within 24 hrs after email or phone call.
• Support Team is not responding further for 24 hrs after resolution process initiated but
still not resolved.
Please find escalation matrix to be followed which starts from contacting person from Level 1 to Level 3 maintaining
waiting time mentioned against each.
24
Digital Marketing Strategy for B2B Portal
• Utilize (and keep building) your email list. Even in a brick-and-mortar store,
it’s important to have a strong email marketing strategy. Collect as many
email addresses as you can customers, prospective customers, people
interested in your events, etc. When you launch, you’ll be able to send an
email to all of those people letting them know that they can visit your store
online.
• Boost your organic social presence. With your online business, you’ll want
to take every opportunity to boost your digital engagement. One of the
easiest and most effective ways is to give a little extra love to your social
media channels, and make sure they’re stocked with vibrant images and
engaging videos.
25
Digital Marketing Strategy for B2B
Portal
• Optimize your site for SEO. Search engine optimization (SEO)
encompasses many things, and trying to optimize can lead you down
a deep, deep rabbit hole. Here are a few things to keep in mind if
you’re just starting out.
• Create interesting, useful content. Creating great content for people
looking to buy your product is a great way to bring traffic to your site
and provide helpful information that positions your brand as an
authoritative voice in your vertical.
• Try out Google Ads. Using Google Ads for search engine marketing
gives you an opportunity to bid on keywords, so that you can show
up first in search engine results pages. Getting the coveted “top spot”
is what search engine optimization is all about — but, a head’s
up, Google Ads will still show up first.
26
Digital Marketing Strategy for B2B Portal
27
Digital Marketing Strategy for B2B Portal
• Usability
• Security
• Agility
• Availability
• Reliability
• Performance
Our proposed solution will focus on following things with respect to customers and finance perspective
• Implementation of Test Cases: Every test is specified by a document setting out the conditions of implementation, test inputs
and expected results. Each test case will have its associated test procedure with instructions for performing the test and
depending on the type of test this procedure should be expressed as a web test.
• Installation Manual: This document provides the necessary instructions for installing the product.
• Support Material for End Users: This document contains instructions for using the product according to different user
profiles.
• The Source Code of the Solution: This will be submitted in draft or final solution form.
• Product: The file of the solution will be packaged using the appropriate mechanisms to facilitate their installation.
• Training: General Training Plan for will be provided by Unified Infotech.
30
Website Additional Security Features
Unified Infotech will follow security standards as proposed by Open Web Application Security Project (OWASP). Few of the
important points for which Unified Infotech will take all measures to take care of:
• Injection: Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as
part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing
data without proper authorization.
• Broken Authentication: Application functions related to authentication and session management are often implemented incorrectly,
allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other
users’ identities temporarily or permanently
• Sensitive Data Exposure: Many web applications and APIs do not properly protect sensitive data, such as financial, healthcare, and
PII. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive
data may be compromised without extra protection, such as encryption at rest or in transit, and requires special precautions when
exchanged with the browser.
• XML External Entities (XXE): Many older or poorly configured XML processors evaluate external entity references within XML
documents. External entities can be used to disclose internal files using the file URI handler, internal file shares, internal port
scanning, remote code execution, and denial of service attacks.
• Broken Access Control: Restrictions on what authenticated users are allowed to do are often not properly enforced. Attackers can
exploit these flaws to access unauthorized functionality and/or data, such as access other users' accounts, view sensitive files,
modify other users’ data, change access rights, etc.
31
Website Additional Security Features
• Security Miss-configuration: Security miss-configuration is the most commonly seen issue. This is commonly a result of insecure
default configurations, incomplete or ad hoc configurations, open cloud storage, miss-configured HTTP headers, and verbose error
messages containing sensitive information. Not only must all operating systems, frameworks, libraries, and applications be securely
configured, but they must be patched and upgraded in a timely fashion.
• Cross-Site Scripting (XSS): XSS flaws occur whenever an application includes untrusted data in a new web page without proper
validation or escaping or updates an existing web page with user-supplied data using a browser API that can create HTML or
JavaScript. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or
redirect the user to malicious sites.
• Insecure Deserialization: Insecure deserialization often leads to remote code execution. Even if deserialization flaws do not result in
remote code execution, they can be used to perform attacks, including replay attacks, injection attacks, and privilege escalation
attacks.
• Using Components with Known Vulnerabilities: Components, such as libraries, frameworks, and other software modules, run with
the same privileges as the application. If a vulnerable component is exploited, such an attack can facilitate serious data loss or
server takeover. Applications and APIs using components with known vulnerabilities may undermine application defences and
enable various attacks and impacts.
• Insufficient Logging & Monitoring: Insufficient logging and monitoring, coupled with missing or ineffective integration with
incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or
destroy data. Most breach studies show time to detect a breach is over 200 days, typically detected by external parties rather than
internal processes or monitoring.
32
Application Security and Risk to be considered
33
Application Compliances
STQC
Unified Infotech will maintain Standardisation Testing and Quality Certification (STQC) for proposed application to
developed. Standardisation Testing and Quality Certification (STQC)Directorate is an attached office of the Ministry of
Electronics and Information Technology, Government of India, provides quality assurance services in the area of Electronics
and IT through countrywide network of laboratories and centres. The services include Testing, Calibration, IT & e-Governance,
Training and Certification to public and private organizations.
In the area of IT & e-Governance, STQC provides Quality assurance services for Software testing, Information Security and IT
Service Management by conducting testing, training, audit and certifications.
Web Content Accessibility Guidelines (WCAG) standard is how to make web content more accessible to people with
disabilities. Web “content” generally refers to the information in a web page or web application, including:
34
THANK
YOU!
Our Location
INDIA
USA