Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 58

CONTENT

Chapter Topic Page


No. No.

1 INTRODUCTION TO MARKETING
MANAGEMENT OF OSWAL SOAP COMPANY

1.1 INTRODUCTION

1.1.1 Definition

1.1.2

1.2

2 CYBERTHREATS AND MORE ABOUT


CYBERSECURITY

2.1 TYPES OF CYBER THREATS

2.2 CYBERSECURITY MYTHS

2.3 KEY CYBERSECURITY PRACTICES

2.4 CYBER SECURITY TIPS

2.5 CIA TRIAD

2.5.1 Confidentiality

2.5.2 Integrity

2.5.3 Availability

2.6 PRINCIPLES OF CYBERSECURITY

2.7 ADVANTAGES OF CYBERSECURITY


2.8 DISADVANTAGES OF CYBERSECURITY

3 CYBERSECURITY COMPANIES AND ITS


PRACTICES IN IT SECTOR

3.1 PALO ALTO NETWORKS

3.2 FORTINET

3.3 CISCO

3.4 CROWDSTRIKE

3.5 ZSCALER

4 IMPACT AND IMPLICATIONS OF


CYBERSECURITY IN IT SECTOR

4.1 IMPACTS OF CYBERSECURITY ATTACKS


IN IT SECTOR

4.1.1 Six Ways Cybercrime Impacts Business And The


IT Sector
4.1.2 Economic Cost of Cyber Attacks

4.1.3 Reputational Damage

4.1.4 Legal Consequences of A Cyber Breach

4.1.5 What is At Risk?

4.2 IMPLICATIONS OF CYBER SECURITY

4.3 IMPLICATIONS OF EMERGING


TECHNOLOGY ON CYBERSECURITY
5 CONCLUSION AND SUGGESTIONS

5.1 CONCLUSION AND SUGGESTIONS

5.1.1 CONCLUSION AND FINDINGS

5.1.2 SUGGESTIONS

5.2 SCOPE OF FURTHER STUDY

BIBLIOGRAPHY
CHAPTER 1

INTRODUCTION TO MARKETING MANAGEMENT OF


 INTRODUCTION
OSWAL SOAP COMPANY

 MARKETING STRATEGIES AT OSWAL SOAP


COMPANY

 MARKETING MANAGEMENT CHALLENGES


FACED BY OSWAL SOAP COMPANY

1.1 INTRODUCTION

1.1.1 DEFINTION OF MARKETING MANAGEMENT:


Marketing management is the process of planning, organizing, directing, and
controlling an organization's marketing activities. It involves the analysis of market
trends and customer behavior, the development of marketing strategies and campaigns,
and the implementation of tactics to promote and sell products or services. Marketing
management also includes the allocation of resources, setting targets and goals, and
evaluating the effectiveness of marketing efforts. Overall, it aims to maximize the
organization's market share and profitability by meeting the needs and wants of
customers.

1.1.2 MARKETING MANAGEMENT OF OSWAL SOAP COMPANY:

The marketing management of Oswal Soap Company involves various activities to


promote and sell its soap products. This includes analyzing market trends and customer
behavior to understand the demand for different types of soaps, such as beauty soaps,
medicated soaps, and herbal soaps. The company also develops marketing strategies
and campaigns to position its products effectively in the market and differentiate them
from competitors.

The marketing team at Oswal Soap Company implements tactics such as advertising,
promotions, and social media marketing to reach its target audience and increase brand
awareness. They also work on product packaging, pricing, and distribution to ensure
that the soaps are easily accessible to customers.

In addition, the marketing management of Oswal Soap Company involves allocating


resources for marketing activities, setting sales targets and goals, and evaluating the
effectiveness of marketing efforts through sales data and customer feedback. By
focusing on meeting the needs and wants of customers, the company aims to maximize
its market share and profitability in the soap industry.

1.2 MARKETING STRATEGIES AT OSWAL SOAP COMPANY


The marketing strategies of Oswal Soap Company include:

1. MARKET SEGMENTATION:

Market segmentation is a marketing strategy that divides a target market into smaller
groups that share similar characteristics. The company identifies different market
segments based on factors such as age, gender, and skin type to tailor its products and
marketing efforts to specific customer needs.

2. PRODUCT DIFFERENTIATION:

Product differentiation is a marketing strategy that distinguishes a product or service


from others in the market. The goal is to make the product more attractive to a target
market. Oswal Soap Company focuses on creating unique selling propositions for its
soap products, highlighting their benefits and features to stand out from competitors.

3. BRAND POSITIONING:

The company positions its soap products as high-quality, affordable, and effective
solutions for various skin care needs, leveraging its brand reputation and customer
loyalty.

4. INTEGRATED MARKETING COMMUNICATIONS:

Oswal Soap Company uses a mix of advertising, promotions, public relations, and
social media marketing to create a consistent brand message and reach a wider
audience.

5. PRICING STRATEGY:

The company sets competitive prices for its soap products, considering factors such as
production costs, competitor pricing, and customer willingness to pay.
6. DISTRIBUTION CHANNELS:

Oswal Soap Company ensures that its soap products are available through various
distribution channels, including supermarkets, pharmacies, and online retailers, to
maximize accessibility for customers.

7. CUSTOMER RELATIONSHIP MANAGEMENT:

The company focuses on building strong relationships with its customers through
personalized communication, loyalty programs, and responsive customer service.

8. MARKET RESEARCH AND ANALYSIS:

Oswal Soap Company continuously monitors market trends, customer preferences,


and competitor activities to adapt its marketing strategies and stay ahead in the
industry.

9. SUSTAINABLE MARKETING PRACTICES:

The company emphasizes environmentally friendly packaging and ingredients,


promoting its commitment to sustainability and social responsibility in its marketing
efforts.

10. INNOVATION:

The company focuses on continuous product innovation to introduce new and


improved soap products that meet evolving customer needs and preferences.

11. DIGITAL MARKETING:


Oswal Soap Company utilizes digital marketing channels such as social media, email
marketing, and online advertising to engage with customers, drive brand awareness,
and increase sales.

12. COLLABARATIONS AND PARTNERSHIPS:

The company collaborates with influencers, beauty experts, and other brands to create
buzz around its soap products and reach new audiences.

13. CUSTOMER FEEDBACK AND REVIEWS:

Oswal Soap Company actively seeks and utilizes customer feedback and reviews to
improve its products and marketing strategies, as well as to build trust and credibility
with potential customers.

14. COMMUNITY ENGAGEMENT:

Community engagement is a collaborative process between multiple sectors of a


community. It involves working with groups of people who are affiliated by
geographic proximity, special interest, or similar situations. The company engages in
community initiatives and sponsorships to build a positive brand image and connect
with customers on a more personal level.

15. CONTINUOUS IMPROVEMENT:

Oswal Soap Company is committed to continuously evaluating and improving its


marketing strategies based on market feedback and performance metrics.

Overall, the marketing strategies of Oswal Soap Company aim to create a strong
brand presence, drive sales growth, and build long-term customer relationships in the
competitive soap industry.

1.3 MARKETING MANAGEMENT CHALLENGES FACED


BY OSWAL SOAP COMPANY

Oswal Soap Company is a leading manufacturer and marketer of soaps and detergents
in India. The company has a strong brand presence in the country and its products are
available in all major retail outlets. However, the company is facing some challenges
in the marketing management of its products. These are:

1. INCREASING COMPETITION:

The soap industry is highly competitive, with multiple national and international
brands vying for market share. Oswal Soap Company will need to find unique selling
propositions, effectively communicate brand value, and differentiate its products from
competitors to attract customers and gain market share.

2. CHANGING CONSUMER PREFERENCES:

Consumer preferences and trends in the soap industry are constantly evolving.
Customers are becoming more conscious about the ingredients used in soap products,
leaning towards organic and natural options. The company will need to adapt to these
changing preferences and develop innovative product offerings that meet customer
demands.

3. BRAND AWARENESS AND RECOGNITION:

Building brand awareness and establishing a strong brand presence can be


challenging, especially for a relatively new or niche Company like Oswal Soap
Company. The company will need to invest in marketing strategies such as
advertising, social media campaigns, influencer partnerships, and public relations to
increase brand visibility and gain consumer trust.

4. DISTRIBUTION AND SUPPLY CHAIN:


Effective distribution and efficient supply chain management are crucial for the
success of a soap company. Oswal Soap Company will need to ensure that its
products are available in a wide range of retail outlets, including supermarkets,
pharmacies, and online platforms. Managing inventory levels, logistics, and timely
delivery to meet customer demand can also be a challenge.

5. PRICING STRATEGY:

Determining an optimal pricing strategy is crucial for profitability and


competitiveness. Setting prices too high may deter price-sensitive customers, while
setting prices too low may lead to lower profit margins. Oswal Soap Company needs
to conduct market research, analyze competitor pricing, and consider factors such as
production costs and target market affordability to strike the right balance.

6. MAINTAINING PRODUCT QUALITY:

Good quality management can enhance your organization’s brand and reputation,
protect it against risks, increase its efficiency, boost its profits and reduce waste, and
position it to keep on growing. Consistently delivering high-quality soap products is
essential for customer satisfaction and loyalty. Oswal Soap Company needs to
consistently monitor and control its manufacturing processes and quality standards to
ensure that its products meet or exceed customer expectations.

7. ENVIRONMENTAL SUSTAINABILITY:

Environmental sustainability is the ability to maintain an ecological balance in our


planet's natural environment and conserve natural resources to support the wellbeing
of current and future generations. With increasing environmental concerns, consumers
are demanding more sustainable and eco-friendly products. Oswal Soap Company
will need to adopt sustainable practices in its manufacturing processes, packaging,
and ingredient sourcing to appeal to environmentally conscious customers.

8. REGULATION AND COMPLIANCE:


The soap industry is subject to various regulations, including labeling requirements,
quality standards, and health and safety regulations. Oswal Soap Company needs to
stay updated with all relevant regulations and ensure compliance to avoid penalties
and maintain consumer trust.

9. TECHNOLOGICAL ADVANCEMENTS:

The rise of e-commerce, social media marketing, and digital platforms has
transformed the marketing landscape. Oswal Soap Company needs to leverage
technology, such as online advertising, influencer marketing, and e-commerce, to
reach a wider audience and enhance customer engagement.

10. CUSTOMER RELATIONSHIP MANAGEMENT:

Building and maintaining strong customer relationships is crucial for long-term


business success. Oswal Soap Company needs to invest in customer relationship
management systems, customer feedback mechanisms, and personalized marketing
strategies to enhance customer satisfaction and loyalty.
CHAPTER 2

PROFILE OF OSWAL SOAP COMPANY


 ABOUT OSWAL SOAP COMPANY

 HISTORY OF OSWAL SOAP

 PRODUCTS AND SERVICES

 MANUFACTURING UNITS

 MISSION, VISION & ACHIEVEMENTS

 BOARD OF DIRECTORS AND LEADERS

 COMPANY DETAILS

1.1 ABOUT OSWAL SOAP COMPANY


Oswal Soap Company is a soap manufacturing company that produces a range of soap
products for various consumer needs. The company has grown to establish a strong
presence in the soap industry.

Oswal Soap Company prides itself on producing high-quality soap products that are
gentle on the skin and effective in their cleaning properties.

The company uses a combination of traditional soap-making techniques and modern


technology to create unique formulations that cater to different skin types and
preferences.

The company offers a diverse product portfolio, including bar soaps, liquid soaps,
body washes, and specialized soaps for specific skin conditions. Oswal Soap
Company is known for using natural and organic ingredients, ensuring that its
products are free from harsh chemicals and additives.

This commitment to quality and natural ingredients is aimed at meeting the rising
demand for eco-friendly and sustainable soap products.

In addition to producing soap products, Oswal Soap Company places importance on


developing strong relationships with its customers. The company strives to listen to
customer feedback and continuously improve its products and services to meet
customer expectations.

Oswal Soap Company has a distribution network that spans across (insert
region/country) and its products are available in various retail outlets, including
supermarkets, pharmacies, and online platforms. The company also engages in
marketing activities to create brand awareness and promote its products to a wider
audience.

Overall, Oswal Soap Company aims to be a reputable player in the soap industry by
delivering high-quality soap products, maintaining customer satisfaction, and staying
abreast of market trends and consumer demands.

Oswal Soap Company was founded in 1956 and is headquartered in Jaipur, India. The
company started as a small soap manufacturing unit and has since grown to become a
well-established player in the soap industry.
The company focuses on producing a wide range of soap products that cater to
different consumer preferences and needs. They offer bar soaps, liquid soaps, and
body washes in various fragrances and formulations. Oswal Soap Company ensures
that their products are gentle on the skin while effectively removing dirt and
impurities.

Oswal Soap Company places great emphasis on product quality and uses a
combination of traditional soap-making techniques and modern technology to create
their soap formulations. They source high-quality ingredients to ensure that their
products deliver superior performance and meet stringent quality standards.

To further enhance the customer experience, the company continuously conducts


research and development to introduce innovative soap products. They strive to stay
ahead of market trends, consumer preferences, and technological advancements to
provide customers with new and improved soap options.

In terms of sustainability, Oswal Soap Company is committed to environmental


responsibility. They focus on reducing their carbon footprint and implementing eco-
friendly practices in their manufacturing processes. Additionally, they use recyclable
packaging materials to minimize waste.

Oswal Soap Company maintains a strong distribution network across India and
exports its products to several international markets. Their soap products are available
in a wide range of channels, including supermarkets, pharmacies, convenience stores,
and online platforms. The company also offers customized soap solutions for
corporate clients and hospitality industry partners.

In terms of marketing and customer engagement, Oswal Soap Company invests in


various marketing initiatives to raise brand awareness and promote their products.
They utilize print and digital advertising, social media campaigns, and participate in
trade shows and exhibitions to reach their target audience.

The company also engages in collaborations and partnerships with influencers and
skincare experts to create brand ambassadors and enhance product credibility.
Overall, Oswal Soap Company's core values revolve around:

 Providing high-quality soap products,


 Maintaining customer satisfaction, and
 Promoting sustainability.

By staying

 Innovative,
 Customer-centric,
 Environmentally conscious & the company aims to stay competitive in the
ever-evolving soap market.

1.2 HISTORY OF OSWAL SOAP COMPANY

Oswal Soap Group Was Established By Late Shri Uttamchand Deshraj Jain In 1956
In Johari Bazaar, Jaipur With His Hard Work And Efforts. The Soap’s High Quality
Was the Key to Attract People and Made It Their First Choice. Later On, Late Shri
Uttamchand Deshraj Jain’s Sons Took a Step Forward and Got the Business
Registered and Copyright As “Oswal Soap Group” And Started Handling His Whole
Business. Following This, They Set Up Their Production Centers And Stores To
Produce And Sell Their Soaps In Different Cities, Towns And Villages. In 1995,
Uttamchand Deshraj Ji’s Third Generation Took over The Business and Appointed
Many Agencies and Stores to Sell Their Product. Moreover, Seeing The Need Of
Time, The Oswal Soap Group Launched Many New Products Like Washing Powder,
Detergent Powder, Bath Soap, Cleaning Powder, Tea, Different Spices, Phenol,
Liquid Hand Wash And Dish Wash, Floor Cleaner, Glass Cleaner, Rice, Oil, Broom,
Sanitary Pad, Sanitizer, Pulse Etc. All Of These Products Offered By Oswal Soap
Group Are Readily Available At Reasonable Prices At Wholesale And Retail Stores
In Rajasthan, Punjab, Haryana, Gujarat, Maharashtra, Madhya Pradesh, Etc. To
Increase Their Business, Oswal Soap Group Has Decided To Launch Many New
Products In Near Future For Which Research And Efforts Are Being Made
Continuously. With Time, the Demand for Oswal Products Is Increasing and Coming
From More Cities. So, The Group Has A Desire To Appoint More Agencies In
Different Cities. So, The Interested Candidates And Agencies Are Requested To
Contact. With Over 65 Years Of Experience And A Billion Satisfied Customers,
Oswal Soap Group Became One Of The Largest Manufacturers Of The Daily-Use
Commodities. We Have A Network Of Over 1000 Distributors, 2.5 Lacs Wholesale
Retailers And 800+ Employees, Who Are Working Hard To Provide Superior Quality
Products To The Consumers.

In the early years, Oswal Soap Company started as a small-scale soap manufacturing
unit. The company focused on producing basic bar soaps using traditional soap-
making techniques. They gained recognition for their high-quality products and
commitment to customer satisfaction.

As Oswal Soap Company gained popularity and demand for its products increased,
the company expanded its operations and gradually diversified its product range. They
introduced new soap formulations, including liquid soaps and body washes, to cater to
different consumer preferences.

Over the years, Oswal Soap Company continued to invest in technology and
innovation. They adopted modern manufacturing practices and equipment to enhance
production efficiency and product quality. This allowed them to meet growing market
demands and maintain their reputation for producing superior soap products.

The company's commitment to delivering high-quality soap products while focusing


on customer needs has been a central pillar of Oswal Soap Company's success.
Additionally, Oswal Soap Company's dedication to research and development has
enabled them to introduce innovative soap formulations and stay ahead of market
trends.

Oswal Soap Company has also prioritized sustainable business practices. They have
implemented measures to minimize their environmental impact and promote
responsible manufacturing. This includes using eco-friendly packaging materials and
incorporating sustainable sourcing practices.

With consistent growth and a strong foothold in the Indian soap market, Oswal Soap
Company has expanded its distribution network both domestically and internationally.
Their soap products are now available in various retail outlets and are exported to
different countries across the globe.
Today, Oswal Soap Company continues to thrive and evolve as a reputable soap
manufacturer. They remain committed to producing high-quality soap products,
engaging with customers, and staying at the forefront of the soap industry through
innovation and sustainable practices.

1.3 PRODUCTS AND SERVICES

Various Products offered by oswal soap group are as follows:

 OSWAL BATH SOAP:

It includes 4 types of bath soap which are:

 Oswal Almond Bath Soap;


 Oswal Neem Bath Soap;
 Oswal Natural Milk Kesar Soap;
 Oswal Glycerine Bath Soap.
 OSWAL DISH WASH:

It includes 3 type of dish wash:

 Oswal Dish Wash Tub;


 Oswal Dish Wash Liquid;
 Oswal Dish Wash Bar.

 OSWAL MASALE:
It includes 6 types of Masala:
 Oswal Sambhar Masala;
 Oswal Garam Masala;
 Oswal Chana Masale;
 Oswal Turmeric Powder;
 Oswal Coriander Powder;
 Oswal Chilly Powder.

 OSWAL SOAP:

It includes 2 types:
 Oswal Oil Based Soap:
This soap has formed the base of the company, the oil based soap has
been in the family of Indian's since generations.
 Oswal White Coconut Soap.

This type of soap is mainly used for washing clothes and hand wash laundry,

thus it is regarded as Oswal Washing Soap.


 OSWAL FLOOR CLEANER:

It includes:
 Lavender Floor Cleaner;
 Sandal Floor Cleaner;
 Jasmine Floor Cleaner;
 Lemon Floor Cleaner;
 Floral Floor Cleaner.

 OSWAL GLASS CLEANER


 OSWAL REFINED COOKING OIL

It Includes:
 Kacchi Ghani Mustard Oil;
 Soyabean Oil.

 OSWAL WASHING POWDER


 OSWAL HAND WASH

 OSWAL TOILET CLEANER


 OSWAL BASMATI RICE

 OSWAL AGARBATTI
It Includes 5 types of Agarbatti:
 Champa,
 Chandan,
 Gulab,
 Mogra,
 Ratrani.

 OSWAL GRASS BROOM


OSWAL SALT

 OSWAL
POHA
 OSWAL DAAL

It
includes
6 types of Daal:
 Kabuli Chana;
 Moong Dal;
 Toor Dal;
 Hari Moong;
 Rajma;
 Chana Dal.

 OSWAL TEA

It includes only two types of tea:

 Assam Tea,
 Oswal Tea Dust Grade II.

 OSWAL TOUCH SANITARY PADS


Various Services offered are:

 Quality Control:
The Primary Objective Of the Organization Is To Deliver High-Quality
Products At Affordable Prices In A Safe And Hygienic Environment.

 Infrastructure:
In Order To Extend Outreach To The Customers, Oswal Soap Group are
Continuously Developing their Infrastructure With Well-Equipped Machines
And Facilities For Employees.

 Manufacturing:
Oswal Soap Company regards them as their Own Competitors, And Hence
they Are Always Outdoing themselves To Provide Consumers With A Wide
Range Of Products Using Highly Advanced Machinery.
 Reasonable Prices:
They Provide All Products On The Affordable Prices To All Customers
Which Give them A Long String Of Happy Customers.

 Private Label Manufacturing:


In addition to their own product lines, Oswal Soap Company provides private
label manufacturing services. They work with retailers, distributors, and
individuals to produce soap products under their clients' brand names. Oswal
Soap Company ensures strict adherence to quality standards and
confidentiality in these partnerships.

 Research and Development:


Oswal Soap Company has a dedicated research and development team that
focuses on product innovation and continual improvement. They strive to
develop new soap formulations, explore new ingredients, and address
emerging market trends. This service allows Oswal Soap Company to
constantly provide customers with new and improved soap options.

 Customer Support:
Oswal Soap Company emphasizes strong customer support to ensure customer
satisfaction. They provide a dedicated customer support team to address
inquiries, resolve issues, and provide guidance regarding product selection,
usage, and any other customer needs.

 Packaging Design:
Oswal Soap Company offers packaging design services to create visually
appealing and functional soap packaging. They work with clients to develop
attractive and informative packaging designs that help their soap products
stand out on store shelves.

It's worth noting that the availability and extent of these services may vary depending
on the specific requirements and agreements between Oswal Soap Company and their
clients. The company strives to provide comprehensive services that go beyond
manufacturing and extend to cater to their clients' unique needs and preferences.
1.4 MANUFACTURING UNITS

There are 9 Manufacturing Units of Oswal Soap Company these are:

1. ADITYA INDUSTRIES
GSTIN NO:
08AAGFA8405K1ZC

ADDRESS:
G-1025, F-1026, F-1027, Phase III, Sitapura Ind. Area, Jaipur-302022

2. DESRAJ SOAP AND CHEMICAL Pvt Ltd


GSTIN NO:
08AAACD6227B1Z4

ADDRESS:
G-105, (A&B), Mansarovar Ind. Area Jaipur

3. EIGHT BROTHERS SALES Pvt Ltd


GSTIN NO:
08AABCE9530D1ZU

ADDRESS:
Plot No 20-21, Ratan Ind. Area, Harsuliya khejro ka Bass, Phagi, Jaipur-
303005

4. HEMANK SOAP AND CHEMICALS Pvt Ltd


GSTIN NO:
08AAACH5935J1ZE

ADDRESS:
G-144, Heerawala Industrial Area, Kanota, Jaipur-303301
5. OSWAL SOAP FACTORY
GSTIN NO:
08AAAFO1751G1ZI

ADDRESS:
200, Jhotwara Ind. Area, Jaipur- 302012

6. SURENDRA INDUSTRIES
GSTIN NO:
08ACNPJ3944K1Z5

ADDRESS:
H-174, Malviya Industrial Area, Jaipur-302017

7. OSWAL INDUSTRIES
GSTIN NO:
08AAAFO1750H1ZH

ADDRESS:
F-395, Road No 9, Vki Area, Jaipur- 302013

8. OSWAL POWDER & CHEMICAL INDUSTRIES


GSTIN NO:
08AAWPJ9704C1ZF

Address
Near Panchayat Bhawan, Village Niwaru, Jhotwara, Jaipur

9. VASANT SOAP AND CHEMICAL INDUSTRIES


GSTIN NO:
08AJIPJ5131G1ZD

ADDRESS:
Plot No-4, Priya Nagar, Village Sarna Dungar, Jhotwara, Jaipur-302012
1.5 MISSION, VISION & ACHIEVEMENTS

1.5.1 MISSION:

The Oswal Soap Group's mission is to provide high-quality products to


consumers. The company was established in 1956 and a Network Of Over
1000 Distributors, 2.5 Lacs Wholesale Retailers And 800+ Employees.

1.5.2 VISION:

The group's vision is to increase their business by launching new products and
appointing more agencies in different cities.
The Oswal Soap Group has been delivering quality products for more than
five decades.

1.5.3 ACHIEVEMENTS:

 YOUNG ENTREPRENEUR OF THE YEAR:

Mr. Gaurav Oswal Managing Director of Aditya industries has been


awarded as Young Entrepreneur of the year by Sh. Parshottam Rupala-
Hon'ble Minister-Agriculture & Farmers Welfare Govt. of India.
 MY FM AWARD FOR LEADERSHIP IN PANDEMIC:

Oswal Soap Group was awarded by FM Award for Leadership in


Pandemic. This award was presented by Mrs. Deepa Malika.

 THIRD GOLD MEDAL AT GWALIOR TRADE FAIR:

Oswal Soap Group has set a new record by winning the Gold Medal at
Gwalior Trade Fair for third consecutive time and became the first
company ever to win three Gold Medals in the history of the event.
1.6 BOARD OF DIRECTORS AND LEADERS

 BOARD OF DIRECTORS:

FIG 1.6.1 shows there are 4 directors of Oswal Soap Group with Late Shree
Uttam Chand Desraj as the Founder and CEO.

LATE SHREE UTTAM CHAND DESRAJ


(CEO AND FOUNDER)

DEVENDRA JAIN SURENDRA JAIN

(DIRECTOR) (DIRECTOR)

YATENDRA JAIN

(DIRECTOR)

VIRENDRA JAIN

(DIRECTOR)

FIG: 1.6.1
 LEADERSHIP:

AMIT SHUKLA
(RESEARCH AND DEVELOPMENT)

DHRUV JAIN
(HEAD OF BUSINESS DEVELOPMENT)

ADITYA JAIN
(MANAGING DIRECTOR)

RAHUL CHAUDHARY
(HEAD OF SALES MARKETING)

GYAN SINGH RAJPUT


(HEAD CHEMICAL ENGINEER)

SAURABH JAIN
(SENIOR AUDIT MANAGER)

SARTHAK MODY
(BUSINESS SPECIALIST)

ANJALI GANGWAL
(OPERATIONS MANAGER)
1.7 OTHER COMPANY DETAILS

1.7.1 CONTACT INFO

EMAIL:

info@oswalsoap1956.com

PHONE:

+91-91161 71956

FAX:

+91-141-2673041

1.7.2 ADDRESS

Uttam Chand Desraj 10/OB/35, Oswal Tower, Ring Road Project, Near

Reliance Petrol Pump, Lakeshra, Agra Road, Jaipur-303012

1.7.3 NETWORK

o MORE THAN 1000 DISTRIBUTORS;


o 800+ EMPLOYEES
o 2.5 LAC WHOLESALE RETAILERS.

1.7.4 REVENUE

o UPTO 1 CRORE.
CHAPTER 3

RESEARCH METHODOLOGY

 OBJECTIVE OF THE STUDY

 METHODOLOGY

 LIMITATIONS
3.1 PALO ALTO NETWORKS

FIG: 1

3.1.1 ABOUT PALO ALTO NETWORKS:

SPECIALISATION Best for Comprehensive Security

HEADQUARTERS Santa Clara, California

FOUNDED 2005

ANNUAL REVENUE $5.5 billion

TABLE: A

Palo Alto has continued its innovative tradition, including some noteworthy
announcements in automated threat response, DevSecOps, vulnerability and
configuration management, and other areas of cyber resilience often overlooked in the
detection-obsessed cybersecurity market.

3.1.2 BEST CYBERSECURITY PRACTICES OF PALO ALTO NETWORKS:


Its security product tests have been consistently excellent, including in the latest
MITRE endpoint security tests and Cyber Ratings firewall tests. In addition to next-
gen firewalls (NGFW), endpoint detection and response (EDR) and DevSecOps, here
are the other enterprise security areas where Palo Alto ranks among the best.

These are the best cybersecurity practices of Palo Alto Networks:

 Zero Trust Enterprise:


Zero Trust removes all implicit trust and continuously validates every stage of
a digital interaction. To evolve into a true Zero Trust Enterprise, policies and
controls must apply across users, applications and infrastructure to reduce risk
and complexity while achieving enterprise resilience.

 Cloud Native Security;

 Security Operations:
Unify your defenses and stop more threats with the industry's first extended
detection and response platform.

 Threat Intel & Consulting;

 ML-Powered Network Security:


Get complete Zero Trust Network Security to see and secure everything from
your headquarters, to branch offices and data centers, as well as your mobile
workforce.

 Cloud Delivered Security;

 Achieve better security outcomes.


3.2 FORTINET

FIG: 2

SPECIALISATION Best for Network Security

HEADQUARTERS Sunnyvale, California

FOUNDED 2000

ANNUAL REVENUE $4.4 billion

3.2.1 ABOUT FORTINET:

TABLE: B

The company develops and sells security solutions like firewalls, endpoint security
and intrusion detection systems. Fortinet has offices located all over the world. The
network security vendor is another that doesn’t shy away from rigorous testing, and
that’s landed the company on 16 of our top cybersecurity software and hardware lists.
Fortinet is strongest in its core network security area, but boasts strength in other key
security areas like SIEM and EDR too. Not surprisingly, Fortinet has turned its
networking expertise into leadership positions in adjacent markets like SD-WAN.

3.2.2 BEST CYBERSECURITY PRACTICES OF FORTINET:


These are the best cybersecurity practices performed by Fortinet with help of its
products:

 Network Mapping and Connectivity Analysis:


Understanding the physical and digital locations of all devices mapped
within a network should be a primary concern of operational
technology managers.

 Detection of Suspicious Activities, Exposures, and Malware Attacks:


Figuring out the kinds of activity that you will label as “suspicious,”
including problematic exposures and malware attacks, is important
because you do not want your team to be distracted by false flags.

 Implement a Zero-trust Framework:


A zero-trust framework is built on the principle of “never trust, always
verify.” Within this kind of system, every person, device, application,
and network is presumed to be a threat. Therefore, each of these
entities has the responsibility of proving its legitimacy before it is
allowed to connect.

 Align the Right Remote Access Tools:


Ensuring the right people and systems have access to your operational
technology is essential, especially because they may be pivotal to the
flow of business.

 Control Identity and Access Management:


Controlling who is able to access your system plays a big role in your
cybersecurity posture, particularly because allowing the wrong person
inside may make it easy for an attacker to penetrate.

3.3 CISCO
FIG: 3

3.3.1 ABOUT CISCO:

SPECIALISATION Best for Distributed Network Security

HEADQUARTERS San Jose, California

FOUNDED 1984

ANNUAL REVENUE $54.5 billion

TABLE: C

Cisco (CSCO) is another perennial favorite on this list. The networking pioneer has
used its market dominance to move into adjacent markets like network security.
Cisco’s $4 billion security business is growing at a healthy 9% rate, faster than the
company as a whole. Customers are often Cisco shops gravitating toward its firewall,
endpoint and other security solutions, but when you have more than $50 billion in
annual sales, your existing customers are a pretty big market, and Cisco has had its
wins elsewhere too.

3.3.2 BEST CYBERSECURITY PRACTICES OF CISCO:

Best Cybersecurity Practices performed by CISCO are:

 Business Critical Services (BCS):


Gain expertise and analytics-driven insights for vigilant security.

 Cisco Talos Incident Response:


Build security resilience and get help when you need it with our leading
cybersecurity intelligence organization.

 Security strategy advisory:


Discover a holistic view of IT risks to align security investment with your
business strategy.

 Zero trust strategy:


Protect network performance, create competitive advantage, and capture
business value.

 Security segmentation advisory:


Reduce risk, simplify your audit profile, and protect data with a strategic
infrastructure segmentation.

 Security risk management advisory:


See security risks and make appropriate decisions to meet your business goals.

 Technical security assessment:


Assess your vulnerabilities; then get expert guidance on how to strengthen
your security posture.
3.4 CROWDSTRIKE

FIG: 4

3.4.1 ABOUT CROWDSTRIKE:

SPECIALISATION Best for Endpoint Security and Services

HEADQUARTERS Sunnyvale, California

FOUNDED 2011

ANNUAL REVENUE $2.2 billion

TABLE: D

CrowdStrike (CRWD) has made five of our lists – EDR, XDR, MDR, vulnerability
management as a service (VMaaS) and cybersecurity – and its strong positions in the
very competitive EDR market and the emerging XDR market leave it well positioned
for the future too.

Revenue is expected to grow from $2.2 billion to $3 billion over the next year, and
analysts expect a stunning 58% annual growth rate over the next five years, showing
plenty of buyer interest in Crowd Strike’s products and services.
3.4.2 BEST CYBERSECURITY PRACTICES OF CROWDSTRIKE:

 Zero Trust:
Real-time breach protection on any endpoint, cloud workload or identity,
wherever they are. The CrowdStrike Zero Trust solution secures your
enterprise against modern attacks with the world's largest unified, threat-
centric data fabric to stop breaches in real time on any identity, endpoint and
workload — wherever they are.

 Cloud security:
Stop cloud breaches for multi-cloud and hybrid environments in a single
platform. CrowdStrike Cloud Security provides continuous posture
management and breach protection for any cloud in the industry’s only
adversary-focused Cloud Native Application Protection Platform powered by
holistic intelligence and end-to-end protection from the host to the cloud,
delivering greater visibility, compliance and the industry’s fastest threat
detection and response to outsmart the adversary.

 Ransomware protection:
Ransomware has evolved from being a hacker’s side hustle, to enterprise-level
targeted big game hunting operations conducted by the most sophisticated
cybercriminals in the world. In the past year, Crowdstrike observed a 112%
increase in demand for access brokers who sell credentials to ransomware
operators. To successfully stop ransomware, it’s more important than ever to
secure the most critical areas of risk – endpoints and cloud workloads,
identity, and data – and stay ahead of today’s threats.

 Observability & log management:


Fills in the gaps, logs everything, and realizes real-time observability for your
entire system. Falcon Log Scale is your one-stop shop to address security, IT,
and DevOps logging requirements. With its high scale and affordable price,
Falcon Log Scale extends super-fast search, analysis, and visualization to all
of your data.
3.5 ZSCALER

FIG: 5

3.5.1 ABOUT ZSCALER:

SPECIALISATION Best for Cloud Security

HEADQUARTERS San Jose, California

FOUNDED 2007

ANNUAL REVENUE $1.53 billion

TABLE: E

Zscaler (ZS) moved up our list a few spots this year. With $1.53 billion in expected
revenue this year and a long-term projected growth rate of 53%, Zscaler’s broad cloud
security platform makes the San Jose-based company well positioned for important
emerging trends like zero trust, edge security and secure access service edge (SASE).
Zscaler made our SASE, zero trust, web gateway, deception tools, and SD-WAN lists.
3.5.2 BEST CYBERSECURITY PRACTICES OF CROWDSTRIKE:

 Threat Intelligence Decoy Planning:


A Threat Intelligence (TI) decoy generates organization-specific intelligence
about reconnaissance attempts and subsequent attacks against your public-
facing assets. Deception technology is a category of cybersecurity solutions
that detect threats early with low rates of false positives.

 Network Decoy Planning:


Network decoys detect scanning and lateral movement activities in your
network environment. They mimic real assets on your network. You can
deploy network decoys in business-critical network segments that host
production servers, demilitarized zones (DMZ), key applications, databases,
and cloud environments. Zscaler recommends that you deploy at least two
network decoys in each business-critical network segment.

 Active Directory Decoy Planning:


An active directory (AD) is a critical resource for managing the IT
infrastructure in an enterprise. It is a target for adversaries who perform
reconnaissance to map and identify the resources in an organization. After the
information is retrieved from an AD, the adversaries move laterally to other
assets, thus expanding their initial reach.

 Landmine Decoy Planning:


Landmine decoys look like valuable assets ripe for exfiltration. They can be
decoy files, credentials, and application lures on endpoints. When adversaries
access these decoys, Zscaler Deception sends alerts about the adversary's
presence. You can use the Zscaler Deception dashboard to analyze an
adversary's behavior, hunt for threats across the network, or block access.
CHAPTER 4

IMPACT AND IMPLICATIONS OF CYBERSECURITY


 IMPACTS OF CYBERSECURITY ATTACKS IN IT
SECTOR
IN IT SECTOR

 IMPLICATIONS OF CYBER SECURITY

 IMPLICATIONS OF EMERGING TECHNOLOGY ON


CYBERSECURITY
4.1 IMPACTS OF CYBERSECURITY ATTACKS IN IT SECTOR

A successful cyber-attack can cause major damage to your business. It can affect your
bottom line, as well as your business' standing and consumer trust. The impact of a
security breach can be broadly divided into three categories: financial, reputational
and legal.

4.1.1 SIX WAYS CYBERCRIME IMPACTS BUSINESS AND THE IT SECTOR:

 Increased Costs:
Companies that want to protect themselves from online thieves have to pull
out their wallets to do so. Firms may incur any number of outlays, including:
1. Cybersecurity technology and expertise;
2. Notifying affected parties of a breach;
3. Insurance premiums;
4. Public relations support.

 Operational Disruption:
In addition to actual financial damages, companies often face indirect costs
from cyberattacks, such as the possibility of a major interruption to operations
that can result in lost revenue.

 Altered Business Practices:


Cybercrime can impact businesses in more than just financial ways.
Companies have to rethink how they collect and store information to ensure
that sensitive information isn't vulnerable. Many companies have stopped
storing customers' financial and personal information, such as credit card
numbers, Social Security numbers, and birth dates.

 Reputational Damage:
Although tough to fully quantify, companies that fall victim to larger
cyberattacks may find their brand equity significantly tarnished. Customers,
and even suppliers, may feel less secure leaving their sensitive information in
the hands of a company whose IT infrastructure was broken at least once
before.
 Lost Revenue:
One of the worst outcomes of a cyberattack is a sudden drop in revenue, as
cautious customers move elsewhere to protect themselves against cybercrime.
Companies can also lose money to hackers who try to extort their victims.

 Stolen Intellectual Property: A company’s product designs, technologies, and


go-to-market strategies are often among its most valuable assets. Intangible
assets accounted for 87% of the value of S&P 500 companies in 2015,
according to intellectual property advisory Ocean Tomo.

4.1.2 ECONOMIC COST OF CYBER ATTACKS:

Cyber-attacks often result in a substantial financial loss arising from:

 Theft of corporate information;


 Theft of financial information (eg: bank details or payment card details);
 Theft of money;
 Disruption to trading (eg: inability to carry out transactions online);
 Loss of business or contract.

In dealing with the breach, businesses will also generally incur costs associated with
repairing affected systems, networks and devices.

4.1.3 REPUTATIONAL DAMAGE

Trust is an essential element of a customer relationship. Cyber-attacks can damage


your business' reputation and erode the trust your customers have for you. This, in
turn, could potentially lead to:

 Loss of customers;
 Loss of sales;
 Reduction in profits.
The effect of reputational damage can even impact on your suppliers, or affect
relationships you may have with partners, investors and other third parties vested in
your business.

4.1.4 LEGAL CONSEQUENCES OF A CYBER BREACH

Data protection and privacy laws require you to manage the security of all personal
data you hold - whether on your staff or your customers.

If this data is accidentally or deliberately compromised, and you have failed to deploy
appropriate security measures, you may face fines and regulatory sanctions.

4.1.5 WHAT IS AT RISK?

Your money, information, technology and reputation could be at risk. This could
include the destruction, exposure or corruption of the following:

 Customer records and personal information;


 Email records;
 Financial records;
 Business plans;
 New business ideas;
 Marketing plans;
 Intellectual property;
 Product design;
 Patent applications;
 Employee records (which could include sensitive personal identifiable
information such as their date of birth).

4.2 IMPLICATIONS OF CYBER SECURITY

Cyber security is about protecting your technology and information from:

 Accidental or illegal access


 Corruption
 Theft
 Damage.
You need to protect any digital information that your business creates and stores, plus
any information you collect from your customers. Providing a secure system is critical
to protect your business from cybercrime and build and maintain customer trust in
your business.

To be effective, you need to make cyber security a part of your daily business
processes. Cybersecurity is crucial because it safeguards all types of data against theft
and loss. Sensitive data, protected health information (PHI), personally identifiable
information (PII), intellectual property, personal information, data, and government
and business information systems are all included.

4.3 IMPLICATIONS OF EMERGING TECHNOLOGY ON


CYBERSECURITY

The emerging technologies are fundamentally changing the definition and meaning of
security, and as a result, there’s no such thing as ‘secure’ anymore. So, when we
evaluate emerging technologies like block chain, artificial intelligence, the internet of
things (IoT), autonomous systems, and more; there are all indicators that network
security, information security, data security, and cyber-security risks are going to
grow rapidly.

As a result, the evolving security threats have no visible front, borders, or armies and
with millions of annual cyber-attacks, cyber-crime has become a real threat to
everyone today. As we take a step forward in 2019, the battle between cybersecurity
offense and defense is expected to escalate–and as a result, emerging technologies
will need to find their way into balancing the already complex security paradigm.

It is time to evaluate what is the broader implication of cybersecurity strategy on


human safety and security, how is the security paradigm-changing, and what role
emerging technologies play in it.
 CONCLUSION AND SUGGESTIONS
CHAPTER 5

CONCLUSION AND SUGGESTIONS


 SCOPE OF FURTHER STUDY

5.1 CONCLUSION AND SUGGESTIONS


5.1.1 CONCLUSION AND FINDINGS:

Cybersecurity is a complex subject whose understanding requires knowledge and


expertise from multiple disciplines, including but not limited to computer science and
information technology, psychology, economics, organizational behavior, political
science, engineering, sociology, decision sciences, international relations, and law. In
practice, although technical measures are an important element, cybersecurity is not
primarily a technical matter, although it is easy for policy analysts and others to get
lost in the technical details. Furthermore, what is known about cybersecurity is often
compartmented along disciplinary lines, reducing the insights available from cross-
fertilization.

This primer seeks to illuminate some of these connections. Most of all, it attempts to
leave the reader with two central ideas. The cybersecurity problem will never be
solved once and for all. Solutions to the problem, limited in scope and longevity
though they may be, are at least as much nontechnical as technical in nature. Living in
this digital world where every area, from education to medical inquiries, from
entertainment to banking, is incomplete without computers as we can do everything
and anything on a digital basis in these. Working domain (private or personal) is
investing in this domain heavily across the world. But everything has some
advantages and disadvantages same applies to cyber security.

Cyber security is a blessing to the cyber world, but despite several advantages, sit has
disadvantages too. Hackers are also system experts who plan attacks for their benefit.
They can be from other countries who try to fetch confidential information about the
government, defenses, or individuals for attacking the country.

SOME OTHER CONCLUSION AND FINDINGS ARE:

 Cybersecurity is a never-ending battle. A permanently decisive solution to the


problem will not be found in the foreseeable future.
 Improvements to the cybersecurity posture of individuals, firms, government
agencies, and the nation have considerable value in reducing the loss and
damage that may be associated with cybersecurity breaches.
 Improvements to cybersecurity call for two distinct kinds of activity:
(a) Efforts to more effectively and more widely use what is known about
improving cybersecurity, and
(b) Efforts to develop new knowledge about cybersecurity.
 Publicly available information and policy actions to date have been
insufficient to motivate an adequate sense of urgency and ownership of
cybersecurity problems afflicting the United States as a nation.
 Cybersecurity is important to the United States, but the nation has other
interests as well, some of which conflict with the imperatives of cybersecurity.
Tradeoffs are inevitable and will have to be accepted through the nation’s
political and policy-making processes.
 The use of offensive operations in cyberspace as an instrument to advance
U.S. interests raises many important technical, legal, and policy questions that
have yet to be aired publicly by the U.S. government.

5.1.2 SUGGESTIONS:

Some Suggestions for Cybersecurity are:

 Scan the external storage devices for viruses on a regular basis;


 Avoid using public networks:
When you connect to a public network, you’re sharing the network
with everyone who is also connected. Any information you send or
retrieve on the network is vulnerable. Stay away from public
networks or use a VPN when you’re connected to one.
 Avoid the “secure enough” mentality:
Unless you’re completely isolated from the rest of the world,
there’s no such thing as being “secure enough.”
Big companies like Facebook invest a fortune into security every
year but are still affected by cyber-attacks.
 Invest in security upgrades;
 Back up important data;
 Keep software up-to-date:
Software companies typically provide software updates for 3
reasons: to add new features, fix known bugs, and upgrade
security.
 Avoid opening suspicious emails:
If an email looks suspicious, don’t open it because it might be a
phishing scam.
 Train employees;
 Use HTTPS on your website;
 Employ a “White Hat” hacker;
 Keep hardware up-to-date:
Outdated computer hardware may not support the most recent
software security upgrades.
 Use a secure file-sharing solution to encrypt the data;
 Use anti-virus and anti-malware;
 Use a VPN to privatize your connections;
 Check links before you click;
 Don’t be lazy with your passwords! ;
 Disable Bluetooth when you don’t need it;
 Enable 2-Factor Authentication;
 Remove adware from your machines;
 Double check for HTTPS on websites;
 Don’t store important information in non-secure places.

5.2 SCOPE OF FURTHER STUDY

The Scope of the above study is limited up to the extent of the information gathered
and information is always less than what we desire.

In the Above study we discussed:


 Introduction to Cybersecurity;
 Depth Information regarding Cyber threats and Cybersecurity;
 Cybersecurity Companies and its Practices in IT Sector
 Impacts and Implications of Cybersecurity in IT Sector
 Findings Suggestions and Conclusion of Study.

But the scope of any study is unlimited because future is unpredictable. Thus, there
are lots and lots of information which has not been presented in the project report but
all the important details and specifications have been discussed but Cybersecurity has
a very wide range of scope.

As, Cybersecurity is a growing topic and it is expected to have a massive growth in


this field as, In today’s world nothing happens without internet take from small scale
to large scale and if internet is a growing subject or field then the threats of using the
internet will also grow which is called as “CYBER THREATS” and as cyber-attacks
and threats will be there then comes with them its antitode which is
“CYBERSECURITY” thus it’s a never-ending and growing subject.

The demand for cybersecurity is at an all-time high as the global business


environment shifts to cloud data storage and online management. With increased
internet exposure, commercial organizational data and the personal data of users are at
a threat of being misused.

Thus almost all important details have been discussed but some few topics remain
like: Reports, Anti-Viruses, Uses of Cybersecurity in Everyday Life, and depth
information regarding Cyber threats and its different solutions, etc. and it is not
possible to cover all such wide and greater topics thus brief but important topics are
explained which can easily sum up almost every aspect of cybersecurity.

Thus it has a wide scope of further study in the future.

BIBLIOGRAPHY

BOOKS
 Larry Clinton (2022), Cybersecurity for Business, London (UK): Kogan Page.

 Dawn M. Cappelli, Andrew P. Moore, and Randall Trzeciak (2012), The


CERT Guide to Insider Threat, USA: Addison-Wesley.

 Liam Smith (2022), Cyber Security for Beginners:: A Comprehensive And


Essential Guide for Every Novice to Understand And Master Cybersecurity.

JOURNAL ARTICLE

 Tyler Moore, David Pym (2023), Journal of computer security, Oxford


University Press, England Vol 9 No 1

INTERNET

 https://www.simplilearn.com/tutorials/cyber-security-tutorial/what-is-cyber-
security

 https://www.esecurityplanet.com/products/top-cybersecurity-companies/

 https://www.nibusinessinfo.co.uk/content/impact-cyber-attack-your-business

 https://www.javatpoint.com/advantages-and-disadvantages-of-cyber-security

 https://en.wikipedia.org/wiki/Computer_security

You might also like