Research
1. Review the company’s website to learn about the products and services which it sells.
2. Retrieve and review the Hoovers profile for the company. The company profile web pages are interactive and have expanding menus / options (see figure below). You may find it helpful to use the “Print Quick Report” menu item under My Tools. http://ezproxy.umuc.edu/login?url=http://www.mergentonline.com/Hoovers
3. Download and review a copy of the company’s most recent Annual Report to Investors from its Form 10-K filing with the United States Securities and Exchange Commission.
4. Identify 3 or more additional sources of information about the company and how it operates in cyberspace. These can be news articles, data breach reports, etc.
5. Using the information obtained from your sources, identify the types of information and business operations which drive this company’s need for cyber security products and services. (What needs to be protected?)
6. Using the course readings and other materials, develop a “Buying Forecast” for likely purchases by this company for cyber security related products and services.
Write
1. An introduction section which identifies the company being discussed and includes a brief overview of the company including when it was founded and significant events in its history.
2. An overview of the company’s operations which summarizes information obtained from its annual report, the Hoovers profile for the company, and other sources which you found in your research. This information should include: headquarters location, key personnel, primary types of business activities and locations, major products or services sold by the company, major competitors, stock information (including ticker symbol or NASDAQ code), recent financial performance, and additional relevant information from the business profiles.
3. A separate section in which you describe this company’s needs or requirements for cyber security. What information and/or business operations need to be protected?
4. A separate “Buying Forecast” section in which you discuss the company’s likely future purchases for cyber security products and services. In this section, you should identify and discuss three or more categories of cyber security products or services which this company is likely to purchase.
Your three to five page Buyer Profile is to be prepared using basic APA formatting (including title page and reference list) and submitted as an MS Word attachment to the Corporate Profile Part 1 entry in your assignments folder. See the sample paper and paper template provided in Course Resources > APA Resources for formatting examples. Consult the grading rubric for specific content and formatting requirements for this assignment.