Preview

Business Model and Strategic Plan Part I: Conceptualizing a New Product or Service Division of an Existing Business

Better Essays
Open Document
Open Document
1587 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Business Model and Strategic Plan Part I: Conceptualizing a New Product or Service Division of an Existing Business
McAfee Spyware Blocker McAfee, an Intel company, has been an industry leader for antivirus software to protect personal computers for many years. The company has expanded its services from protecting computers to also protecting cellular browsing as well, the software can be used on the iPhone, and Android phones.
Product
McAfee is introducing a new line of software designed specifically for Android and iPhone devices to block unwanted spying from applications downloaded on the mobile devices. McAfee Spyware Blocker will target applications designed to collect personal and private information. The applications on the users phone that are targeted are; photos, email, browsing history, camera, contacts, passwords, and all information posted in mentioned applications.
Mission Statement McAfee Spyware Blocker for the iPhone and Android follows the same mission as the products for its personal computer software. Our mission for the McAfee Spyware Blocker application is to protect each client’s identity and personal information while using their mobile device with an advanced innovative software program designed to protect all information on the mobile device. The McAfee Spyware Blocker will filter all movements on mobile devices and warn the user with unwanted tracking, or spying from developers of applications. This also includes third party applications such as the popular Facebook, Pinterest, Yelp, Instagram, and other social media sites who require access to the users information.

Customer Need As the first of its kind, McAfee Spyware Blocker, has set itself apart from other spyware blockers. The software provides protection on mobile devices, and from unwanted sharing of information when downloading applications. The software creates a separate profile based on user preferences, which block all real information of the user. It then forces applications to use false information, created by the user, to run applications that require access to



References: McAfee, Inc. (2014). McAfee for Consumer Retrieved from http://home.mcafee.com/?CID=MFEen-usMHP001 Pearce, J. A. II. (2013). Strategic management: Planning for domestic and global competition (13th ed.). New York, NY: McGraw-Hill. Thompson, A. A., Gamble, J. E., & Strickland, A. J. (2012). Crafting and executing strategy: The quest for competitive advantage (18th ed.). New York, NY: McGraw-Hill.

You May Also Find These Documents Helpful

  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    A firewall is software or a device that blocks hackers, viruses, and malware from accessing to your network system. Second, you should create strong passwords that nobody can guess. Third, you can hide your browsing activities from others by opening an Incognito window on Google Chrome, Private Browsing on Firefox, and InPrivate on Internet Explorer. These private windows don't record your browsing history. Fourth, when you are using a public computer, you can use a portable privacy device such as the Ironkey Personal Flash Drive or take Linux OS with you on a flash drive. Ironkey Personal Flash Drive is an encrypted flash drive that stores sensitive data and passwords and they are safe from viruses and malware.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Cis 105 Security Systems

    • 465 Words
    • 2 Pages

    The all-in-one computer security systems are effective in a way that it protects one’s computer from all the threats previously mentioned, spyware, viruses, and identity theft all-in-one package without the user having to worry about anything. An included feature is filter protection for any incoming and outgoing email for any virus and spam threats. Another threat that these all-in-one computer security systems are effective is they help protect one’s computer from hackers, and come with a built-in firewall that helps keeps all these threats away. These security systems are automatically scan for any threats and notify the user of any threats are detected. These all-in-one security systems are automatically updated without the user having to worry whether or not they have the latest information. An included feature that the Norton 360 comes with that are beneficial for individual users is the identify protection that securely keeps login and personal information safe, “guards against…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In Harlen Cobens article ,” The Under Cover Parent” (2008) he suggests that parents should look into putting spyware on their teens devices.…

    • 147 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Rim Case Analysis

    • 3116 Words
    • 13 Pages

    One of RIM’s greatest strengths is the security of information provided by the blackberry. Their smart-phones maintain a high level of security through securing information behind company firewalls and the encryption of information when it is being transferred to other consumers. This allows RIM to capture large organizations that demand a high level of security such as the U.S. Government and financial institutions.…

    • 3116 Words
    • 13 Pages
    Better Essays
  • Good Essays

    Second, internet filters also have other advantages. First, filter software can protect the data of businesses; companies also need to protect customer information to keep it from falling in the wrong hands. Second, filter software can identify internet theft is a real threat, because hackers are skilled at getting people's personal information and using it to commit fraud. Third, filter software can make the employees more productive, because there are employees who spend many working hours surfing websites unrelated to their jobs.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Why Spyware Is Wrong

    • 1281 Words
    • 6 Pages

    To wrap up, parental spyware is not a great option and should be avoided. It leads to parents being extremely suspicious of their children, and their children being hurt emotionally from their mistrust, which ruins their relationship. It is important for kids to make mistakes and learn from them, as it is part of…

    • 1281 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Personal Privacy

    • 813 Words
    • 4 Pages

    The purpose of this paper is to explain what I use to protect my personal privacy. There are many different things that can be use to protect someone’s information and keep hackers from accessing their computer. Some people use anti-virus, firewalls and anti-spam software to help protect their personal privacy. As we all know with today’s technology having just anti-virus or firewalls are not good enough, but having something is better than nothing. They do not protect you from new or custom-made viruses and evil-scripts. There is no one solution to protect you from Identity Theft, it’s just too many threats to keep up with, and having one software will not do the job for you. One key to protecting your information would be multi-layer protection; this means having more than one program monitoring you computer for different reasons.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Importance Of Spyware

    • 558 Words
    • 3 Pages

    Are you worried about your child doing inappropriate things on the internet? Well based on the article being on undercover parent have you ever thought of putting spyware your child’s computer to monitor the things he does , well here are some few ideas on why spyware is good for your child safety as well as , why I agreed with Harlen, Coben’s argument on putting spyware on your child’s computer or any electronic device in general for your child’s safety.Well, to start off in my opinion and personal experience I think putting spyware on a kids computer would be a good idea because you got to monitor your child's computer and that would be a good idea because you get to protect your child from the dangers of the internet and you get to see how your child’s personality is like with friends or family.…

    • 558 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    As mentioned earlier, you can find BullGuard software for your Android phone. It’s a great way to keep your smartphone safe and ensure your most personalised details won’t get lost. The security app is available to download from the website’s own store.…

    • 964 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    The distribution of mobile malware detected in Q3 2013 by type was similar to that in Q2:…

    • 1404 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis, McAfee CleanBoot, McAfee DeepSAFE, ePolicy Orchestrator, McAfee ePO, McAfee EMM, McAfee Enterprise Mobility Management, Foundscore, Foundstone, McAfee NetPrism, McAfee Policy Enforcer, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, SmartFilter, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure, WormTraq are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others.…

    • 13928 Words
    • 56 Pages
    Powerful Essays
  • Satisfactory Essays

    hotspot shield

    • 417 Words
    • 2 Pages

    Hotspot shield was developed by Anchor Free, a company based out of Silicon Valley. The software was released in April 2008 for Windows and Mac operating systems and was expanded to include support for iOS and Androids in 2011 and 2012 respectively. Hotspot shield establishes a virtual private network connection (VPN) between a device and a web server. This makes the users anonymous and secures the data being transferred to and from the computer or mobile device. The software also protects information from being accessed or tracked by third parties. It has free and paid versions, with paid versions protecting users from malware, phishing and spam and providing a choice of accessing content form different countries.…

    • 417 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Panda Security Case Study

    • 763 Words
    • 4 Pages

    All in all, Panda Gold Protection provides unlimited online security to users to give them the freedom to access websites, and has developed a safe browser and virtual keyboard, coupled with features that go beyond basic security, and constantly keeps user up-to-date with reminders of how many threats blocked, how many emails sent etc. The antivirus software included with it protects the user’s device against any malicious malware effectively. Moreover, Panda also allows adults to monitor and control their children’s internet behavior, and allows backup storage of files and access to a PC from a remote location.…

    • 763 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    [4]Mossman, M. 2011. InfoSec Institute. “Android Security: Taking Control.” Web. 11 May 2011. http://resources.infosecinstitute.com/android-security-take-control/ .…

    • 1705 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Internet privacy has always been one of the most concerning subjects for you the consumer. Since the invention of the computer and the internet, there has always been someone who wanted to ‘conquer' it. We in the computer world like to call these people hackers. Due to this common threat, we as consumers have developed software to repel these hackers. These software programs are called firewalls and anti-virus scanners. Currently, there is an ongoing battle between the hacker and the hackee. Unfortunately, hackers have developed loopholes and software's of there own to work in there favor. Due to the hacker's resources, they can counteract the consumer's software, find alternate loops to the goal and access your computers vital and personal information.…

    • 1055 Words
    • 5 Pages
    Good Essays