0% found this document useful (0 votes)
9 views34 pages

French

Uploaded by

mehulslv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views34 pages

French

Uploaded by

mehulslv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 34

A complete guide on Franchise

Business Registration in India


What is a Franchise Business? And
Franchise Business Registration in
India
Introduction

India is the world’s third-largest consumer of goods and services. In India, launching
a franchise is a tried-and-true method of launching a business. Some of the most
popular industries for franchise startups are transportation, beauty, fast food,
education, wellness, mail delivery, clothing, and health care. One of the options that
brands have embraced for expansion in India is the franchise business. One can
choose from a variety of inexpensive franchise options in India. This article focuses
on Franchise Business Registration in India, “What is a Franchise Business?”, and
Documents required for Franchise Business registration are mentioned.

What is a Franchise Business?

It is one of the main ways that foreign companies and brands have grown stronger in
the Indian market. A franchisor (franchise brand) is involved in the process and
offers the franchisee (owner of the franchise outlet) conceptual, structural, legal, and
training support in exchange for an upfront start-up fee and royalty payments.

Both the franchisor and the franchisee earn from owning and operating a franchise.
The franchisor can further extend the business in untapped markets, thereby
boosting the market share and revenues, after the franchisee has access to the
brand’s devoted customer base, legal counsel, creative support, and training
support. The most valuable and practical type of business opportunity is franchising.

Legal framework of Franchise Business registration in India

 Franchise Registration

Before entering into an agreement for this purpose, the franchisor is not required by
Indian law to be registered with any professional or regulatory authority. On the other
hand, the Indian Trademark Act makes it easier to record a Trademark’s registered
user.
 Agreement for Franchise Business in India

A franchise is founded on a franchise agreement, with the exception of the obviously


necessary elements of financing, infrastructure, and other necessities. The sort of
agreement used for this purpose varies depending on a number of variables,
including the format, control, type of franchisor, and others.

Franchise agreements must adhere to the Indian Contract Act of 1872’s provisions.
Franchisees may impose disclosure requirements in the contract, subject to this
provision. In this situation, the franchisor’s misrepresentation makes it easier for the
franchisee to file a civil lawsuit for damages as well as a criminal complaint for false
statements of fact and criminal breach of trust.

 Discloser Standards

According to disclosure regulations, which certain nations follow, franchisors must


give franchisees the necessary information before they sign any contracts. By
specifically encapsulating precise disclosure requirements in the aforementioned
franchise agreement, the application of pre-disclosure responsibilities in India is
determined based on said franchise agreement. The Contract Act, 1857’s
“consensus ad idem” clauses, which apply in this case, maybe noted by the readers.

The franchise agreement is also used to establish if this requirement applies to sub-
franchisees. It is important to emphasize that the proposed contractual connections
are subject to common law norms in this case.

No particular formats or obligations exist in connection with continued disclosures in


the absence of any disclosure requirements.

Setting up a Franchise Business in India

 Niche Recognition for the Business

One of the key requirements for any budding entrepreneur aiming to enter the
business world is niche identification. When you finally decide to launch your
franchise, be sure to pick a market that will be beneficial to you in terms of
sustainability and revenue production.

To make an informed choice, it is advised that you do a thorough analysis of the


market and city-specific information. Remember that the popular niches are more
susceptible to ferocious competition.

 Taking Care of the Legalities


Once you have chosen your specialization, be sure to obtain legal authorization from
the Ministry of Corporate Affairs as soon as you sign the franchise agreement with
the relevant business. If the franchise is outside of Indian Territory, be careful to
choose a reputable company that can help you deal with any problems early on.

Once you have fulfilled the aforementioned conditions, officially assume possession.
It is advised to secure a reliable witness while legal proceedings are ongoing to
prevent future legal disputes with the franchisor.

 Essential Licensing for Business

The most important factor for starting a franchise in India is now presented. To work
in harmony with the law, you would require a separate license and registration. For
instance, if your company has a chain of restaurants, you must obtain an FSSAI
License without exception.

 Tax Liabilities for a Business

Every business owner has to understand the tax repercussions. We therefore ask
that you emphasize the same and comprehend the various tax regimes that are
applicable to your company.

India has a wide variety of taxes, from customs duties to the GST, therefore it is
crucial to understand the layers and be prepared appropriately. You can determine
the best approach to avoid paying a lot in taxes at this time.

 Human Resource

Additionally, essential to the franchise’s business operation in India are its human
resources. Therefore, you must be aware of how many employees will be required to
support the operation. In order for the hiring process to go smoothly, you, the owner,
must also become familiar with the responsibilities of the staff.

Conclusion

Briefly stated, a franchise is a solid business plan that lessens the franchisee’s
responsibility to deal with all losses that are more common in other business models.
Franchise is becoming a popular growth-oriented business model in India for
startups and entrepreneurs that do not want to take significant risks up front.

The franchise business model is profitable in India because to the little investment
and few compliances. A franchise consultant should always be present when drafting
a franchise agreement because it is a professional task.
According to recent research 75% of the cyber attacks are at Web

Application level.

In this virtual era, a website is the identity of a company and we


at INVESICS are driven to secure your web applications through our
website security testing service.

The attack is the technique used by hackers to exploit the vulnerabilities of the applications. Attacks like
brute force, SQL injection, Clickjacking, Cross-site scripting (XSS), Cache poisoning, Buffer overflow are
some of the common examples.

Our value proposition is our custom-made services. Yes, we agree that one size fits all, but we believe that
each organization has its own set of requirements that do not suit the one-size-fits-all model. As a result,
we tailor our services to each client's needs and place an emphasis on manually validating any false
positives. A keen mind can uncover what machines can't. Another feather in our cap is end-to-end service.
Following the completion of a project, we give support with all security requirements.

We Believe In Transparent PricingPowering your business with world class Website


VAPT services.
Get Quote

Vulnerability Assessment and Penetration Testing Scope

 Web Internet Gateway and Firewall Analysis

 Web Server Vulnerability Analysis

 Patch level testing and resulting vulnerabilities

 Cryptography related (layer 6)

 Misc Web Services called by Apps, XML Payloads

 Cloud login scenario testing

Download DataSheet

 Rootkit attack possibility and dormantness

 SQL Injection and session stealing attack

 App code related (XSS, Cookie and many more)

 Backend Database reachability and Pentesting

 All listed as BlackBox

 All listed as GreyBox

 Scanning for 1000+ known code level vulnerabilities

Download Sample Report

Common Attack Vectors in a web application

 Compromised Credentials
 Weak and Stolen Credentials

 Ransomware

 Missing or Poor Encryption

 Misconfiguration

 Brute force attack

 Distributed Denial of Service (DDoS)

 Zero-Day Vulnerabilities

Globally Open Web Application Security Project(OWASP) releases a list of

top 10 security risks or vulnerabilities which are

 A1 Injection

 A2 Broken Authentication

 A3 Sensitive Data Exposure

 A4 XML External Entities (XXE)

 A5 Broken Access Control

 A6 Security Misconfiguration

 A7 Cross-Site Scripting (XSS)

 A8 Insecure Deserialization

 A9 Using Components with Known Vulnerabilities

 A10 Insufficient Logging & Monitoring

Reference: https://owasp.org
Drop us your Requirements

GET FREE CONSULTING CALL

Expert cyber-security solutions, atTailor-made


costingThat fit every requirement
Apply for a free Basic scan

Approach and Procedure of test:

Process includes 3 phases:

1. Network Discovery

2. Vulnerability Assessment [VA]

3. Web application penetration testing or web Pentesting [PT]

Invesics's Pen-test approach goes beyond OWASP Top-10

PROJECT PURPOSE

MANUAL PEN-TESTING

REQUIREMENT GATHERING

REVIEW- ANALYSIS

DEFINING SCOPE

REPORTING- SUGGESTIONS

AUTOMATED VAPT

RETEST- CERTIFICATION

Our Security Experts perform the following steps:

 Perform broad scans to identify potential areas of exposure and services

 Perform targeted scans and manual checks and investigation to validate vulnerabilities
 Test components to gain access

 Identify and validate the vulnerabilities

 Rank vulnerabilities based on threat levels, potential loss, and the likelihood of exploitation

 Identify issues of immediate consequence and recommend solutions

 Transfer knowledge

Experience in below Domains but not limited to:

Web Application VAPT Deliverables:

o Password Protected rich Reporting for all Scope

 Vulnerability Listings with severity to fix

 Vulnerability Listings - based on who need to fix that (Developer, Server Admin,
Network Admin)

 Evidence (Images or video) for each vulnerability

 Conceptual fixings guidance for each vulnerability

o Explanation Call with Dev/Fixing Team if required

o Complementary Re-Test within one month of Initial Report Submission

FAQs

What are the things I need to provide you for starting my VAPT assignment?

If it is tool based testing only, we will need URL in case of Web Application, APK file in case of
Android App, IPA file in case of iOS App. If it is a manual based testing, along with previously
mentioned things, we will need dummy credentials of each users roles exists in your system.
Mobile security

Is your Mobile Application Capable enough to handle your customer's

data's privacy?

Mobile Application Penetration testing Key Concepts

Authentication

Authorization

Confidentiality

Availability

Integrity

Non-repudiation

Resilienee

Mobile has become your virtual ID card . Be it digital payment or finding a restaurant on Google or as

important as your AADHAR details ; mobile usage has become inevitable and so are the risks with mobile

data. Trends like BYOD(Bring Your Own Device) have increased the exposure of sensitive company

data.They all use mobile applications that are prone to attacks.

These are some common attacks that hackers use. It can be referred from the graph that how much the data
is exposed.
Phishing, Brute force, and SMiShing attacks are some common examples that are experienced by a
common man.

We Believe In Transparent PricingPowering your business with world class


Application VAPT services.
Get Quote

Vulnerability Assessment and Penetration Testing Scope

 Code Debugging

 Reverse engineering

 Console logging in production code

 Static Analysis

 Dynamic Analysis

 Business logic vuln.

o Server-side validation

o Admin/user account compromise

o Authentication brute forcing

o Root detection-method-bypass

 Local storage flows

o Sensitive data in logs, cache or shared storage

o Check if sensitive data stays after even log out

o Privacy and metadata leaks

 TLS check

o TLS weak encryption

o Bypassing SSL pinning


o TLS authentication flaws

o Insecure data storage

Download DataSheet

 Android server-side checks

o Client side injection (XSS)

o Username enumeration

o SQL injection

o Malicious file upload

o Check for all HTTP methods

o Session management

o CAPTCHA flaws & bypass

 IPC Security check

o Device DOS

o Permissions and digital signature data sharing issues

o Illegitimate applications

o Uncovered Components & Cross App Authorization

 Untrusted Code

o Sensitive information in application error message

o JS execution at WebViews

o Insecure permission setting through AndroidManifest.xml

o Buffer Overflow

Download Sample Report


IOS Application Security

 Exploring iOS file system

 Insecure local data storage

 Broken Cryptography

 Binary Analysis

o Exploit Migration

o All used libraries

 MiTM on iOS

o HTTP traffic

o SSL/TLS traffic

o Bypassing certificate pinning

 Reverse Engineering

 Jailbreaking

 KeyChain dump

 Side channel leakage

o Screenshot caching mechanism

o Cookie Storage

o Device logging

o Keyboard cache storage

Globally Open Web Application Security Project(OWASP) releases a list of

top 10 security risks or vulnerabilities which are


 M1: Improper Platform Usage

 M2: Insecure Data Storage

 M3: Insecre Communication

 M4: Insecure Authentication

 M5: Insufficient Cryptography

 M6: Insecure Authorization

 M7: Client Code Quality

 M8: Code Tampering

 M9: Reverse Engineering

 M10: Extraneous Functionality

Reference: https://owasp.org

Drop us your Requirements

GET FREE CONSULTING CALL

Expert cyber-security solutions, atTailor-made


costingThat fit every requirement
Apply for a free Basic scan

Approach and Procedure of test:

Process includes 3 phases:

1. Network Discovery

2. Vulnerability Assessment [VA]

3. Web application penetration testing or web Pentesting [PT]

Invesics's Pen-test approach goes beyond OWASP Top-10


PROJECT PURPOSE

MANUAL PEN-TESTING

REQUIREMENT GATHERING

REVIEW- ANALYSIS

DEFINING SCOPE

REPORTING- SUGGESTIONS

AUTOMATED VAPT

RETEST- CERTIFICATION

Our Security Experts perform the following steps:

 Vulnerability assessment [VA] is based on the dynamic approach. The process of mobile
application pentesting is recognizing potential entry points and vulnerabilities that can be
exploited.

 Exploitation - Penetration testing [PT]is the use of tools and languages like PYTHON. Our security
experts recreate methods of malicious hackers, trying to exploit the discovered vulnerabilities
and attacking with various attacks like SQL injection, Buffer overflow attack, etc.

 In the discovery phase information is gathered which is generally called RECONNAISSANCE which
gives a review of publicly accessible information and resources.

 It is basically done to intercept the traffic between the mobile application and API[Application
Programming Interface]

 PURPOSE- To understand the working of mobile applications and trying to manipulate their
functioning to check if any unwanted information is displaying.

 COVERED FACTORS: Data storage, Network communication between the application and server,
Interaction with the platform, Security configurations, Source code

 Transfer knowledge

FAQs

What are the things I need to provide you for starting my Mobile VAPT assignment?
In case of Android app, you are requried to provide APK file. In case of iOS app, you are required to
provide IPA file. If it is a manual based testing, along with previously mentioned things, we will need
dummy credentials of each users roles that has access of respective apps.
What is the difference between Mobile App VAPT and Mobile App Secure code review?Does Invesics
have certain certification which are required?How can I make sure my details and application data will be
in a safe hand?While Mobile App pen-testing, do you check APIs as well?Do I need to opt for API pen-test
saperately?What am I supposed to do if I have extra requirements on my project?What am I supposed to
do if I am not interested to work with Invesics, after doing the payment?

We Believe In Transparent Pricing


Customer trust is top most priority & we keep our customers happy by giving most
comprehensive security solutions at the best affordable price.

Feature

Static Application Security Testing (SAST)

Dynamic Application Security Testing (DAST)

Automated Deep Scan

Credentialed Scan

Malware Scan

Manual Scan by Experts

Role-based Access Control check

Business Logic testing

Zero False Positives

Certified Tester

Vulnerability Report(No Application Health/ Security Matrices)

Remediation Advice

Comprehensive Report

24X7 Support
Feature

Re-testing

Certificate of Security

97% of enterprise companies were detected with suspicious network activity. Is

your company one of these?

Network comprises the backbone of an organization through which all the data keeps transmitting. Hence, it is a critical

aspect to secure your components as well as systems and servers in your network and assure data privacy and its availability

and integrity.
The Vulnerability Assessment will help the organization to be aware and gain knowledge about the risk

and threats based on the environment while Penetration test will attempt to break through the

vulnerabilities found and determine any possibility of malicious activities or unauthorized access.

In this context, network testing must address how to determine the correctness of a collection of tested

network components, combined in any of a range of configurations.

This is but limited to the scope of technical IPs included in the entire network.

Our experts differentiate and suggest assessment methodologies and processes based on the business

requirements and network architecture.

Stages of Network Penetration Testing

Discovery – Discovery of Host is done by various methods. Then different ports are scanned for any
vulnerabilities.

Assessment – Vulnerability assessment through service fingerprinting. Then the vulnerabilities are
research and checked through cross referencing./b> – Discovery of Host is done by various methods. Then
different ports are scanned for any vulnerabilities.

Exploration – This step is formulated to totally create a hacker like situation and to resolve it. The
possible attacks and attack vectors used and to show how the system is lacking therequired strength.

We Believe In Transparent PricingPowering your business with world class Network


VAPT services.
Get Quote

Vulnerability Assessment and Penetration Testing Scope

 Information gathering
o Identify live host

o Identify OS type

 Perform vulnerability scanning

o DoS services

o Web scan services

o SSL scans on all ports

o TCP UDP scans

 Audit SSL

o Self-signed certificate

o SSL version 2 and 3 detection

o Weak hashing algorithm

o Use of RC4 and CBC ciphers

o Logjam issue

o Sweet32 issue

o Certificate expiry

o Openssl Change Cipher Sec issue

o POODLE vulnerability

o Openssl heartbleed issue

Download DataSheet

 Perform fingerprinting

o Identify hosts and footprint

 Find insecure databases and components

 Network port scanning

 Exploit vulnerabilities

 Find insecure services


 Hunting Common ports

o DNS (53) UDP, SMTP (25) TCP

o SNMP (161) UDP, SSH (22) TCP

o Cisco VPN (500) UDP

o SMB (445,137,139) TCP

o FTP (21) TCP

o Telnet (23) TCP

o RPC (111) TCP/UDP

o NTP (123) UDP

o HTTP/HTTPs - (443,80,8080,8443) TCP

o SQL Server (1433,1434, 3306) TCP

o Oracle (1521) TCP

Download Sample Report


Drop us your Requirements

GET FREE CONSULTING CALL

Expert cyber-security solutions, atTailor-made


costingThat fit every requirement
Apply for a free Basic scan

Why Network Pen-testing? / Scope

The goal of testing is to find faults in the network to correct them. The network testing problem is
important because networks are hard to build correctly, and even networks that appear to work most of the
time may have subtle bugs that require intermittent action.

The network testing problem is especially hard because networks are dynamic. The component network
elements change. The configuration of a given network element may also change. The connectivity of the
network may change because components enter and leave; it may also change because of failures.
In this context, network testing must address how to determine the correctness of a collection of tested
network components, combined in any of a range of configurations.

Network VAPT process

How is IP/Network pentesting different from IT security Audit ?

IP (Network) Pen-Testing

In IT infrastructure audits, detailed analysis of the current architecture, internal

security of system components, current policies and other infrastructure related

parameters are considered and performed by using a phased approach for overall

information security of the organization.

What are the things I need to provide you for starting my Network VAPT assignment?
Our executive will provide you an Questionnaire, which asks some details of your network like IPs, Server
details etc. These details you need to provide in order to start the assignment.
What is the difference between Network VAPT and Infrastructure (Network) Audit ?Does Invesics have
certain certification which are required?How can I make sure my details and application data will be in a
safe hand?I have multiple office locations. How is testing performed on my Network?What am I supposed
to do if I have extra requirements on my project?What am I supposed to do if I am not interested to work
with Invesics, after doing the payment?

Having more Questions? Ask us

Security Team

We are empowered by a passionate and diligent team of Ethical Hackers with certifications from the EC
Council, OPSEC and 210W-01 to 210W-10 Cyber Security for Industrial Control System series.

What is Cloud penetrationCloud penetrationCloud penetration testing?


Cloud penetration testing is the practice of performing offensive security tests on a cloud in order to

identify security flaws before hackers do. Depending on the type of cloud service and the provider, various

manual methods and automatic tools may be used.

Benefits

Cloud penetration testing assists organizations in three ways:-

 Improving overall cloud security

 Avoiding breaches, and achieving compliance

 Attain a thorough understanding of cloud assets, achieve a thorough understanding of the cloud
assets, particularly the sensitivity of current cloud security to attack and the existence of
vulnerabilities
Purpose

Cloud penetration testing assists in:-

 Identifying risks

 Vulnerabilities, and gaps and assessing the impact of exploitable vulnerabilities

 Determine how to leverage any exploitation-obtained access

 Provide clear and comprehensive,actionable remediation information

 Provide best practises for maintaining visibility

Drop us your Requirements

GET FREE CONSULTING CALL

The Most Common Cloud Security Threat

Cloud penetration testing can aid in the prevention of the following types of

cloud security threats

Misconfigurations
Breach of Data
Malware/Ransomware
Advanced Persistent Threats (APTs)
Compromises in the Supply Chain
Inadequate Identities and Credentials
Poor Access Management
Insecure APIs and interfaces
Unsuitable Use or Abuse of Cloud Services
Shared Services and Technology Issues

Expert cyber-security solutions, atTailor-made


costingThat fit every requirement
Apply for a free Basic scan
Cloud penetration test attack vectors

Attack the cloud environment from within a customer's access context, simulating the impact of a
compromised customer system or partner network

 Obtaining access to the backbone infrastructure of a CSP.


 Endangering other cloud service tenants.
 Escalating privileges within the customer environment

Assume the role of an anonymous attacker and launch an Internet-based attack against the cloud
environment.

Assume the role of an anonymous attacker and launch an Internet-based attack against the cloud
environment.

Attack the corporation by gaining a foothold in the environment via social engineering.

 Compromising systems in order to collect credentials for the cloud environment.


 Interfering with systems in order to gain access to source code or other sensitive programming
material.

OUR services

Cloud Configuration Review is an evaluation of your Cloud configuration against industry best practices
and benchmarks. A report is created that includes a summary table that shows the benchmarks and whether
you are following best practices, as well as individual technical findings in more detail, detailed
explanation, and remediation advice.

Cloud Penetration Testing employs a combination of external and internal penetration testing techniques to
examine the organization's external posture. Unprotected server blobs and S3 buckets, servers with
management ports open to the internet, and poor egress controls are examples of vulnerabilities discovered
through this type of active testing.
Cloud pen-testing, either it is a configuration review, or a penetration test, or both, is
concerned with analyzing the security in the following key areas:

External attack surface – Identify all possible entry points – Web Applications, Storage Blobs, S3 Buckets,
O365, SQL/RDS Databases, Azure Automation APIs, AWS APIs, Remote Desktops, VPNs, and others.

Authentication and Authorization Testing – Ensure that users in the environment follow the Principle of
Least Privilege, are protected by robust multi-factor authentication policies, and that known ‘bad
passwords' are not used.

Virtual Machines / EC2 – Azure provides two types of virtual machines: Classic and v2. These virtual
machines will be tested to ensure that they are protected by Network Security Groups (NSGs – similar to
firewalls) and that their data is encrypted at rest. Audits of missing patches and their effects are included
wherever possible. In the places where virtual machines are publicly accessible, the external interfaces of
those machines will be examined.

Storage and Databases – This area of testing will actually analyze the storage blob permissions as well as
subfolder permissions to ensure that only authenticated and authorised users can access the data contained
within. Examining the database (either on virtual machines running SQL Server, or on physical machines).

Authorization and Policies for Cloud Penetration TestingAuthorization and

Policies for Cloud Penetration TestingAuthorization and Policies for Cloud

Penetration Testing
Before beginning a penetration test, Microsoft (Azure) and Amazon (AWS) used to require testing
authorization. This is no longer an issue, but apart from a few AWS exceptions, you are no longer required
to request authorization for a cloud penetration test for Azure, AWS, or GCP.

Policy for AWS Pen Testing https://aws.amazon.com/security/penetration-testing

Rules of Engagement for Azure https://www.microsoft.com/en-us/msrc/pentest-rules-of-engagement

GCP https://partner-security.withgoogle.com/docs/pentest_guidelines.html
Have you done your secure code review yet?

Get your website/mobile application code analyzed to ensure that proper security controls are in place in accordance with

security standards!

Receive a Sample SCR Report


Click here

Gain a Sample Certificate


Click here

Our secure code review methodology

Drop us your Requirements

GET FREE CONSULTING CALL


Selecting INVESICS's Secure Code ReviewSecure Code ReviewSecure Code

Review is simple because

Our Secure Code Review service assists in identifying

Hidden vulnerabilities
Insecure Coding Practices
Design Flaws
Injection flaws in backdoors
Bugs in Cross-Site Scripting
Cryptography Flaws

Expert cyber-security solutions, at Tailor-made costing That fit every

requirement

Apply for a free Basic scan

OWASP Secure Coding Guidelines

01

Input Validation
02

Output Encoding
03

Session Management
04

Access Control
05

Cryptographic Practices
06

Error Handling and Logging ? ?


07

Communication Security ? ?
08

System Configuration ? ?
09

Database Security ? ?
10

File Management
11

Memory Management
12

General Coding Practices

Primary advantages of the service:?

 Extensive Review Techniques

 Extensive Code Analysis

 Customized Reporting

 Complies with Industry Standards ?

 Provide Patching Solutions for Vulnerabilities

Best Security Standards in the Industry

Our experts employ practices that adhere to the industry's highest security standards, ?such as reference ?
https://cwe.mitre.org/data/definitions/497.html
SANS25 Secure Coding Guidelines
 Out-of-bounds Read, Integer Overflow or Wraparound

 Improper Restriction of Operations within the Bounds of a Memory Buffer

 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

 Exposure of Sensitive Information to an Unauthorized Actor

 Use After Free, Improper Authentication

 Cross-Site Request Forgery (CSRF), Missing Authorization

 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Why Partnership
In this ever-progressing environment, more and more businesses are going digital. Through the Invesics
Value-added Partnership Program, you will be able to provide your customers with white-label Cyber
Security Solutions, with us as your extended team.

This will enable you in delivering your customers with great projects that have been thoroughly assessed
for cyber security loopholes, while helping you stand out among your competitors.

Business Partnership

If you are an Independent Business consultant / Development Firm / Domain Expert - having base of
customers, who are having requirement of our services, we invite you for the Business Partnership.
You explore the customer base, generate the inquiries and share the details with us. Our team will take the
next charge, talk to prospect, share the quote and help him achieve Security within his product /
infrastructure. We will share the mutually decided Operational Fees with you.

Are you an I.T Service/Development Company? IT Consultant? Marketing Consultant? Individual


Business development executive? Domain Expert - i.e. CA, Lawyer, Advisor ? - and looking for any
Cyber Security / Cyber Forensics / Secure Development service provider?

Yess, you have landed to a right place! Talk to us ... We work with various options like Profit sharing,
Revenue sharing, fixed or percentage based Referral fees etc.

Flexible Partnership Model

We are open to work in multiple win-win partnership models. Flexibility in terms of branding and terms
helps to build relations that last long. Talk to our consultant now (Tel: +91 987-999-0115) to begin with.
Dedicated Account Manager

Our Partners

7 Cloud Infotech
7 cloud InfoTech provides all the digital solutions under the one roof. 7Cloud Infotech started with a vision of delivering
High-Quality IT Products considering the requirements and resources provided by the client.

SOFTN ENTERPRISE
SoftN Enterprises, started by industry experts with 28 yrs of diverse experience in Technology and Management. SoftN
Enterprise believe on No Problem is too Small to Solve. SoftN Enterprise also provide solution automobile, Finance and
System Audit.
SmartNSpaces
SmartenSpaces help you deliver seamless experiences in the spaces of the future with user-friendly technology for
workplace management, space management and tenant engagement. Smartenspaces also the first company in the world to
deliver an end-to-end SAAS solution for the digital workplace. Configuring a hybrid workplace takes time, expertise and a
knack for managing spaces. Luckily, they have all three.

XCEL TECH
XcelTec is a team of software engineers, technology champions, and fictive designers. We are focused on delivering
amazing software products to our clients. Currently, we are 100+ software engineers, innovative designers, technology
consultants, and digital marketers. A large headquarter in India. XcelTec excels in every aspect of Microsoft technology, E-
commerce, M-commerce, IoT, Blockchain, and open source technology.

Savithru Technologies
Savithru is a bespoke software & Web development company based in Bangalore, India. We offer Software Development ,
Web application development, mobile application development, and Domain + Hosting. We deliver maximum business
value to their customers by designing, developing, implementing and maintaining efficient and high quality software
solutions aligned with their most essential business needs. Savithru has experienced & responsible team is our core strength
and a satisfied customer is always their goal.

Serpent Technologies
Serpent Consulting Services Pvt. Ltd., an ISO 9001:2008 certified (Since 2015) and now a multinational firm was founded
back in December 2011 with a vision of Mr Husen Daudi & Mr Jay Vora to start a companionship that every company
around the world can relate to! Both Mr Husen Daudi & Mr Jay Vora have a gigantic experience working in
OpenERP/ODOO. They have been in the same field since the year 2007 OpenERP/ODOO & ERP domain has been the
core skill set of Serpent Consulting Services.

Cyber octet
Rajesh Sapkal
Chief Mentor – Principal Security Consultant

Rajesh Sapkal is Chief Mentor and Principal Security Consultant at


Cyber Octet Private Limited , Rajesh is a senior executive with
global outlook, having 19 years of increasingly responsible
professional experience with leadership roles in top multinational
organisations like KPMG, Wipro, WNS Global Services, Oracle,
Kanbay and Capgemini. His experience spans across consulting,
Banking, Financial services, IT and ITES sectors. Rajesh has strong
experience in cultivating, managing and motivating cross cultural
teams across geographies.

Rajesh hold Certifications like Certified Information Security


Auditor (CISA), Certified ISO 17799 (BS7799) Implementation
Expert , Forensics and Cyber Crime Investigator, Checkpoint
Certified Security Administrator (CCSA) ,Microsoft Certified
Professional (MCP), Certified Netware Administrator (CNA) –
Novell, Rajesh has the business acumen and requisite skills and
experience to provide strong and effective leadership and to act
as a catalyst in significantly contributing to the vision of a
company and creating value for it. He is a strategic thinker with
strong organization and planning skills and has the executive
experience in driving organizational change and process
improvement to attain highest standards in Information Security
operations

Darshan Pathak
Chief Sales Officer

He has overall 12+ years of experience in multiple Industries like


Advertisement & Marketing and Hospitality management He has
developed many marketing & sales plans over this year which
helped employers in order to achieve Goals of Enterprise and
Sales Target.
He has worked as Sales head in MNCs and has extensive
knowledge of Sales Policies and Processes as well as
Implementation of Sales Plans and he has achieved Targets
single- handedly.

Akshit Arora
Marketing & Development Head

Akshit has served IT Sector for more than 10 Years and was Lead
Developer for many Orgaisation, he hold his expertise for
developing E-commerce, e-learning, ERP & CRM Platforms. He is
continuously making his efforts to bring down the Passion within
the students from rural & urban areas and helping them convert
into their dreams. He is also a Founder of Samarthya – an
Initiative by Innovative Jumbo.

Akshit is a Coder by Heart and Marketer by Brain. He is focused


on accomplish Cyber Octet’s Vision in Development. His
responsibilities include managing the Development & QA of
Products & Marketing Activities. As Technology Evengalist he
plays an important role for Growth of Cyber Octet in PAN India
region.

Zakir Hussain
Senior Application Developer

Mr. Zakir Hussain works as a Senior Application Developer in


Cyber Octet Private Limited. Mr. Hussain holds 10 years of
experience in the development and management of various
online technologies and tools. He has worked on more than 150
projects in the field of Application and Server Development.

Zakir has a 360-degree expertise on various IT domains, such as


Application, Server, Cloud, and Digital Marketing, as well as Data
Mining. Few of the technologies where he has got an expertise
and hands-on experience are Php-Wordpress, Joomla, Magento,
Symphony and Laravel, ReactJS, NodeJS, Python, Google, AWS,
New Relic, Application Security Testing, Secure Coding, Digital
Marketing, and so on. Zakir’s role and contribution has also been
prominent in the field of Open Source Technologies and Tools.
He did his MSc in Information and Technology;he further aspires
to have a doctorate degree in Big Data and Automation. His
current area of research are Automation, Big Data, and
Application Security.

Rachana Raval
Social Media & Operations Manager

Ms Rachana Raval works as an Executive Assistant to Managing


Director. She is also managing the internal team, operational
activities, graphics designs and leads different digital campaigns.
Rachana has completed her Masters in Commerce. She is having
5 years’ experience in managing the Education Institution. Her
roles and responsibilities were operations, faculty management,
vendor management till 2020. Team spirit, multitasking, graphics
designing is her main skill set.

Mitesh Patel
Senior Security Analyst

Mitesh Patel works as Senior Security Analyst at Cyber Octet


Private Limited. He holds experience of 3 years in cyber security.
Mitesh is a part of our Technical team of Cyber Octet. He is expert
in web application security, penetration testing, investigation
methodologies, finding vulnerabilities, research and disclosure.
He is very focused on accomplishing the vision.

Tirth Shah
Cyber Security Analyst & Project Coordinator

Tirth Shah works as Security Analyst at Cyber Octet Private


Limited. He is part of Security team. He has completed his
Bachelor of Engineering. He holds 2 years experience in the field
of VAPT and security assessments. His knowledge comes as a
huge asset for security and other related subjects. Tirth holds
expertise in SIEM Implementation, malware analysis, IT security,
cloud security assessment in IT companies.
Ruheen Chhipa
Business Development Executive

Ruheen Chhipa Works as Business Development Executive at Cyber Octet


Private Limited. she has successfully finished a course in digital marketing
from Google Garage as well as an advanced diploma in cyber security and
ethical hacking from Cyber Octet pvt ltd. She has also taken courses in
marketing management. She oversees the business development process
and develops and implements new commercial opportunities.

Sufiyan Memon
Security Analyst

Sufiyan Memon works as Security Analyst at Cyber Octet Private Limited. .


He is part of Security team. He has completed his Bachelor of Engineering.
His knowledge comes as a huge asset for security and other related
subjects. He has one year of experience working as an IT Service and
Cyber Security Analyst and is well-versed in firewall administration,
endpoint security, network security, vulnerability assessment, penetration
testing, documentation.

Jayant Gajjar
Jr. Cyber Security Analyst

Jayant Gajjar works at Cyber Octet Private Limited as a Jr. Cyber Security
Analyst. He is a member of the Security team. He has a diploma in
computer engineering and an advanced diploma in ethical hacking and
cyber security. He has one year of experience as an IT Auditor and Cyber
Security Analyst and is knowledgeable about firewall administration,
endpoint security, network security, vulnerability assessment, penetration
testing, documentation, and ISO 270001.

You might also like