Chapter 2 - Secure Software Systems
Security Enhanced five forces
- Competitive rivalry
- Threat of new entries
- Threat of substitution
- Buyer power
- Supplier
- Threats of cyber security
Competitive rivalry
This is the pre-existing force created by existing rivals in the industry.
Threat of new entry
This measures how challenging it will be for a new competitor to enter. Having a low barrier of entry may quickly invite competitors if your product proves to be successful.
Threat of substitution
How easy is it for the product to become obsolete or easily replaced.
Supplier power
How much influence do suppliers have over the product. Is you entire pipeline proprietary? Do you rely on a single company's solution that cannot be easily replaced?
Buyer power
How much influence do buyers have over the product? Is the product non-essential and easily canceled or cut back? More reliance on the product means less buyer power.
Threats of cyber security
If a product is used in a safer environment or is more securely designed than competitors, it will be more desirable.
Implementing business strategies
Competitive analysis
Competitive analysis is the process followed to determine what factors may contribute to competitor forces.
Market strategy
Through competitive analysis, market opportunities can be found which will serve as a base to form a market strategy.
Product strategy
A product strategy needs to be engineered to fit this strategy in order for the product to be successful. Once the strategies are considered, a business case can be drafted to determine the viability of the product in the given circumstances.
Product vision
After considering the market strategy and determining a successful product strategy, a business case can be made. The business case will serve as the figures and evidence that a product can succeed. As the business case is refined, attention can be turned toward making a product vision. A product vision is the story of how the product can be used in the market.