Logo
 FacultyProgramsCourse SchedulesCalendar


Image

BUSINESS INTELIGENCE

Competitor Profiling
Counter Intelligence

It is a harsh reality that 50% of businesses fail in their first year of existence and of those that survive only 10% celebrate their fifth anniversary. This clearly illustrates the value of competitive intelligence.

To enable businesses to track their markets and stay ahead of the competition, Exodus International offers a comprehensive and confidential competitive intelligence service to executives and decision makers, including training of staff in techniques, on-going support and mentoring. We also offer other business consultancy, details are available upon request.

Competitor Profiling

Competitor Profiling is a practical tool designed to make it possible for businesses to fully understand, predict and influence human behaviour, with precision and impact. Understanding the decision makers and main players within an organisation is a critical element when assessing the strengths, weaknesses, opportunities and threats presented by competitors.

Information collected from primary and secondary sources is collated, interpreted and summarised in a standard report format. This is then disseminated according to the client’s wishes to provide accurate, timely and actionable intelligence.

Return to Top

Counter Intelligence

The fundamental objective of counter intelligence is to protect information from those who are not authorised to receive it, to counter potential threats and to enhance security. Counter intelligence not only protects against aggressive and illegal information collection but also open and legal collection efforts that can equally harm a company and affects its ability to compete in its market.

Counter intelligence is an important business task and has to be assigned to an individual(s) who understands intelligence principles, espionage and the stealth like methods employed by those who pry into corporate secrets.
Counter intelligence aims to counter what an adversary may do and comprises defensive and preventative countermeasures such as awareness briefings, technical surveillance countermeasures and penetration testing.

Return to Top