Auditing in TMF615 and its Benefits

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Auditing in TMF615 and its Benefits"

Transcription

1 Auditing in TMF615 and its Benefits MOHAMMED IBRAHIM ALEEM ARCHITECT, WIPRO TECHNOLOGIES

2 Table of contents Introduction Auditing in TMF615 Specification Security Breach Problem Description Problem Analysis using TMF615 Auditing Finding the Login Account and User Finding the Login and Logout time Gathering User Information Checking the Account in the Target Who Created the User? What Were the Details of This Suspect User? Who Created the Account? Asynchronous Mode in Auditing Conclusion Appendix References Terms and Definitions About the Author

3 Introduction TMF615 specification, a specification detailed by the TM Forum, empowers service providers by enabling centralized user management by detailing an interface between the centralized and local user management systems. TMF615 specification also has an exceptionally strong auditing feature which provides a comprehensive mechanism to monitor all the user and admin activities in the service provider network. This auditing feature can be effectively used in monitoring the security of the enterprise. This whitepaper lists out the advantages of auditing in TMF615 specification and explains through scenarios as to how exactly it can be used to resolve security issues. It is clear that monitoring security breaches through TMF615 auditing will help create a compliant and risk optimized system that will have a definite competitive advantage. TM Forum or the Tele- management Forum is an international association of industries that seeks to deal with the complex issues that are inherent in the business of service provision. Vendors subscribe to the standards, specifications and procedures directed by the TMF. Wipro has found it expedient to comply with TMF s guidelines to provide the best value to its customers. In this paper, we discuss TMF615 specifications in particular and how complying with these specifications can help investigate and, thereby, minimize security risks. Telecom service providers have for long lived with the problem of provisioning/managing users and access rights across the various OSS (Operation Support System) products managing the network. In order to address this major issue, TM Forum has developed the TMF615 specification which advocates managing the entire user provisioning and auditing needs from a single place for the entire organization. In Wipro s own experience with telecom service providers, auditing with these specifications has been useful in detecting security threats and managing the network effectively. The below figure gives a overview of current problem pertaining to User Provisioning in large service networks with multiple OSS vendor solutions. OSS Provider 1 User Management Network OSS Provider 2 OSS Provider n User Management Process Flow of User Management in Heterogeneous Networks 02

4 TMF615 Solution TMF615 specification details an interface which makes it possible for service providers to consistently provision telecom OSS operator s access rights and authorities across systems using a central user management system (UMS-C). The interface deals with the information exchange required between UMS-C and local user management system (), related to the provision of access rights, authorities and auditing. is a local UM solution for the OSS, which is usually vendor specific OSS. TMF615 specification introduces the concept of UMS-C and, and provides a Web Services based integration profile. Following are some of the key advantages of TMF615: Centralized User Provisioning across the Network Ability of Service Provider to Define Roles Centralized User Auditing Significant Savings in terms of Money and Effort Each administrator action at UMS-C will result in a simple object access protocol (SOAP)/http message coming to, which will be processed, based on the request type and appropriate response will be sent back to UMS-C. The picture given below illustrates the process. User Access OSS Provider 1 Network OSS Provider 2 WSDL/SOAP UMS-C OSS Provider n User Management User Access TMF615 Compliant User Management 03

5 Auditing in TMF615 Specification Auditing is absolutely necessary for any user management system to monitor the activities of provisioned users/administrators and prevent misuse. TMF615 specification supports two types of auditing. Status Audit This is mainly used to synchronize UMS-C and with each other. This checks the user accounts and their authorities currently at. Following are the Status Audit operations supported by TMF615 specification: User Provisioning Information Target Account Information Audit Trail This deals with monitoring the activities of provisioned users over a period of time and is very critical to security. Reports which provide details on the user status and actions performed can be generated. Following are the Audit Trail operations supported by TMF615 specification: User Admin Operations User Provisioning Operations Target Admin Operations Targets Account Usage Targets Authorization Usage In order to get more information on individual audit operations, please In the following chapters, we explain each of the advantages of auditing mentioned in the TMF615 specification. To make the benefits clearer, we consider a practical problem scenario and show how different auditing features can be used for analysis and reporting. Problem Description- Security Breach A major problem faced by operators is the constant threat to security. A number of operators work round the clock to ensure that there is no loss of service to the subscribers while simultaneously ensuring that there is no loss of revenue data which is a prerequisite for billing purposes. Each of these operators has a unique role and is dedicated to specific tasks like monitoring network events, faults etc. There are number of applications which the operators use for effective monitoring and reporting purposes. Typically, the operator who monitors the network is intimated of many critical alarms indicating the loss of events from the network. This is quickly escalated to the network administrator. The network administrator during his monitoring of the telecom network discovers that the configuration of the critical section was radically transformed leading to service outage to the end customers. It leads to major management escalation as it caused a huge revenue leak and loss of credibility for the organization. The below figure depicts this problem. check TMF615 specification document from TM Forum. Network OSS SSO Network update User Access Security Breach Network Configuration Change 04

6 Problem Generation- How is the problem created? The following diagram is a pictorial representation of how the administrator creates a new user. The user is added to the which, in turn, updates the Database store. Automatically, the OSS application is updated with the new User Account along with its role. UMS-C DataStore Target/ OSS Application Create New User AddUser() Admin Create User and Accounts with Role () Create User and Accounts with Role () AddUser() Sequence Diagram Administrator Creates a New User Subsequently, the new User logs in and updates the network configuration creating the problem, as illustrated below. OSS SSO Application DataStore Target/OSS Network Login() User Logout() Update Network Configuration () Update Network Configuration () Sequence Diagram User Changes the Network (Problem Creation) 05

7 In the final act the user and its accounts are deleted by the administrator, this is illustrated below. UMS-C DataStore Target/ OSS Application Delete User Remove User() Admin Delete User and Accounts with Role () Delete User and Accounts with Role () Remove User() Sequence Diagram - Admin Deletes the User Problem Analysis- Using TMF615 Auditing Ideally, the operators who were assigned the role of Network Configurators (usually administrators or senior operators) could have implemented the network update activity. However, initial investigation revealed that none of them were actually present in office when the security breach was suspected. The TMF615 Audit feature provides a good framework for tracking and locating the exact problem. Following is a step-by-step procedure that can be followed by the auditor to resolve this specific issue. See how after every step, the auditor finds more critical information that helps him get to the root of the problem. All the steps have been mapped to audit functions mentioned under TMF615. The first task is to find the login account and user. Finding the Login Account and User The only information available to the auditor at this stage is that any operator who has been assigned the role of Network Configurator is capable of damaging the network. In order to find out which users/accounts were used with this role during that time period, the auditor can use the audit operation Target Authorization Usage. This audit operation gives a list of all accounts (and their users) which posses the role Network Configurators and were active during the specified time period. Now in this list, the auditor has to scan the accounts/users and find out the account used and the suspect user. After a brief analysis, the auditor isolates the account/user which seems to be dangling and does not actually belong to any of the existing operators or administrators. Finding the login account & user Target Authorization Target Authorization Mapped to Usage under Usage gives a TMF615 Process list of all Output accounts (and their users) Suspect user & account ID The next task is to locate the time period when the suspect account was actually used. 06

8 Finding the Login and Logout time In order to find the exact time slot when the suspect account was This audit operation gives the exact time slot, with login and logout time, during which this account was active. This establishes the user, account and the time duration during which the damage was inflicted. active, the auditor uses the audit operation Target Account Usage. Finding the login & logout time Target Account Usage under Target Account Usage gives the Mapped to TMF615 exact time slot Process with login & Output logout time Time slot of the security breach Gathering User Information In order to gather all the details about the user, the auditor uses the audit operation User Provisioning Information. This audit operation However, it might happen that this audit operation does not yield any significant result. The lookup user operation informs that the user does not exist. gives all the user details like accounts, roles and its working schedule. Gathering user information User Provisioning Information under TMF615 User Provisioning Operations gives user details like accounts, role and working schedule Mapped to Process Output User does not exist Checking the Account in the Target As the user is not found, the auditor tries to check if the account exists only on a target system without user association, like a dangling Information". This operation might not lead to any substantial information either. The auditor now believes that the problem in the network is not a mistake committed while using the tools but a clear case of intentional security breach. account. For this the auditor uses the audit operation "Target Account Checking account in the target Target Account Information Mapped to under TMF615 Process Output Target Account Usage provides account information Suspect account does not exist on target The next steps are crucial in locating the exact problem. 07

9 Below is a sequential illustration of the process by which the auditor is able to track down the User, account and time slot of the problem. Auditor UMS-C Datastore 1.a Finding the login account and User 1.d Finding the login account and User 1.b Target Authorization usage() 1.c Target Authorization usage() 2.a Finding the login and Logout time 2.d Finding the login and Logout time 2.b Target Account usage() 2.c Target Account usage() 3.a Gather all the user information 3.d Gather all the user information 3.b Users Provisioning Information() 3.c Users Provisioning Information() 4.a Check the account in the Target 4.d Check the account in the Target 4.b Target account Information() 4.c Target account Information() Sequence Diagram Auditor Locates Suspect User, Account & Time Slot of Problem Creation Who Created the User? In order to determine who was responsible for creating the user, the auditor uses the audit operation User Admin Operations and specifies the time range in which the deed was committed. This audit the suspected user was created and deleted after a short span of time. Also, it reveals crucial information about which of the existing administrators created it. Administrator can be identified using the request identifier at UMS-C. operation gives a wealth of information to the auditor. It reveals that User creation User Admin Operations User Admin Operations Mapped to under TMF615 provides Process information about Output the administrator who created the user Suspect account does not exist on target What were the Details of this Suspect User? Auditor can use the audit operation User Provisioning Operations to determine the exact provisioning details of this user. Details of the suspect user User Provisioning User Provisioning Operations Mapped to Operations provides under TMF615 Process provisioning details Output Provisioning details of the user 08

10 Who Created the Account? at the root of the problem is identified by using the advanced audit features supported by TM615 specification. Thus, the TM615 specification is successful in delivering in a situation that requires investigation into a security breach problem. Similarly, several other problems can also be identified and resolved by the TM615 specification. Finally, in order to determine similar details for the account, the auditor uses the audit operation Target Admin Operations and specifies the time range. This step reveals that the suspected account was created and deleted after a short span of time. More importantly, the administrator responsible for creating it is identified. The administrator who is Creator of the account User Provisioning Operations under TMF615 User Provisioning Operations provides provisioning details Mapped to Process Output Provisioning details of the user Below is a sequential illustration of how the auditor is able to isolate the details of the suspect User, account and administrator 5.a Who created the user? 5.d Who created the user? 6.a Get the details of this suspect user 6.d Get the details of this suspect user 5.b User Admin Operation() 5.c User Admin Operation() 6.b Users Provisioning Operations() 6.c Users Provisioning Operations() Get Admin Operation Data() Get Admin Operation Data() Get History User Data() Get History User Data() 7.a Who created the account? 7.d Who created the account? 7.b Target Admin Operations() 7.c Target Admin Operations() Get History Account Data() Get History Account Data() Sequence Diagram Auditor Gets Details about Suspect User, Account & Administrator 09

11 Future challenges: Asynchronous Mode in Auditing The only aspect of auditing that TMF615 leaves unresolved is the asynchronous mode of auditing. This, however, is a challenge for the future. As depicted in the illustration below, the asynchronous mode of auditing allows the to collect auditing data regularly and send the reports to UMS-C. Such reports are extremely useful to the administrator in managing and monitoring the OSS security effectively. UMS-C DataStore Target/ OSS Application Create New Auditing Request Enable Auditing() Admin Activate Auditing Log Collection() Activate Auditing Log Collection() Enable Auditing() Collect Audit Data() Auditing Report Collect Audit Data() Collect Audit Data() Auditing Report Collect Audit Data() Sequence Diagram Asynchronous Mode in Auditing Compliant and risk optimized solution TMF615 is specifically geared towards enhancing the efficiency of a system focusing on the security threats that plague modern result in compliant and risk optimized solutions that have a distinct competitive advantage. Given this benefit, it is only a question of time before more telecom services providers adopt TMF615 specifications to ward-off security threats and manage the system more effectively. organizations and systems. Systematic investigation of security breaches 10

12 Conclusion It is clear that TMF615 supported auditing delivers huge benefits to service providers. Auditing can also be managed completely at the UMS-C, if it captures all the user provisioning data sent to sthe major advantages of TMF615 are: Centralized management of all operators in the service provider network Single sign on/off can be realized quickly through proper integration with TMF614 specification Increased security with the auditing feature Increased security due to proper management of operator permission and schedule Following future improvements are being considered for enterprise security at TM Forum: Asynchronous operations support Enhanced error reporting More information for operators relating to integration and migration to TMF615/TMF614 and SCA standards Specific ongoing work in order to standardize audit through "Security Compliance Audit Automation (SCA)" Faster user provisioning and increased automation leading to considerable cost benefits Despite these improvements suggested for the future, TMF615 is definitely geared towards creating compliant and risk optimized systems. Telecom services providers would have a competitive edge were they to adopt this solution for their systems. 11

13 Appendix References Terms and Definitions TM Forum. TMF615 Specification. Website: omoss/37358/article.html Unified Modeling Language (UML). Website: World Wide Web Consortium (W3C). SOAP 1.2 Specification. Website: Oasis Advancing Open Standards for the Information Society. SPML 2.0 specification. Website: etom enhanced Telecom Operation Map NE Network Element OS Operating System OSS Operation Support System SOAP Simple Object Access Protocol SSO Single Sign On TMF Tele Management Forum World Wide Web Consortium (W3C). WSDL 2.0 Specification. Website: 12

14 Mohammed Ibrahim Aleem is an Architect working with Wipro's Global Media and Telecom division. He has extensive experience is architecting/designing and providing consultancy for telecom OSS solutions. He is a specialist in the areas of identity management and security. He has been involved with many telecom solution implementations and consulting assignments and is well aware of the processes, standards and the best practices involved. He is an active member of the Enterprise Security Group at TM Forum and is working closely towards the development of user management and single sign on/off standards. Wipro in Media & Telecom Wipro Global Media and Telecom is the newly formed SBU which combines Telecom Equipment Vendors (TEV), Global Communications Service Providers (GCSP) and Media & OTT business units globally. Wipro is a strategic partner across the digital supply chain starting from content creation to content consumption and uniquely positioned to address Digital transformation and help organizations Do Business Better in a Digital World. Wipro s vertically aligned business model gives a deep understanding of customers businesses to build industry specific solutions, while technology service lines provide the ability to design new solutions on emerging technologies delivering winning business outcomes. About Wipro Technologies Wipro Technologies, the global IT business of Wipro Limited (NYSE:WIT) is a leading Information Technology, Consulting and Outsourcing company, that delivers solutions to enable its clients do business better. Wipro Technologies delivers winning business outcomes through its deep industry experience and a 360 degree view of Business through Technology helping clients create successful and adaptive businesses. A company recognised globally for its comprehensive portfolio of services, a practitioner s approach to delivering innovation and an organization wide commitment to sustainability, Wipro Technologies has over 120,000 employees and clients across 54 countries. For more information, please visit or 13

15 DO BUSINESS BETTER W W W. W I P R O. C O M N Y S E : W I T OV E R 1 2 0, E M P L OY E E S 5 4 C O U N T R I E S C O N S U L T I N G S Y S T E M I N T E G R AT I O N O U T S O U R C I N G WIPRO TECHNOLOGIES, DODDAKANNELLI, SARJAPUR ROAD, BANGALORE , INDIA TEL : +91 (80) , FAX : +91 (80) , North America South America Canada United Kingdom Germany France Switzerland Poland Austria Sweden Finland Benelux Portugal Romania Japan Philippines Singapore Malaysia Australia Copyright Wipro Technologies. All rights reserved. No part of this document may be reproduced, stored in a retrieval system, transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without express written permission from Wipro Technologies. Specifications subject to change without notice. All other trademarks mentioned herein are the property of their respective owners. Specifications subject to change without notice. IND/UNPL/JULY2011-DEC2011

Decoding Middleware DNA for Successful Migration

Decoding Middleware DNA for Successful Migration Decoding Middleware DNA for Successful Migration www.wipro.com Sankara Subramanian Palanisamy Middleware Migration Solutions, Enterprise Business Integration Table of contents 03... DNA The Blueprint of

More information

Risks in Middleware Migration- Demystifying the Journey

Risks in Middleware Migration- Demystifying the Journey Risks in Middleware Migration- Demystifying the Journey www.wipro.com Sankara Subramanian Palanisamy Middleware Migration Solutions, Enterprise Business Integration Table of contents 03... Risks in Middleware

More information

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD IDENTITY & ACCESS MANAGEMENT IN THE CLOUD www.wipro.com Niraj Kumar Shukla Table of Contents 3... 1. Introduction 3... 2. IAM Approach 4... 2.1. Phase I - Plan 4...2.1.1. Understanding the Environment

More information

Freight aggregation in order fulfilment lifecycle to achieve better freight planning

Freight aggregation in order fulfilment lifecycle to achieve better freight planning Freight aggregation in order fulfilment lifecycle to achieve better freight planning www.wipro.com Agathian Sannasi Email: agathian.sannasi@wipro.com Table of contents 1. ABSTRACT...02 2. THE SALES ORDER

More information

Standardize & Manage Test Environments

Standardize & Manage Test Environments www.wipro.com Standardize & Manage Test Environments Ensure Higher Test Coverage and De-Risk Testing from Test Environmental Bottlenecks Testing Services Wipro Technologies Table of Contents 03 Need for

More information

RETAIL STORE INTEGRATOR (RSI) ENGINEERING A COMPLETE ORACLE SOLUTION DO BUSINESS BETTER Scan the QR Code to learn more

RETAIL STORE INTEGRATOR (RSI) ENGINEERING A COMPLETE ORACLE SOLUTION DO BUSINESS BETTER Scan the QR Code to learn more www.wipro.com RETAIL STORE INTEGRATOR (RSI) ENGINEERING A COMPLETE ORACLE SOLUTION Scan the QR Code to learn more DO BUSINESS BETTER Table of contents 03... Introduction 03... Key Requirements 04... Solution

More information

Ensuring procurement compliance in infrastructure maintenance business

Ensuring procurement compliance in infrastructure maintenance business www.wipro.com Ensuring procurement compliance in infrastructure maintenance business Amarnath Shete Saju Paul Table of Contents 3... Abstract 3... Modus operandi of Maintenance Service Companies 3... What

More information

Analytics in an Omni Channel World. Arun Kumar, General Manager & Global Head of Retail Consulting Practice, Wipro Ltd.

Analytics in an Omni Channel World. Arun Kumar, General Manager & Global Head of Retail Consulting Practice, Wipro Ltd. Analytics in an Omni Channel World www.wipro.com Arun Kumar, General Manager & Global Head of Retail Consulting Practice, Wipro Ltd. Table of Contents 03...Extending the Single View of Consumer 04...Extending

More information

DB2 to Oracle database Migration during JD Edwards Upgrade

DB2 to Oracle database Migration during JD Edwards Upgrade DB2 to Oracle database Migration during JD Edwards Upgrade www.wipro.com Author : Ashish Kumar Mandal Table of contents 1. INTRODUCTION...02 2. DATABASE INSIGHT...02 3. MIGRATION CHALLENGES 4. MIGRATION

More information

BETTER DESIGNED BUSINESS PROCESSES

BETTER DESIGNED BUSINESS PROCESSES BETTER DESIGNED BUSINESS PROCESSES Select The Right Process Modeling Tool Base))) Nithya Ramkumar Vice President, Base))), Wipro Business Process Services Table of Contents 03 The Right Modeling Tool To

More information

Evaluating Managed File Transfer Solutions

Evaluating Managed File Transfer Solutions Evaluating Managed File Transfer Solutions Right evaluation is essential to make the right choice of a Managed File Transfer solution www.wipro.com Manish Dhama B2B Integration Practice, Wipro Technologies

More information

Steel Companies Look to Join IT Outsourcing Bandwagon Bibartak Mandal

Steel Companies Look to Join IT Outsourcing Bandwagon Bibartak Mandal www.wipro.com Steel Companies Look to Join IT Outsourcing Bandwagon Bibartak Mandal Table of Contents 3...Steel Companies Look to Join IT Outsourcing Bandwagon 4...Phased Approach to Outsourcing 5...Benefits

More information

Mobile Application Management. www.wipro.com. Anand Kale Mobility Solutions Head- Banking & Financial Services, Wipro Mobility Solutions

Mobile Application Management. www.wipro.com. Anand Kale Mobility Solutions Head- Banking & Financial Services, Wipro Mobility Solutions Mobile Application Management www.wipro.com Anand Kale Mobility Solutions Head- Banking & Financial Services, Wipro Mobility Solutions Table of contents 03... Mobile Application Management (MAM): Reduce

More information

Software vendors evolution in the new industry paradigm

Software vendors evolution in the new industry paradigm Software vendors evolution in the new industry paradigm Future of independent software vendors www.wipro.com Rajesh Gupta Rajesh Gupta Practice head- ISV vertical Practice head- ISV vertical Manufacturing

More information

WWW.WIPRO.COM CRITICAL SUCCESS FACTORS FOR A SUCCESSFUL TEST ENVIRONMENT MANAGEMENT

WWW.WIPRO.COM CRITICAL SUCCESS FACTORS FOR A SUCCESSFUL TEST ENVIRONMENT MANAGEMENT WWW.WIPRO.COM CRITICAL SUCCESS FACTORS FOR A SUCCESSFUL TEST ENVIRONMENT MANAGEMENT Table of contents 01 Abstract 02 Key factors for a successful test environment management 05 Conclusion 05 About the

More information

SaaS Maturity Evolution for Transforming ISVs business

SaaS Maturity Evolution for Transforming ISVs business SaaS Maturity Evolution for Transforming ISVs business www.wipro.com www.wipro.com Hemanth Kumar A. (Solution Architect) Rajesh Gupta Hemanth Kumar Amitoj Singh Amitoj Practice Singh Head (Product Solution

More information

Cyber Warfare, Governance, and the Art of War

Cyber Warfare, Governance, and the Art of War WIPRO CONSULTING SERVICES Cyber Warfare, Governance, and the Art of War www.wipro.com/consulting Cyber Warfare, Governance, and the Art of War By Manohar Ganshani It was a catastrophic Christmas for retailer

More information

TRANSFORMING BANKING ANALYTICS ENGINEERING A COMPLETE ORACLE SOLUTION DO BUSINESS BETTER Scan the QR Code to learn more

TRANSFORMING BANKING ANALYTICS ENGINEERING A COMPLETE ORACLE SOLUTION DO BUSINESS BETTER Scan the QR Code to learn more www.wipro.com TRANSFORMING BANKING ANALYTICS ENGINEERING A COMPLETE ORACLE SOLUTION Scan the QR Code to learn more DO BUSINESS BETTER ANALYTICS AS A BUSINESS ENABLER Data availability for banks has grown

More information

MOBILE ENTERPRISE APP STORES: THE SAP GAME CHANGER

MOBILE ENTERPRISE APP STORES: THE SAP GAME CHANGER MOBILE ENTERPRISE APP STORES: THE SAP GAME CHANGER www.wipro.com CONTENTS Testing times for time-tested strategies Picking best practices from a consumer app store Going beyond a consumer app store New

More information

Agile Change: The Key to Successful Cloud/SaaS Deployment

Agile Change: The Key to Successful Cloud/SaaS Deployment WIPRO CONSULTING SERVICES Agile Change: The Key to Successful Cloud/SaaS Deployment www.wipro.com/consulting Agile Change: The Key to Successful Cloud/SaaS Deployment By Robert Staeheli and Gregor Marshall

More information

PREDICTIVE INSIGHT ON BATCH ANALYTICS A NEW APPROACH

PREDICTIVE INSIGHT ON BATCH ANALYTICS A NEW APPROACH WWW.WIPRO.COM PREDICTIVE INSIGHT ON BATCH ANALYTICS A NEW APPROACH Floya Muhury Ghosh Table of contents 01 Abstract 01 Industry Landscape 02 Current OM Tools Limitations 02 Current OM Tools Potential Improvements

More information

Incentive compensation drivers and best practices

Incentive compensation drivers and best practices Incentive compensation drivers and best practices www.wipro.com Vaibhav Chauhan, Abhishek Sharma Saurabh Satpute Table of contents 1. INTRODUCTION...02 2. DRIVERS FOR SALES INCENTIVE MANAGEMENT...02 3.

More information

www.wipro.com NFV and its Implications on Network Fault Management Abhinav Anand

www.wipro.com NFV and its Implications on Network Fault Management Abhinav Anand www.wipro.com NFV and its Implications on Network Fault Management Abhinav Anand Table of Contents Introduction... 03 Network Fault Management operations today... 03 NFV and Network Fault Management...

More information

EMPOWER YOUR ORGANIZATION - DRIVING WORKFORCE ANALYTICS

EMPOWER YOUR ORGANIZATION - DRIVING WORKFORCE ANALYTICS WWW.WIPRO.COM EMPOWER YOUR ORGANIZATION - DRIVING WORKFORCE ANALYTICS Using tactical workforce intelligence to optimize talent and set the cornerstone to manage workforce competency risks. Suvrat Mathur,

More information

ENABLING PERSONALIZATION IN THE WORLD OF GROCERY

ENABLING PERSONALIZATION IN THE WORLD OF GROCERY WWW.WIPRO.COM ENABLING PERSONALIZATION IN THE WORLD OF GROCERY With the advent in technology, retailers need to provide a seamless personalized shopping experience both online and in stores. Kuru Subramaniam

More information

CLOUD OPERATIONS CENTER

CLOUD OPERATIONS CENTER www.wipro.com CLOUD OPERATIONS CENTER TRANSFORMING TO A SEAMLESS HYBRID CLOUD EXPERIENCE DO BUSINESS BETTER Whether you use traditional data centers, virtualized environments, on/off-prem private clouds,

More information

Revenue Enhancement and Churn Prevention

Revenue Enhancement and Churn Prevention Revenue Enhancement and Churn Prevention for Telecom Service Providers A Telecom Event Analytics Framework to Enhance Customer Experience and Identify New Revenue Streams www.wipro.com Anindito De Senior

More information

UNIVERSAL INVESTMENT BANKING RETRACING GROWTH PATH

UNIVERSAL INVESTMENT BANKING RETRACING GROWTH PATH Point of View - Wipro Banking Practice UNIVERSAL INVESTMENT BANKING RETRACING GROWTH PATH www.wipro.com Author : Angan Guha Head of Investment & Universal Banking Global Managing Partner for a key banking

More information

Partnering for Success: Transitioning from Shared Services to Global Business Services

Partnering for Success: Transitioning from Shared Services to Global Business Services WIPRO CONSULTING SERVICES Partnering for Success: Transitioning from Shared Services to Global Business Services www.wipro.com/consulting Partnering For Success: Transitioning from Shared Services to Global

More information

RUN SAP: SIMPLIFYING COMPLEX APPLICATION LANDSCAPES THROUGH STANDARDIZATION

RUN SAP: SIMPLIFYING COMPLEX APPLICATION LANDSCAPES THROUGH STANDARDIZATION RUN SAP: SIMPLIFYING COMPLEX APPLICATION LANDSCAPES THROUGH STANDARDIZATION www.wipro.com Introduction The modern organization is faced with a fast evolving landscape in the wake of volatile and interconnected

More information

INTEGRATED APPROACH TO FUEL MANAGEMENT IN POWER GENERATION COMPANIES

INTEGRATED APPROACH TO FUEL MANAGEMENT IN POWER GENERATION COMPANIES WWW.WIPRO.COM INTEGRATED APPROACH TO FUEL MANAGEMENT IN POWER GENERATION COMPANIES Solution for Improved Electricity Cost Control Murty Vedula Table of contents 01 Executive Summary 02 Business Challenge

More information

WHEN IT COMES TO ENROLLMENT AND MEMBERSHIP MANAGEMENT SOLUTIONS

WHEN IT COMES TO ENROLLMENT AND MEMBERSHIP MANAGEMENT SOLUTIONS WWW.WIPRO.COM WHEN IT COMES TO ENROLLMENT AND MEMBERSHIP MANAGEMENT SOLUTIONS You need to look no further! DO BUSINESS BETTER ENROLLMENT AND MEMBERSHIP MANAGEMENT THE TRANSFORMING LANDSCAPE AND ITS IMPACT

More information

www.wipro.com Software Defined Infrastructure The Next Wave of Workload Portability Vinod Eswaraprasad Principal Architect, Wipro

www.wipro.com Software Defined Infrastructure The Next Wave of Workload Portability Vinod Eswaraprasad Principal Architect, Wipro www.wipro.com Software Defined Infrastructure The Next Wave of Workload Portability Vinod Eswaraprasad Principal Architect, Wipro Table of Contents Abstract... 03 The Emerging Need... 03 SDI Impact for

More information

CHANGING NATURE OF THE WEALTH MANAGEMENT INDUSTRY

CHANGING NATURE OF THE WEALTH MANAGEMENT INDUSTRY Point of View - Wipro Banking and Financial Services CHANGING NATURE OF THE WEALTH MANAGEMENT INDUSTRY Challenges and opportunities for wealth advisors www.wipro.com Author: Dr. Ashok Hegde, Global Head

More information

INTERNET OF THINGS Delight. Optimize. Revolutionize.

INTERNET OF THINGS Delight. Optimize. Revolutionize. WWW.WIPRO.COM INTERNET OF THINGS Delight. Optimize. Revolutionize. DO BUSINESS BETTER HOW IS YOUR BUSINESS ALIGNED TO CAPITALIZE ON THE FASCINATING OPPORTUNITIES OF THE FUTURE? ARE YOU LOOKING AT DOING

More information

SERVICE-BASED SALES AND CHANNEL MANAGEMENT IN TELECOM

SERVICE-BASED SALES AND CHANNEL MANAGEMENT IN TELECOM www.wipro.com SERVICE-BASED SALES AND CHANNEL MANAGEMENT IN TELECOM Sridhar Marella Padam Jain Table of Contents 3...Introduction 4... Typical Challenges in Sales & Distribution 4... Solution Capabilities

More information

Reimagining Quality Assurance for the Digital Enterprise

Reimagining Quality Assurance for the Digital Enterprise www.wipro.com M ER LO MER LO Reimagining Quality Assurance for the Digital Enterprise Ramesh Pai Practice Head, Digital Assurance practice Consumerization and digital adoption are leading to polarization

More information

MOBILITY AS A SERVICE (MaaS)

MOBILITY AS A SERVICE (MaaS) www.wipro.com DEVELOP AND DEPLOY MOBILE APPLICATIONS TRANSFORMING THE WAY BUSINESSES MOBILITY AS A SERVICE (MaaS) Two of the most exciting technologies today, Mobility and Cloud, are helping enterprises

More information

High Performance Analytics through Data Appliances

High Performance Analytics through Data Appliances WWW.WIPRO.COM High Performance Analytics through Data Appliances Deriving more from data Sankar Natarajan Practice Lead (Netezza & Vertica Data Warehouse Appliance) at Wipro Technologies Table of contents

More information

CREATING BUSINESS VALUE

CREATING BUSINESS VALUE WWW.WIPRO.COM CREATING BUSINESS VALUE Making our customer succeed by enabling their business to improve end user experience, reducing cost of operations, and improving revenue. Wipro BPO Authors: Rajesh

More information

Enriching In-Store Experience with Analytics

Enriching In-Store Experience with Analytics Enriching In-Store Experience with Analytics Arun Kumar, General Manager & Global Head of Retail Consulting Practice, Wipro Ltd. www.wipro.com Balakrishna Parankusam Venkata, Principal Consultant, Retail

More information

MANAGING LINEAR ASSETS Managing Linear Assets has always been a challenge; find out how customers leverage SAP to meet industry requirements.

MANAGING LINEAR ASSETS Managing Linear Assets has always been a challenge; find out how customers leverage SAP to meet industry requirements. WWW.WIPRO.COM MANAGING LINEAR ASSETS Managing Linear Assets has always been a challenge; find out how customers leverage SAP to meet industry requirements. Venkatesh Pulijala, EAM Consultant - Oil & Gas,

More information

The Mobile Enterprise: Employee Self Service. Deepali Majumder, Senior Consultant, Wipro Mobility Solutions

The Mobile Enterprise: Employee Self Service. Deepali Majumder, Senior Consultant, Wipro Mobility Solutions The Mobile Enterprise: Employee Self Service Deepali Majumder, Senior Consultant, Wipro Mobility Solutions Table of contents 03... Technology is shaping demand 03... The Mobile Employee 04... Why is a

More information

LESS PAPER. MORE PRINTING.

LESS PAPER. MORE PRINTING. WWW.WIPRO.COM LESS PAPER. MORE PRINTING. Managed printing services and how it s helping offices to be more efficient in its printing practices. Adarsh R Talinki Sr. Practice Manager - EUC Global Infrastructure

More information

Simplify Telecom Network Migration with Repeatable Frameworks

Simplify Telecom Network Migration with Repeatable Frameworks WWW.WIPRO.COM Simplify Telecom Network Migration with Repeatable Frameworks A perfect 10 in network migrations in the Telecom world is almost a mirage, but there s a lot that you could get a grip over

More information

Empowering business intelligence through BI transformation

Empowering business intelligence through BI transformation www.wipro.com Empowering business intelligence through BI transformation Deepak Maheshwari Prinicipal Architect, Business Intelligence - Wipro Analytics Table of content 03... Introduction 04... De-bottlenecking

More information

Source to Pay: Transforming Invoice Processing and Document Management

Source to Pay: Transforming Invoice Processing and Document Management WIPRO CONSULTING SERVICES Business Methods Series Source to Pay: Transforming Processing and Document Management Paulo Jose Freixa Calhau Preto Senior Manager, Finance & Accounting Transformation Practice,

More information

DATA APPLIANCES FOR THE INSURANCE INDUSTRY

DATA APPLIANCES FOR THE INSURANCE INDUSTRY WWW.WIPRO.COM DATA APPLIANCES FOR THE INSURANCE INDUSTRY A BIG STEP FORWARD Sankar Natarajan Wipro Technologies Vasudevan Easwaran Table of contents 01 The challenges of data volumes Limitations of traditional

More information

AUTOMATION CHECKERBOARD WHAT MOVES MY BENEFITS?

AUTOMATION CHECKERBOARD WHAT MOVES MY BENEFITS? www.wipro.com AUTOMATION CHECKERBOARD WHAT MOVES MY BENEFITS? Girish Kulkarni Global Practice Head - Test Automation, Testing Services Table of Content 03... Abstract 03... Introduction 04... Understanding

More information

Re-Shaping Retail Integration. Changing retail landscape with Social-Mobile-Analytics-Cloud. www.wipro.com

Re-Shaping Retail Integration. Changing retail landscape with Social-Mobile-Analytics-Cloud. www.wipro.com www.wipro.com Re-Shaping Retail Integration Changing retail landscape with Social-Mobile-Analytics-Cloud Gaurav Mittal Principal Consultant Wipro Ltd. Table of contents 03... Abstract 03... Retail Industry

More information

CAPITALIZING ON IT INFRASTRUCTURE SERVICES FOR AN EFFECTIVE IT RISK MANAGEMENT IN BANKS

CAPITALIZING ON IT INFRASTRUCTURE SERVICES FOR AN EFFECTIVE IT RISK MANAGEMENT IN BANKS WWW.WIPRO.COM CAPITALIZING ON IT INFRASTRUCTURE SERVICES FOR AN EFFECTIVE IT RISK MANAGEMENT IN BANKS Harish Sudhamalal Table of Contents 03 Capitalizing on IT infrastructure services for an effective

More information

The Intelligent Business: How Benefits-Led Business Intelligence Can Drive Value

The Intelligent Business: How Benefits-Led Business Intelligence Can Drive Value WIPRO CONSULTING SERVICES The Intelligent Business: How Benefits-Led Business Intelligence Can Drive Value www.wipro.com/consulting Also covered by The Intelligent Business: How Benefits-Led Business

More information

WWW.WIPRO.COM UP IN THE CLOUD

WWW.WIPRO.COM UP IN THE CLOUD WWW.WIPRO.COM UP IN THE CLOUD Will the chemical industry be one of the first adopters or fast followers in transitioning to the Cloud? Read on to learn the latest Cloud technology trends in the global

More information

CENTRALIZED CONTROL CENTERS FOR THE OIL & GAS INDUSTRY A detailed analysis on Business challenges and Technical adoption.

CENTRALIZED CONTROL CENTERS FOR THE OIL & GAS INDUSTRY A detailed analysis on Business challenges and Technical adoption. WWW.WIPRO.COM CENTRALIZED CONTROL CENTERS FOR THE OIL & GAS INDUSTRY A detailed analysis on Business challenges and Technical adoption. Senthilvelan Umapathi Practice Lead Table of contents 02 Executive

More information

OPTIMIZING INSURANCE DISTRIBUTION THROUGH A HYBRID MODEL

OPTIMIZING INSURANCE DISTRIBUTION THROUGH A HYBRID MODEL www.wipro.com OPTIMIZING INSURANCE DISTRIBUTION THROUGH A HYBRID MODEL Sasi Koyalloth Connected Enterprise Services (CES) BAS Table of Content 03... Abstract 04... Challenges of Direct and Agent-based

More information

OPERATIONAL BENCHMARKING DRIVING BUSINESS EFFICIENCY

OPERATIONAL BENCHMARKING DRIVING BUSINESS EFFICIENCY WWW.WIPRO.COM OPERATIONAL BENCHMARKING DRIVING BUSINESS EFFICIENCY Delivering best in class performance by targeting world class benchmarks and making processes more efficient and effective. Wipro BPO

More information

CONNECTED HEALTHCARE. Multiple Devices. One Interface. www.wipro.com

CONNECTED HEALTHCARE. Multiple Devices. One Interface. www.wipro.com www.wipro.com CONNECTED HEALTHCARE Multiple Devices. One Interface. Anirudha Gokhale Senior Architect, Product Engineering Services division at Wipro Technologies Table of Contents Abstract... 03 The Not-So-Connected

More information

Enterprise Architecture for Communication Service Providers: Aligning Business Goals to IT

Enterprise Architecture for Communication Service Providers: Aligning Business Goals to IT WIPRO CONSULTING SERVICES Enterprise Architecture for Communication Service Providers: Aligning Business Goals to IT www.wipro.com/consulting Enterprise Architecture for Communication Service Providers:

More information

BENCHMARKING THE ENTERPRISE S B2B INTEGRATION MATURITY

BENCHMARKING THE ENTERPRISE S B2B INTEGRATION MATURITY www.wipro.com BENCHMARKING THE ENTERPRISE S B2B INTEGRATION MATURITY Presanna Venkadesh Sundararajan Senior Architect in Wipro Technologies Table of contents 03...Background 03...Why do we have to measure

More information

WIPRO BOUNDARYLESS DATA CENTER SERVICES

WIPRO BOUNDARYLESS DATA CENTER SERVICES www.wipro.com WIPRO BOUNDARYLESS DATA CENTER SERVICES Redefining Possibilities to drive Rapid Business Outcomes What Customers Say? Globalization, Entering new markets Changing consumer expectations Legacy

More information

DIGITAL WEALTH MANAGEMENT FOR MASS-AFFLUENT INVESTORS

DIGITAL WEALTH MANAGEMENT FOR MASS-AFFLUENT INVESTORS www.wipro.com DIGITAL WEALTH MANAGEMENT FOR MASS-AFFLUENT INVESTORS Sasi Koyalloth Connected Enterprise Services Table of Contents 03... Abstract 03... The Emerging New Disruptive Digital Business Model

More information

RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information

RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information www.wipro.com RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information Saritha Auti Practice Head - Enterprise Security Solutions, Wipro Table of Contents 03... Abstract 03... Why

More information

Driving Strategy to Execution

Driving Strategy to Execution WIPRO CONSULTING SERVICES Driving Strategy to Execution www.wipro.com/consulting Driving Strategy to Execution By Gerhard Plenert Facing financial and competitive pressures of historic proportions, operations

More information

Rethinking Data Discovery The new research and experimentation paradigm for analytics and discovery. www.wipro.com

Rethinking Data Discovery The new research and experimentation paradigm for analytics and discovery. www.wipro.com www.wipro.com Rethinking Data Discovery The new research and experimentation paradigm for analytics and discovery Nitesh Jain General Manager and Vertical Head CPG (Europe & Emerging Markets) Table of

More information

Key to Customer Engagement for Utilities

Key to Customer Engagement for Utilities Mobile Apps: Key to Customer Engagement for Utilities Hasanat Ahmad Khan Solution Architect Mohanram Inbaraj Solutions Head, Wipro Mobility Solutions Table of Contents 03...Challenging Times for Utilities

More information

The Top 3 Reasons Why ERP Transformations Fail And How You Can Avoid Them

The Top 3 Reasons Why ERP Transformations Fail And How You Can Avoid Them WIPRO CONSULTING SERVICES The Top 3 Reasons Why ERP Transformations Fail And How You Can Avoid Them www.wipro.com/consulting The Top 3 Reasons Why ERP Transformations Fail And How You Can Avoid Them By

More information

OPTIMIZATION OF QUASI FAST RETURN TECHNIQUE IN TD-SCDMA

OPTIMIZATION OF QUASI FAST RETURN TECHNIQUE IN TD-SCDMA www.wipro.com OPTIMIZATION OF QUASI FAST RETURN TECHNIQUE IN TD-SCDMA Niladri Shekhar Paria Table of Contents 03... Abstract 03... Overview of QFR Technique 05... Problem in Existing QFR Technique 05...

More information

Six Steps to Putting HR on the Path to Corporate Strategic Partner

Six Steps to Putting HR on the Path to Corporate Strategic Partner WIPRO CONSULTING SERVICES Six Steps to Putting HR on the Path to Corporate Strategic Partner www.wipro.com/consulting Six Steps to Putting HR on the Path to Corporate Strategic Partner By Robert Staeheli

More information

TRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION

TRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION www.wipro.com TRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION Renaissance Delivery Experience Ecosystem Sabir Ahmad Senior Architect ... Table of Content Introduction 3 Driving Transformational

More information

Powering the New Supply Chain: Demand Sensing for Small and Medium-Sized Businesses

Powering the New Supply Chain: Demand Sensing for Small and Medium-Sized Businesses WIPRO CONSULTING SERVICES Powering the New Supply Chain: Demand Sensing for Small and Medium-Sized Businesses www.wipro.com/consulting Powering the New Supply Chain: Demand Sensing for Small and Medium-Sized

More information

The People Data Imperative

The People Data Imperative WIPRO CONSULTING SERVICES The People Data Imperative www.wipro.com/consulting The People Data Imperative By Spyros Stamoulis and Martin Hill You re an HR executive of a multinational corporation with thousands

More information

Retail Out-of-Stock Management:

Retail Out-of-Stock Management: Retail Out-of-Stock Management: An Outcome-Based Approach Your customers get what they want, when they want and wherever they want www.wipro.com Rajat Kaul Table of Contents 03... Abstract 03... The Retail

More information

Transforming Distribution Utilities

Transforming Distribution Utilities www.wipro.com Transforming Distribution Utilities Digitizing the Core Anjan Lahiri Table of Contents 02 Abstract 02 Customers Steering the Change 03 Deconstructing the Digital Character 05 Utilities at

More information

Real-Time Data Access Using Restful Framework for Multi-Platform Data Warehouse Environment

Real-Time Data Access Using Restful Framework for Multi-Platform Data Warehouse Environment www.wipro.com Real-Time Data Access Using Restful Framework for Multi-Platform Data Warehouse Environment Pon Prabakaran Shanmugam, Principal Consultant, Wipro Analytics practice Table of Contents 03...Abstract

More information

www.wipro.com ENGINEERING & CONSTRUCTION: TECHNOLOGY PARTNER FOR TOMORROW S INFRASTRUCTURE

www.wipro.com ENGINEERING & CONSTRUCTION: TECHNOLOGY PARTNER FOR TOMORROW S INFRASTRUCTURE www.wipro.com ENGINEERING & CONSTRUCTION: TECHNOLOGY PARTNER FOR TOMORROW S INFRASTRUCTURE TECHNOLOGY PARTNER FOR TOMORROW S INFRASTRUCTURE The growth story of Engineering & Construction industry has been

More information

CFO: THE NEW TECHNOLOGY EVANGELIST OF THE ENTERPRISE Sriram Kannan Practice Partner - CXO Services, Wipro Analytics

CFO: THE NEW TECHNOLOGY EVANGELIST OF THE ENTERPRISE Sriram Kannan Practice Partner - CXO Services, Wipro Analytics www.wipro.com CFO: THE NEW TECHNOLOGY EVANGELIST OF THE ENTERPRISE Sriram Kannan Practice Partner - CXO Services, Wipro Analytics Table of Contents 03...Evolution of the CFO Role 03...Transforming Businesses

More information

Telecom Analytics: Powering Decision Makers with Real-Time Insights

Telecom Analytics: Powering Decision Makers with Real-Time Insights Telecom Analytics: Powering Decision Makers with Real-Time Insights www.wipro.com Anindito De, Practice Manager - Industry Solutions, CXO Services, Advanced Technologies & Solutions Subhas Mondal, Head

More information

Table of Contents. 03...Cut the Clutter, Join the Big Data Wellness Club. 06...About the Author. 06...About Wipro Ltd.

Table of Contents. 03...Cut the Clutter, Join the Big Data Wellness Club. 06...About the Author. 06...About Wipro Ltd. www.wipro.com Cut the Clutter, Join the Big Data Wellness Club FIs, Retailers aiming to derive business value from Big Data need to ensure Srinivasagopalan data correctness, Venkataraman timeliness and

More information

YOUR TICKET TO A SUCCESSFUL CLOUD JOURNEY

YOUR TICKET TO A SUCCESSFUL CLOUD JOURNEY YOUR TICKET TO A SUCCESSFUL CLOUD JOURNEY WWW.WIPRO.COM Atul Sood General Manager and Global Head of Cloud Enablement Wipro Technologies Table of Contents 03 Phase one: Standardize and Consolidate 04 Phase

More information

Intercompany Reconciliation and Settlement. WIPRO CONSULTING SERVICES Business Methods Series. www.wipro.com/consulting

Intercompany Reconciliation and Settlement. WIPRO CONSULTING SERVICES Business Methods Series. www.wipro.com/consulting WIPRO CONSULTING SERVICES Business Methods Series Intercompany Reconciliation and Settlement Noel Billing, Senior Manager, Finance & Accounting Transformation Practice Wipro Consulting Services noel.billing@wipro.com

More information

Going Seamless with SIAM. Why you need a platform-based approach for Service Integration and Management WWW.WIPRO.COM

Going Seamless with SIAM. Why you need a platform-based approach for Service Integration and Management WWW.WIPRO.COM WWW.WIPRO.COM Going Seamless with SIAM Why you need a platform-based approach for Service Integration and Management Ramesh Dorairaj, Principal Consultant, Application Support and Maintenance Table of

More information

Future of Minerals Exploration Helping the mining industry go deeper.

Future of Minerals Exploration Helping the mining industry go deeper. Future of Minerals Exploration Helping the mining industry go deeper. WWW.WIPRO.COM David Lee, GM Strategy- Mining, Wipro Technologies Table of contents 02 Future of Minerals Exploration 03 Minerals Exploration

More information

ENCOURAGING STORE ASSOCIATES IN AN OMNI CHANNEL WORLD MAKING INCENTIVE SCHEMES TRUE AND FAIR

ENCOURAGING STORE ASSOCIATES IN AN OMNI CHANNEL WORLD MAKING INCENTIVE SCHEMES TRUE AND FAIR WWW.WIPRO.COM ENCOURAGING STORE ASSOCIATES IN AN OMNI CHANNEL WORLD MAKING INCENTIVE SCHEMES TRUE AND FAIR Girish Kumar Global Practice Partner and Heads the Omni Channel Retail Practice Nirmal Jeyapal

More information

An Integrated Validation Approach to SDN & NFV

An Integrated Validation Approach to SDN & NFV www.wipro.com An Integrated Validation Approach to SDN & NFV Key challenges, implementation strategies and the road ahead. Jayaprakash Hariharan Mohan Kumar Table of Contents 03...Abstract 04...Introduction

More information

WIPRO S MEDICAL DEVICES FRAMEWORK

WIPRO S MEDICAL DEVICES FRAMEWORK WIPRO S MEDICAL DEVICES FRAMEWORK JUMP-START AND ACCELERATE YOUR CRM TRANSFORMATION DO BUSINESS BETTER INDUSTRY LANDSCAPE The medical technology industry is trending towards commoditization of products

More information

www.wipro.com Manage Your Leads Well to Boost Sales Volumes Anupam Bhattacharjee Shine Gangadharan

www.wipro.com Manage Your Leads Well to Boost Sales Volumes Anupam Bhattacharjee Shine Gangadharan www.wipro.com Manage Your Leads Well to Boost Sales Volumes Anupam Bhattacharjee Shine Gangadharan Table of Content 03... Introduction 04... The Great Transition 05... The way Forward 06... About the Authors

More information

KEEPING ENERGY M&As ON TRACK WITH EARLY IT ENGAGEMENT

KEEPING ENERGY M&As ON TRACK WITH EARLY IT ENGAGEMENT www.wipro.com KEEPING ENERGY M&As ON TRACK WITH EARLY IT ENGAGEMENT Ramakrishna Avasarala Consultant, SAP- O&G COE Table of Contents 03 Abstract 03 Introduction: Role of IT in M&As 04 06 Key focus areas

More information

Amanda, a working mom, spotted a summer skirt on the website of a top clothing brand and ordered it. When the skirt arrived it was the wrong color.

Amanda, a working mom, spotted a summer skirt on the website of a top clothing brand and ordered it. When the skirt arrived it was the wrong color. www.wipro.com DRIVING CUSTOMER INSIGHTS FOR RETAILERS IN THE DIGITAL ERA Venkataraman Ramanathan Senior Architect, Information Management, Wipro Analytics Amanda, a working mom, spotted a summer skirt

More information

www.wipro.com THE FORECAST FOR CLOUD IS SUNNY Sudeshna Bhadury

www.wipro.com THE FORECAST FOR CLOUD IS SUNNY Sudeshna Bhadury www.wipro.com THE FORECAST FOR CLOUD IS SUNNY Sudeshna Bhadury Table of Contents 03...The Forecast for Cloud is Sunny 04...Data Privacy 04...Loss of Control 04...Latency 04...Location 04...When to think

More information

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization

More information

The Global Supply Chain Goes Collaborative

The Global Supply Chain Goes Collaborative WIPRO CONSULTING SERVICES The Global Supply Chain Goes Collaborative www.wipro.com/consulting The Global Supply Chain Goes Collaborative By Sebastian Ennulat In today s era of high customer expectations,

More information

WIPRO OFFERING ON APPLICATION MAINTENANCE AND SUPPORT ENGINEERING A COMPLETE ORACLE AMS SOLUTION DO BUSINESS BETTER.

WIPRO OFFERING ON APPLICATION MAINTENANCE AND SUPPORT ENGINEERING A COMPLETE ORACLE AMS SOLUTION DO BUSINESS BETTER. www.wipro.com WIPRO OFFERING ON APPLICATION MAINTENANCE AND SUPPORT * ENGINEERING A COMPLETE ORACLE AMS SOLUTION * Application Maintenance Services and Support DO BUSINESS BETTER BUSINESS ASSURANCE Wipro

More information

The Wipro NxtGen MEMS Advantage. Wipro NxtGen MEMS

The Wipro NxtGen MEMS Advantage. Wipro NxtGen MEMS State Health and Human Services Agencies have a lot to juggle, with evolving demands and rapid technological changes such as: need to modernize the legacy MMIS mandates from CMS to meet the MITA 3.0 framework

More information

Accelerated Rollout of LTE Services

Accelerated Rollout of LTE Services www.wipro.com Accelerated Rollout of LTE Services How a comprehensive framework for efficient network testing can help operators deploy LTE networks faster Nagendra Prabhu Kumble Ajeesh Gopalakrishnan

More information

www.wipro.com Addressing Need-Based Consumerism for Cloud Services Robert Bates SMAC Architecture Group Head, Advanced Technologies & Solutions

www.wipro.com Addressing Need-Based Consumerism for Cloud Services Robert Bates SMAC Architecture Group Head, Advanced Technologies & Solutions www.wipro.com Addressing Need-Based Consumerism for Cloud Services Robert Bates SMAC Architecture Group Head, Advanced Technologies & Solutions Table of contents 03... Abstract 03... Introduction 04...

More information

The enterprise app store. Evolution in IT strategy. Author: Prasenjit Bhadra, Principal Architect Wipro Mobility Solutions

The enterprise app store. Evolution in IT strategy. Author: Prasenjit Bhadra, Principal Architect Wipro Mobility Solutions The enterprise app store Evolution in IT strategy WWW.WIPRO.COM Author: Prasenjit Bhadra, Principal Architect Wipro Mobility Solutions From consumers to the work place: An App-t evolution Apple created

More information

SMARTER FIELD WORK MANAGEMENT SYSTEMS

SMARTER FIELD WORK MANAGEMENT SYSTEMS www.wipro.com SMARTER FIELD WORK MANAGEMENT SYSTEMS DO BUSINESS BETTER Smart grid Software & Data $2.9 BILLION IN 2015 Source: SBI Energy SMARTER FIELD WORK MANAGEMENT SYSTEMS Radhakrishnan Swaminathan

More information

How much intelligence will you pack into your LTE network? Sridhar Saranathan, Principal Consultant, Wipro Ltd.,

How much intelligence will you pack into your LTE network?  Sridhar Saranathan, Principal Consultant, Wipro Ltd., How much intelligence will you pack into your LTE network? www.wipro.com Sridhar Saranathan, Principal Consultant, Wipro Ltd., Table of Contents Introduction: Dumb Networks Are History... 03 Intelligent

More information

www.wipro.com Need For Mobility In Mining Vasuki Upadhya Domain Architecture Practice Head

www.wipro.com Need For Mobility In Mining Vasuki Upadhya Domain Architecture Practice Head www.wipro.com Need For Mobility In Mining Vasuki Upadhya Domain Architecture Practice Head Table of Contents 03... Abstract 03... Introduction 04... Impact of Mobile Technologies in Mining 05... Anytime,

More information

Striking The Right Balance Between

Striking The Right Balance Between Striking The Right Balance Between Customer Expectations And Business Needs An integrated service assurance framework for operational excellence www.wipro.com L.Ganeshkumar D.Sridhara Kumar Table of Contents

More information