Auditing in TMF615 and its Benefits
|
|
- Hollie McKinney
- 7 years ago
- Views:
Transcription
1 Auditing in TMF615 and its Benefits MOHAMMED IBRAHIM ALEEM ARCHITECT, WIPRO TECHNOLOGIES
2 Table of contents Introduction Auditing in TMF615 Specification Security Breach Problem Description Problem Analysis using TMF615 Auditing Finding the Login Account and User Finding the Login and Logout time Gathering User Information Checking the Account in the Target Who Created the User? What Were the Details of This Suspect User? Who Created the Account? Asynchronous Mode in Auditing Conclusion Appendix References Terms and Definitions About the Author
3 Introduction TMF615 specification, a specification detailed by the TM Forum, empowers service providers by enabling centralized user management by detailing an interface between the centralized and local user management systems. TMF615 specification also has an exceptionally strong auditing feature which provides a comprehensive mechanism to monitor all the user and admin activities in the service provider network. This auditing feature can be effectively used in monitoring the security of the enterprise. This whitepaper lists out the advantages of auditing in TMF615 specification and explains through scenarios as to how exactly it can be used to resolve security issues. It is clear that monitoring security breaches through TMF615 auditing will help create a compliant and risk optimized system that will have a definite competitive advantage. TM Forum or the Tele- management Forum is an international association of industries that seeks to deal with the complex issues that are inherent in the business of service provision. Vendors subscribe to the standards, specifications and procedures directed by the TMF. Wipro has found it expedient to comply with TMF s guidelines to provide the best value to its customers. In this paper, we discuss TMF615 specifications in particular and how complying with these specifications can help investigate and, thereby, minimize security risks. Telecom service providers have for long lived with the problem of provisioning/managing users and access rights across the various OSS (Operation Support System) products managing the network. In order to address this major issue, TM Forum has developed the TMF615 specification which advocates managing the entire user provisioning and auditing needs from a single place for the entire organization. In Wipro s own experience with telecom service providers, auditing with these specifications has been useful in detecting security threats and managing the network effectively. The below figure gives a overview of current problem pertaining to User Provisioning in large service networks with multiple OSS vendor solutions. OSS Provider 1 User Management Network OSS Provider 2 OSS Provider n User Management Process Flow of User Management in Heterogeneous Networks 02
4 TMF615 Solution TMF615 specification details an interface which makes it possible for service providers to consistently provision telecom OSS operator s access rights and authorities across systems using a central user management system (UMS-C). The interface deals with the information exchange required between UMS-C and local user management system (), related to the provision of access rights, authorities and auditing. is a local UM solution for the OSS, which is usually vendor specific OSS. TMF615 specification introduces the concept of UMS-C and, and provides a Web Services based integration profile. Following are some of the key advantages of TMF615: Centralized User Provisioning across the Network Ability of Service Provider to Define Roles Centralized User Auditing Significant Savings in terms of Money and Effort Each administrator action at UMS-C will result in a simple object access protocol (SOAP)/http message coming to, which will be processed, based on the request type and appropriate response will be sent back to UMS-C. The picture given below illustrates the process. User Access OSS Provider 1 Network OSS Provider 2 WSDL/SOAP UMS-C OSS Provider n User Management User Access TMF615 Compliant User Management 03
5 Auditing in TMF615 Specification Auditing is absolutely necessary for any user management system to monitor the activities of provisioned users/administrators and prevent misuse. TMF615 specification supports two types of auditing. Status Audit This is mainly used to synchronize UMS-C and with each other. This checks the user accounts and their authorities currently at. Following are the Status Audit operations supported by TMF615 specification: User Provisioning Information Target Account Information Audit Trail This deals with monitoring the activities of provisioned users over a period of time and is very critical to security. Reports which provide details on the user status and actions performed can be generated. Following are the Audit Trail operations supported by TMF615 specification: User Admin Operations User Provisioning Operations Target Admin Operations Targets Account Usage Targets Authorization Usage In order to get more information on individual audit operations, please In the following chapters, we explain each of the advantages of auditing mentioned in the TMF615 specification. To make the benefits clearer, we consider a practical problem scenario and show how different auditing features can be used for analysis and reporting. Problem Description- Security Breach A major problem faced by operators is the constant threat to security. A number of operators work round the clock to ensure that there is no loss of service to the subscribers while simultaneously ensuring that there is no loss of revenue data which is a prerequisite for billing purposes. Each of these operators has a unique role and is dedicated to specific tasks like monitoring network events, faults etc. There are number of applications which the operators use for effective monitoring and reporting purposes. Typically, the operator who monitors the network is intimated of many critical alarms indicating the loss of events from the network. This is quickly escalated to the network administrator. The network administrator during his monitoring of the telecom network discovers that the configuration of the critical section was radically transformed leading to service outage to the end customers. It leads to major management escalation as it caused a huge revenue leak and loss of credibility for the organization. The below figure depicts this problem. check TMF615 specification document from TM Forum. Network OSS SSO Network update User Access Security Breach Network Configuration Change 04
6 Problem Generation- How is the problem created? The following diagram is a pictorial representation of how the administrator creates a new user. The user is added to the which, in turn, updates the Database store. Automatically, the OSS application is updated with the new User Account along with its role. UMS-C DataStore Target/ OSS Application Create New User AddUser() Admin Create User and Accounts with Role () Create User and Accounts with Role () AddUser() Sequence Diagram Administrator Creates a New User Subsequently, the new User logs in and updates the network configuration creating the problem, as illustrated below. OSS SSO Application DataStore Target/OSS Network Login() User Logout() Update Network Configuration () Update Network Configuration () Sequence Diagram User Changes the Network (Problem Creation) 05
7 In the final act the user and its accounts are deleted by the administrator, this is illustrated below. UMS-C DataStore Target/ OSS Application Delete User Remove User() Admin Delete User and Accounts with Role () Delete User and Accounts with Role () Remove User() Sequence Diagram - Admin Deletes the User Problem Analysis- Using TMF615 Auditing Ideally, the operators who were assigned the role of Network Configurators (usually administrators or senior operators) could have implemented the network update activity. However, initial investigation revealed that none of them were actually present in office when the security breach was suspected. The TMF615 Audit feature provides a good framework for tracking and locating the exact problem. Following is a step-by-step procedure that can be followed by the auditor to resolve this specific issue. See how after every step, the auditor finds more critical information that helps him get to the root of the problem. All the steps have been mapped to audit functions mentioned under TMF615. The first task is to find the login account and user. Finding the Login Account and User The only information available to the auditor at this stage is that any operator who has been assigned the role of Network Configurator is capable of damaging the network. In order to find out which users/accounts were used with this role during that time period, the auditor can use the audit operation Target Authorization Usage. This audit operation gives a list of all accounts (and their users) which posses the role Network Configurators and were active during the specified time period. Now in this list, the auditor has to scan the accounts/users and find out the account used and the suspect user. After a brief analysis, the auditor isolates the account/user which seems to be dangling and does not actually belong to any of the existing operators or administrators. Finding the login account & user Target Authorization Target Authorization Mapped to Usage under Usage gives a TMF615 Process list of all Output accounts (and their users) Suspect user & account ID The next task is to locate the time period when the suspect account was actually used. 06
8 Finding the Login and Logout time In order to find the exact time slot when the suspect account was This audit operation gives the exact time slot, with login and logout time, during which this account was active. This establishes the user, account and the time duration during which the damage was inflicted. active, the auditor uses the audit operation Target Account Usage. Finding the login & logout time Target Account Usage under Target Account Usage gives the Mapped to TMF615 exact time slot Process with login & Output logout time Time slot of the security breach Gathering User Information In order to gather all the details about the user, the auditor uses the audit operation User Provisioning Information. This audit operation However, it might happen that this audit operation does not yield any significant result. The lookup user operation informs that the user does not exist. gives all the user details like accounts, roles and its working schedule. Gathering user information User Provisioning Information under TMF615 User Provisioning Operations gives user details like accounts, role and working schedule Mapped to Process Output User does not exist Checking the Account in the Target As the user is not found, the auditor tries to check if the account exists only on a target system without user association, like a dangling Information". This operation might not lead to any substantial information either. The auditor now believes that the problem in the network is not a mistake committed while using the tools but a clear case of intentional security breach. account. For this the auditor uses the audit operation "Target Account Checking account in the target Target Account Information Mapped to under TMF615 Process Output Target Account Usage provides account information Suspect account does not exist on target The next steps are crucial in locating the exact problem. 07
9 Below is a sequential illustration of the process by which the auditor is able to track down the User, account and time slot of the problem. Auditor UMS-C Datastore 1.a Finding the login account and User 1.d Finding the login account and User 1.b Target Authorization usage() 1.c Target Authorization usage() 2.a Finding the login and Logout time 2.d Finding the login and Logout time 2.b Target Account usage() 2.c Target Account usage() 3.a Gather all the user information 3.d Gather all the user information 3.b Users Provisioning Information() 3.c Users Provisioning Information() 4.a Check the account in the Target 4.d Check the account in the Target 4.b Target account Information() 4.c Target account Information() Sequence Diagram Auditor Locates Suspect User, Account & Time Slot of Problem Creation Who Created the User? In order to determine who was responsible for creating the user, the auditor uses the audit operation User Admin Operations and specifies the time range in which the deed was committed. This audit the suspected user was created and deleted after a short span of time. Also, it reveals crucial information about which of the existing administrators created it. Administrator can be identified using the request identifier at UMS-C. operation gives a wealth of information to the auditor. It reveals that User creation User Admin Operations User Admin Operations Mapped to under TMF615 provides Process information about Output the administrator who created the user Suspect account does not exist on target What were the Details of this Suspect User? Auditor can use the audit operation User Provisioning Operations to determine the exact provisioning details of this user. Details of the suspect user User Provisioning User Provisioning Operations Mapped to Operations provides under TMF615 Process provisioning details Output Provisioning details of the user 08
10 Who Created the Account? at the root of the problem is identified by using the advanced audit features supported by TM615 specification. Thus, the TM615 specification is successful in delivering in a situation that requires investigation into a security breach problem. Similarly, several other problems can also be identified and resolved by the TM615 specification. Finally, in order to determine similar details for the account, the auditor uses the audit operation Target Admin Operations and specifies the time range. This step reveals that the suspected account was created and deleted after a short span of time. More importantly, the administrator responsible for creating it is identified. The administrator who is Creator of the account User Provisioning Operations under TMF615 User Provisioning Operations provides provisioning details Mapped to Process Output Provisioning details of the user Below is a sequential illustration of how the auditor is able to isolate the details of the suspect User, account and administrator 5.a Who created the user? 5.d Who created the user? 6.a Get the details of this suspect user 6.d Get the details of this suspect user 5.b User Admin Operation() 5.c User Admin Operation() 6.b Users Provisioning Operations() 6.c Users Provisioning Operations() Get Admin Operation Data() Get Admin Operation Data() Get History User Data() Get History User Data() 7.a Who created the account? 7.d Who created the account? 7.b Target Admin Operations() 7.c Target Admin Operations() Get History Account Data() Get History Account Data() Sequence Diagram Auditor Gets Details about Suspect User, Account & Administrator 09
11 Future challenges: Asynchronous Mode in Auditing The only aspect of auditing that TMF615 leaves unresolved is the asynchronous mode of auditing. This, however, is a challenge for the future. As depicted in the illustration below, the asynchronous mode of auditing allows the to collect auditing data regularly and send the reports to UMS-C. Such reports are extremely useful to the administrator in managing and monitoring the OSS security effectively. UMS-C DataStore Target/ OSS Application Create New Auditing Request Enable Auditing() Admin Activate Auditing Log Collection() Activate Auditing Log Collection() Enable Auditing() Collect Audit Data() Auditing Report Collect Audit Data() Collect Audit Data() Auditing Report Collect Audit Data() Sequence Diagram Asynchronous Mode in Auditing Compliant and risk optimized solution TMF615 is specifically geared towards enhancing the efficiency of a system focusing on the security threats that plague modern result in compliant and risk optimized solutions that have a distinct competitive advantage. Given this benefit, it is only a question of time before more telecom services providers adopt TMF615 specifications to ward-off security threats and manage the system more effectively. organizations and systems. Systematic investigation of security breaches 10
12 Conclusion It is clear that TMF615 supported auditing delivers huge benefits to service providers. Auditing can also be managed completely at the UMS-C, if it captures all the user provisioning data sent to sthe major advantages of TMF615 are: Centralized management of all operators in the service provider network Single sign on/off can be realized quickly through proper integration with TMF614 specification Increased security with the auditing feature Increased security due to proper management of operator permission and schedule Following future improvements are being considered for enterprise security at TM Forum: Asynchronous operations support Enhanced error reporting More information for operators relating to integration and migration to TMF615/TMF614 and SCA standards Specific ongoing work in order to standardize audit through "Security Compliance Audit Automation (SCA)" Faster user provisioning and increased automation leading to considerable cost benefits Despite these improvements suggested for the future, TMF615 is definitely geared towards creating compliant and risk optimized systems. Telecom services providers would have a competitive edge were they to adopt this solution for their systems. 11
13 Appendix References Terms and Definitions TM Forum. TMF615 Specification. Website: omoss/37358/article.html Unified Modeling Language (UML). Website: World Wide Web Consortium (W3C). SOAP 1.2 Specification. Website: Oasis Advancing Open Standards for the Information Society. SPML 2.0 specification. Website: etom enhanced Telecom Operation Map NE Network Element OS Operating System OSS Operation Support System SOAP Simple Object Access Protocol SSO Single Sign On TMF Tele Management Forum World Wide Web Consortium (W3C). WSDL 2.0 Specification. Website: 12
14 Mohammed Ibrahim Aleem is an Architect working with Wipro's Global Media and Telecom division. He has extensive experience is architecting/designing and providing consultancy for telecom OSS solutions. He is a specialist in the areas of identity management and security. He has been involved with many telecom solution implementations and consulting assignments and is well aware of the processes, standards and the best practices involved. He is an active member of the Enterprise Security Group at TM Forum and is working closely towards the development of user management and single sign on/off standards. Wipro in Media & Telecom Wipro Global Media and Telecom is the newly formed SBU which combines Telecom Equipment Vendors (TEV), Global Communications Service Providers (GCSP) and Media & OTT business units globally. Wipro is a strategic partner across the digital supply chain starting from content creation to content consumption and uniquely positioned to address Digital transformation and help organizations Do Business Better in a Digital World. Wipro s vertically aligned business model gives a deep understanding of customers businesses to build industry specific solutions, while technology service lines provide the ability to design new solutions on emerging technologies delivering winning business outcomes. About Wipro Technologies Wipro Technologies, the global IT business of Wipro Limited (NYSE:WIT) is a leading Information Technology, Consulting and Outsourcing company, that delivers solutions to enable its clients do business better. Wipro Technologies delivers winning business outcomes through its deep industry experience and a 360 degree view of Business through Technology helping clients create successful and adaptive businesses. A company recognised globally for its comprehensive portfolio of services, a practitioner s approach to delivering innovation and an organization wide commitment to sustainability, Wipro Technologies has over 120,000 employees and clients across 54 countries. For more information, please visit or info@wipro.com 13
15 DO BUSINESS BETTER W W W. W I P R O. C O M N Y S E : W I T OV E R 1 2 0, E M P L OY E E S 5 4 C O U N T R I E S C O N S U L T I N G S Y S T E M I N T E G R AT I O N O U T S O U R C I N G WIPRO TECHNOLOGIES, DODDAKANNELLI, SARJAPUR ROAD, BANGALORE , INDIA TEL : +91 (80) , FAX : +91 (80) , info@wipro.com North America South America Canada United Kingdom Germany France Switzerland Poland Austria Sweden Finland Benelux Portugal Romania Japan Philippines Singapore Malaysia Australia Copyright Wipro Technologies. All rights reserved. No part of this document may be reproduced, stored in a retrieval system, transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without express written permission from Wipro Technologies. Specifications subject to change without notice. All other trademarks mentioned herein are the property of their respective owners. Specifications subject to change without notice. IND/UNPL/JULY2011-DEC2011
Risks in Middleware Migration- Demystifying the Journey
Risks in Middleware Migration- Demystifying the Journey www.wipro.com Sankara Subramanian Palanisamy Middleware Migration Solutions, Enterprise Business Integration Table of contents 03... Risks in Middleware
More informationStandardize & Manage Test Environments
www.wipro.com Standardize & Manage Test Environments Ensure Higher Test Coverage and De-Risk Testing from Test Environmental Bottlenecks Testing Services Wipro Technologies Table of Contents 03 Need for
More informationIDENTITY & ACCESS MANAGEMENT IN THE CLOUD
IDENTITY & ACCESS MANAGEMENT IN THE CLOUD www.wipro.com Niraj Kumar Shukla Table of Contents 3... 1. Introduction 3... 2. IAM Approach 4... 2.1. Phase I - Plan 4...2.1.1. Understanding the Environment
More informationFreight aggregation in order fulfilment lifecycle to achieve better freight planning
Freight aggregation in order fulfilment lifecycle to achieve better freight planning www.wipro.com Agathian Sannasi Email: agathian.sannasi@wipro.com Table of contents 1. ABSTRACT...02 2. THE SALES ORDER
More informationBETTER DESIGNED BUSINESS PROCESSES
BETTER DESIGNED BUSINESS PROCESSES Select The Right Process Modeling Tool Base))) Nithya Ramkumar Vice President, Base))), Wipro Business Process Services Table of Contents 03 The Right Modeling Tool To
More informationEnsuring procurement compliance in infrastructure maintenance business
www.wipro.com Ensuring procurement compliance in infrastructure maintenance business Amarnath Shete Saju Paul Table of Contents 3... Abstract 3... Modus operandi of Maintenance Service Companies 3... What
More informationAnalytics in an Omni Channel World. Arun Kumar, General Manager & Global Head of Retail Consulting Practice, Wipro Ltd.
Analytics in an Omni Channel World www.wipro.com Arun Kumar, General Manager & Global Head of Retail Consulting Practice, Wipro Ltd. Table of Contents 03...Extending the Single View of Consumer 04...Extending
More informationDB2 to Oracle database Migration during JD Edwards Upgrade
DB2 to Oracle database Migration during JD Edwards Upgrade www.wipro.com Author : Ashish Kumar Mandal Table of contents 1. INTRODUCTION...02 2. DATABASE INSIGHT...02 3. MIGRATION CHALLENGES 4. MIGRATION
More informationEvaluating Managed File Transfer Solutions
Evaluating Managed File Transfer Solutions Right evaluation is essential to make the right choice of a Managed File Transfer solution www.wipro.com Manish Dhama B2B Integration Practice, Wipro Technologies
More informationSoftware vendors evolution in the new industry paradigm
Software vendors evolution in the new industry paradigm Future of independent software vendors www.wipro.com Rajesh Gupta Rajesh Gupta Practice head- ISV vertical Practice head- ISV vertical Manufacturing
More informationMobile Application Management. www.wipro.com. Anand Kale Mobility Solutions Head- Banking & Financial Services, Wipro Mobility Solutions
Mobile Application Management www.wipro.com Anand Kale Mobility Solutions Head- Banking & Financial Services, Wipro Mobility Solutions Table of contents 03... Mobile Application Management (MAM): Reduce
More informationWWW.WIPRO.COM CRITICAL SUCCESS FACTORS FOR A SUCCESSFUL TEST ENVIRONMENT MANAGEMENT
WWW.WIPRO.COM CRITICAL SUCCESS FACTORS FOR A SUCCESSFUL TEST ENVIRONMENT MANAGEMENT Table of contents 01 Abstract 02 Key factors for a successful test environment management 05 Conclusion 05 About the
More informationSaaS Maturity Evolution for Transforming ISVs business
SaaS Maturity Evolution for Transforming ISVs business www.wipro.com www.wipro.com Hemanth Kumar A. (Solution Architect) Rajesh Gupta Hemanth Kumar Amitoj Singh Amitoj Practice Singh Head (Product Solution
More informationRevenue Enhancement and Churn Prevention
Revenue Enhancement and Churn Prevention for Telecom Service Providers A Telecom Event Analytics Framework to Enhance Customer Experience and Identify New Revenue Streams www.wipro.com Anindito De Senior
More informationThe Mobile Enterprise: Employee Self Service. Deepali Majumder, Senior Consultant, Wipro Mobility Solutions
The Mobile Enterprise: Employee Self Service Deepali Majumder, Senior Consultant, Wipro Mobility Solutions Table of contents 03... Technology is shaping demand 03... The Mobile Employee 04... Why is a
More informationPartnering for Success: Transitioning from Shared Services to Global Business Services
WIPRO CONSULTING SERVICES Partnering for Success: Transitioning from Shared Services to Global Business Services www.wipro.com/consulting Partnering For Success: Transitioning from Shared Services to Global
More informationAgile Change: The Key to Successful Cloud/SaaS Deployment
WIPRO CONSULTING SERVICES Agile Change: The Key to Successful Cloud/SaaS Deployment www.wipro.com/consulting Agile Change: The Key to Successful Cloud/SaaS Deployment By Robert Staeheli and Gregor Marshall
More informationwww.wipro.com NFV and its Implications on Network Fault Management Abhinav Anand
www.wipro.com NFV and its Implications on Network Fault Management Abhinav Anand Table of Contents Introduction... 03 Network Fault Management operations today... 03 NFV and Network Fault Management...
More informationIncentive compensation drivers and best practices
Incentive compensation drivers and best practices www.wipro.com Vaibhav Chauhan, Abhishek Sharma Saurabh Satpute Table of contents 1. INTRODUCTION...02 2. DRIVERS FOR SALES INCENTIVE MANAGEMENT...02 3.
More informationEMPOWER YOUR ORGANIZATION - DRIVING WORKFORCE ANALYTICS
WWW.WIPRO.COM EMPOWER YOUR ORGANIZATION - DRIVING WORKFORCE ANALYTICS Using tactical workforce intelligence to optimize talent and set the cornerstone to manage workforce competency risks. Suvrat Mathur,
More informationMOBILE ENTERPRISE APP STORES: THE SAP GAME CHANGER
MOBILE ENTERPRISE APP STORES: THE SAP GAME CHANGER www.wipro.com CONTENTS Testing times for time-tested strategies Picking best practices from a consumer app store Going beyond a consumer app store New
More informationPREDICTIVE INSIGHT ON BATCH ANALYTICS A NEW APPROACH
WWW.WIPRO.COM PREDICTIVE INSIGHT ON BATCH ANALYTICS A NEW APPROACH Floya Muhury Ghosh Table of contents 01 Abstract 01 Industry Landscape 02 Current OM Tools Limitations 02 Current OM Tools Potential Improvements
More informationUNIVERSAL INVESTMENT BANKING RETRACING GROWTH PATH
Point of View - Wipro Banking Practice UNIVERSAL INVESTMENT BANKING RETRACING GROWTH PATH www.wipro.com Author : Angan Guha Head of Investment & Universal Banking Global Managing Partner for a key banking
More informationEnriching In-Store Experience with Analytics
Enriching In-Store Experience with Analytics Arun Kumar, General Manager & Global Head of Retail Consulting Practice, Wipro Ltd. www.wipro.com Balakrishna Parankusam Venkata, Principal Consultant, Retail
More informationBENCHMARKING THE ENTERPRISE S B2B INTEGRATION MATURITY
www.wipro.com BENCHMARKING THE ENTERPRISE S B2B INTEGRATION MATURITY Presanna Venkadesh Sundararajan Senior Architect in Wipro Technologies Table of contents 03...Background 03...Why do we have to measure
More informationINTERNET OF THINGS Delight. Optimize. Revolutionize.
WWW.WIPRO.COM INTERNET OF THINGS Delight. Optimize. Revolutionize. DO BUSINESS BETTER HOW IS YOUR BUSINESS ALIGNED TO CAPITALIZE ON THE FASCINATING OPPORTUNITIES OF THE FUTURE? ARE YOU LOOKING AT DOING
More informationKey to Customer Engagement for Utilities
Mobile Apps: Key to Customer Engagement for Utilities Hasanat Ahmad Khan Solution Architect Mohanram Inbaraj Solutions Head, Wipro Mobility Solutions Table of Contents 03...Challenging Times for Utilities
More informationMOBILITY AS A SERVICE (MaaS)
www.wipro.com DEVELOP AND DEPLOY MOBILE APPLICATIONS TRANSFORMING THE WAY BUSINESSES MOBILITY AS A SERVICE (MaaS) Two of the most exciting technologies today, Mobility and Cloud, are helping enterprises
More informationCHANGING NATURE OF THE WEALTH MANAGEMENT INDUSTRY
Point of View - Wipro Banking and Financial Services CHANGING NATURE OF THE WEALTH MANAGEMENT INDUSTRY Challenges and opportunities for wealth advisors www.wipro.com Author: Dr. Ashok Hegde, Global Head
More informationHow To Manage A Supply Chain
www.wipro.com SERVICE-BASED SALES AND CHANNEL MANAGEMENT IN TELECOM Sridhar Marella Padam Jain Table of Contents 3...Introduction 4... Typical Challenges in Sales & Distribution 4... Solution Capabilities
More informationwww.wipro.com Software Defined Infrastructure The Next Wave of Workload Portability Vinod Eswaraprasad Principal Architect, Wipro
www.wipro.com Software Defined Infrastructure The Next Wave of Workload Portability Vinod Eswaraprasad Principal Architect, Wipro Table of Contents Abstract... 03 The Emerging Need... 03 SDI Impact for
More informationLESS PAPER. MORE PRINTING.
WWW.WIPRO.COM LESS PAPER. MORE PRINTING. Managed printing services and how it s helping offices to be more efficient in its printing practices. Adarsh R Talinki Sr. Practice Manager - EUC Global Infrastructure
More informationHigh Performance Analytics through Data Appliances
WWW.WIPRO.COM High Performance Analytics through Data Appliances Deriving more from data Sankar Natarajan Practice Lead (Netezza & Vertica Data Warehouse Appliance) at Wipro Technologies Table of contents
More informationCONNECTED HEALTHCARE. Multiple Devices. One Interface. www.wipro.com
www.wipro.com CONNECTED HEALTHCARE Multiple Devices. One Interface. Anirudha Gokhale Senior Architect, Product Engineering Services division at Wipro Technologies Table of Contents Abstract... 03 The Not-So-Connected
More informationRethinking Data Discovery The new research and experimentation paradigm for analytics and discovery. www.wipro.com
www.wipro.com Rethinking Data Discovery The new research and experimentation paradigm for analytics and discovery Nitesh Jain General Manager and Vertical Head CPG (Europe & Emerging Markets) Table of
More informationEmpowering business intelligence through BI transformation
www.wipro.com Empowering business intelligence through BI transformation Deepak Maheshwari Prinicipal Architect, Business Intelligence - Wipro Analytics Table of content 03... Introduction 04... De-bottlenecking
More informationSimplify Telecom Network Migration with Repeatable Frameworks
WWW.WIPRO.COM Simplify Telecom Network Migration with Repeatable Frameworks A perfect 10 in network migrations in the Telecom world is almost a mirage, but there s a lot that you could get a grip over
More informationThe Intelligent Business: How Benefits-Led Business Intelligence Can Drive Value
WIPRO CONSULTING SERVICES The Intelligent Business: How Benefits-Led Business Intelligence Can Drive Value www.wipro.com/consulting Also covered by The Intelligent Business: How Benefits-Led Business
More informationMANAGING LINEAR ASSETS Managing Linear Assets has always been a challenge; find out how customers leverage SAP to meet industry requirements.
WWW.WIPRO.COM MANAGING LINEAR ASSETS Managing Linear Assets has always been a challenge; find out how customers leverage SAP to meet industry requirements. Venkatesh Pulijala, EAM Consultant - Oil & Gas,
More informationCENTRALIZED CONTROL CENTERS FOR THE OIL & GAS INDUSTRY A detailed analysis on Business challenges and Technical adoption.
WWW.WIPRO.COM CENTRALIZED CONTROL CENTERS FOR THE OIL & GAS INDUSTRY A detailed analysis on Business challenges and Technical adoption. Senthilvelan Umapathi Practice Lead Table of contents 02 Executive
More informationRe-Shaping Retail Integration. Changing retail landscape with Social-Mobile-Analytics-Cloud. www.wipro.com
www.wipro.com Re-Shaping Retail Integration Changing retail landscape with Social-Mobile-Analytics-Cloud Gaurav Mittal Principal Consultant Wipro Ltd. Table of contents 03... Abstract 03... Retail Industry
More informationRetail Out-of-Stock Management:
Retail Out-of-Stock Management: An Outcome-Based Approach Your customers get what they want, when they want and wherever they want www.wipro.com Rajat Kaul Table of Contents 03... Abstract 03... The Retail
More informationOPTIMIZING INSURANCE DISTRIBUTION THROUGH A HYBRID MODEL
www.wipro.com OPTIMIZING INSURANCE DISTRIBUTION THROUGH A HYBRID MODEL Sasi Koyalloth Connected Enterprise Services (CES) BAS Table of Content 03... Abstract 04... Challenges of Direct and Agent-based
More informationCAPITALIZING ON IT INFRASTRUCTURE SERVICES FOR AN EFFECTIVE IT RISK MANAGEMENT IN BANKS
WWW.WIPRO.COM CAPITALIZING ON IT INFRASTRUCTURE SERVICES FOR AN EFFECTIVE IT RISK MANAGEMENT IN BANKS Harish Sudhamalal Table of Contents 03 Capitalizing on IT infrastructure services for an effective
More informationDriving Strategy to execution
WIPRO CONSULTING SERVICES Driving Strategy to Execution www.wipro.com/consulting Driving Strategy to Execution By Gerhard Plenert Facing financial and competitive pressures of historic proportions, operations
More informationHow To Design An Invoice Processing And Document Management System
WIPRO CONSULTING SERVICES Business Methods Series Source to Pay: Transforming Processing and Document Management Paulo Jose Freixa Calhau Preto Senior Manager, Finance & Accounting Transformation Practice,
More informationTelecom Analytics: Powering Decision Makers with Real-Time Insights
Telecom Analytics: Powering Decision Makers with Real-Time Insights www.wipro.com Anindito De, Practice Manager - Industry Solutions, CXO Services, Advanced Technologies & Solutions Subhas Mondal, Head
More informationWIPRO BOUNDARYLESS DATA CENTER SERVICES
www.wipro.com WIPRO BOUNDARYLESS DATA CENTER SERVICES Redefining Possibilities to drive Rapid Business Outcomes What Customers Say? Globalization, Entering new markets Changing consumer expectations Legacy
More informationYOUR TICKET TO A SUCCESSFUL CLOUD JOURNEY
YOUR TICKET TO A SUCCESSFUL CLOUD JOURNEY WWW.WIPRO.COM Atul Sood General Manager and Global Head of Cloud Enablement Wipro Technologies Table of Contents 03 Phase one: Standardize and Consolidate 04 Phase
More informationOPERATIONAL BENCHMARKING DRIVING BUSINESS EFFICIENCY
WWW.WIPRO.COM OPERATIONAL BENCHMARKING DRIVING BUSINESS EFFICIENCY Delivering best in class performance by targeting world class benchmarks and making processes more efficient and effective. Wipro BPO
More informationDIGITAL WEALTH MANAGEMENT FOR MASS-AFFLUENT INVESTORS
www.wipro.com DIGITAL WEALTH MANAGEMENT FOR MASS-AFFLUENT INVESTORS Sasi Koyalloth Connected Enterprise Services Table of Contents 03... Abstract 03... The Emerging New Disruptive Digital Business Model
More informationEnterprise Architecture for Communication Service Providers: Aligning Business Goals to IT
WIPRO CONSULTING SERVICES Enterprise Architecture for Communication Service Providers: Aligning Business Goals to IT www.wipro.com/consulting Enterprise Architecture for Communication Service Providers:
More informationSix Steps to Putting HR on the Path to Corporate Strategic Partner
WIPRO CONSULTING SERVICES Six Steps to Putting HR on the Path to Corporate Strategic Partner www.wipro.com/consulting Six Steps to Putting HR on the Path to Corporate Strategic Partner By Robert Staeheli
More informationRESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information
www.wipro.com RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information Saritha Auti Practice Head - Enterprise Security Solutions, Wipro Table of Contents 03... Abstract 03... Why
More informationThe Top 3 Reasons Why ERP Transformations Fail And How You Can Avoid Them
WIPRO CONSULTING SERVICES The Top 3 Reasons Why ERP Transformations Fail And How You Can Avoid Them www.wipro.com/consulting The Top 3 Reasons Why ERP Transformations Fail And How You Can Avoid Them By
More informationWWW.WIPRO.COM UP IN THE CLOUD
WWW.WIPRO.COM UP IN THE CLOUD Will the chemical industry be one of the first adopters or fast followers in transitioning to the Cloud? Read on to learn the latest Cloud technology trends in the global
More informationSECURITY ANALYTICS & INTELLIGENCE FOR CRITICAL INFRASTRUCTURE
www.wipro.com SECURITY ANALYTICS & INTELLIGENCE FOR CRITICAL INFRASTRUCTURE Saritha Auti Practice Head Enterprise Security Solutions, Wipro Table of Contents 03... Executive Summary 04... Demystifying
More informationThe People Data Imperative
WIPRO CONSULTING SERVICES The People Data Imperative www.wipro.com/consulting The People Data Imperative By Spyros Stamoulis and Martin Hill You re an HR executive of a multinational corporation with thousands
More informationOPTIMIZATION OF QUASI FAST RETURN TECHNIQUE IN TD-SCDMA
www.wipro.com OPTIMIZATION OF QUASI FAST RETURN TECHNIQUE IN TD-SCDMA Niladri Shekhar Paria Table of Contents 03... Abstract 03... Overview of QFR Technique 05... Problem in Existing QFR Technique 05...
More informationTransforming Distribution Utilities
www.wipro.com Transforming Distribution Utilities Digitizing the Core Anjan Lahiri Table of Contents 02 Abstract 02 Customers Steering the Change 03 Deconstructing the Digital Character 05 Utilities at
More informationStriking The Right Balance Between
Striking The Right Balance Between Customer Expectations And Business Needs An integrated service assurance framework for operational excellence www.wipro.com L.Ganeshkumar D.Sridhara Kumar Table of Contents
More informationWIPRO S MEDICAL DEVICES FRAMEWORK
WIPRO S MEDICAL DEVICES FRAMEWORK JUMP-START AND ACCELERATE YOUR CRM TRANSFORMATION DO BUSINESS BETTER INDUSTRY LANDSCAPE The medical technology industry is trending towards commoditization of products
More informationwww.wipro.com Manage Your Leads Well to Boost Sales Volumes Anupam Bhattacharjee Shine Gangadharan
www.wipro.com Manage Your Leads Well to Boost Sales Volumes Anupam Bhattacharjee Shine Gangadharan Table of Content 03... Introduction 04... The Great Transition 05... The way Forward 06... About the Authors
More informationIntercompany Reconciliation and Settlement. WIPRO CONSULTING SERVICES Business Methods Series. www.wipro.com/consulting
WIPRO CONSULTING SERVICES Business Methods Series Intercompany Reconciliation and Settlement Noel Billing, Senior Manager, Finance & Accounting Transformation Practice Wipro Consulting Services noel.billing@wipro.com
More informationTRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION
www.wipro.com TRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION Renaissance Delivery Experience Ecosystem Sabir Ahmad Senior Architect ... Table of Content Introduction 3 Driving Transformational
More informationWIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com
WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com Table of Contents 03...Introduction 04...Wipro Cloud (WIC) as a Service Type 05...Wipro Cloud Capabilities
More informationPowering the New Supply Chain: Demand Sensing for Small and Medium-Sized Businesses
WIPRO CONSULTING SERVICES Powering the New Supply Chain: Demand Sensing for Small and Medium-Sized Businesses www.wipro.com/consulting Powering the New Supply Chain: Demand Sensing for Small and Medium-Sized
More informationAn Integrated Validation Approach to SDN & NFV
www.wipro.com An Integrated Validation Approach to SDN & NFV Key challenges, implementation strategies and the road ahead. Jayaprakash Hariharan Mohan Kumar Table of Contents 03...Abstract 04...Introduction
More informationSMARTER FIELD WORK MANAGEMENT SYSTEMS
www.wipro.com SMARTER FIELD WORK MANAGEMENT SYSTEMS DO BUSINESS BETTER Smart grid Software & Data $2.9 BILLION IN 2015 Source: SBI Energy SMARTER FIELD WORK MANAGEMENT SYSTEMS Radhakrishnan Swaminathan
More informationwww.wipro.com Need For Mobility In Mining Vasuki Upadhya Domain Architecture Practice Head
www.wipro.com Need For Mobility In Mining Vasuki Upadhya Domain Architecture Practice Head Table of Contents 03... Abstract 03... Introduction 04... Impact of Mobile Technologies in Mining 05... Anytime,
More informationwww.wipro.com ENGINEERING & CONSTRUCTION: TECHNOLOGY PARTNER FOR TOMORROW S INFRASTRUCTURE
www.wipro.com ENGINEERING & CONSTRUCTION: TECHNOLOGY PARTNER FOR TOMORROW S INFRASTRUCTURE TECHNOLOGY PARTNER FOR TOMORROW S INFRASTRUCTURE The growth story of Engineering & Construction industry has been
More informationReal-Time Data Access Using Restful Framework for Multi-Platform Data Warehouse Environment
www.wipro.com Real-Time Data Access Using Restful Framework for Multi-Platform Data Warehouse Environment Pon Prabakaran Shanmugam, Principal Consultant, Wipro Analytics practice Table of Contents 03...Abstract
More informationTable of Contents. 03...Cut the Clutter, Join the Big Data Wellness Club. 06...About the Author. 06...About Wipro Ltd.
www.wipro.com Cut the Clutter, Join the Big Data Wellness Club FIs, Retailers aiming to derive business value from Big Data need to ensure Srinivasagopalan data correctness, Venkataraman timeliness and
More informationGoing Seamless with SIAM. Why you need a platform-based approach for Service Integration and Management WWW.WIPRO.COM
WWW.WIPRO.COM Going Seamless with SIAM Why you need a platform-based approach for Service Integration and Management Ramesh Dorairaj, Principal Consultant, Application Support and Maintenance Table of
More informationwww.wipro.com ACCOMMODATING IOT / M2M REQUIREMENTS IN THE CELLULAR ECOSYSTEM Mahendra Agarwal Architect, Wipro Tecnologies
www.wipro.com ACCOMMODATING IOT / M2M REQUIREMENTS IN THE CELLULAR ECOSYSTEM Mahendra Agarwal Architect, Wipro Tecnologies Table of Contents Abstract... 03 What s new in Cellular Technology?... 03 Device
More informationFuture of Minerals Exploration Helping the mining industry go deeper.
Future of Minerals Exploration Helping the mining industry go deeper. WWW.WIPRO.COM David Lee, GM Strategy- Mining, Wipro Technologies Table of contents 02 Future of Minerals Exploration 03 Minerals Exploration
More informationwww.wipro.com Data Quality Obligation by Character but Compulsion for Existence Sukant Paikray
www.wipro.com Data Quality Obligation by Character but Compulsion for Existence Sukant Paikray Table of Contents 02 Introduction 03 Quality Quandary 04 Major Industry Initiatives 05 Conclusion 06 06 About
More informationKEEPING ENERGY M&As ON TRACK WITH EARLY IT ENGAGEMENT
www.wipro.com KEEPING ENERGY M&As ON TRACK WITH EARLY IT ENGAGEMENT Ramakrishna Avasarala Consultant, SAP- O&G COE Table of Contents 03 Abstract 03 Introduction: Role of IT in M&As 04 06 Key focus areas
More informationENCOURAGING STORE ASSOCIATES IN AN OMNI CHANNEL WORLD MAKING INCENTIVE SCHEMES TRUE AND FAIR
WWW.WIPRO.COM ENCOURAGING STORE ASSOCIATES IN AN OMNI CHANNEL WORLD MAKING INCENTIVE SCHEMES TRUE AND FAIR Girish Kumar Global Practice Partner and Heads the Omni Channel Retail Practice Nirmal Jeyapal
More informationTHE TELCO MOBILE COUPON BUSINESS OPPORTUNITY
THE TELCO MOBILE COUPON BUSINESS OPPORTUNITY A framework for M2M based targeted mobile coupon delivery www.wipro.com Peter Elliott Ravi Chandar Vangara Bhagyashree Wattal Table of Contents Abstract...
More informationThe Global Supply Chain Goes Collaborative
WIPRO CONSULTING SERVICES The Global Supply Chain Goes Collaborative www.wipro.com/consulting The Global Supply Chain Goes Collaborative By Sebastian Ennulat In today s era of high customer expectations,
More informationAmanda, a working mom, spotted a summer skirt on the website of a top clothing brand and ordered it. When the skirt arrived it was the wrong color.
www.wipro.com DRIVING CUSTOMER INSIGHTS FOR RETAILERS IN THE DIGITAL ERA Venkataraman Ramanathan Senior Architect, Information Management, Wipro Analytics Amanda, a working mom, spotted a summer skirt
More informationwww.wipro.com THE FORECAST FOR CLOUD IS SUNNY Sudeshna Bhadury
www.wipro.com THE FORECAST FOR CLOUD IS SUNNY Sudeshna Bhadury Table of Contents 03...The Forecast for Cloud is Sunny 04...Data Privacy 04...Loss of Control 04...Latency 04...Location 04...When to think
More informationCONDIS. IT Service Management and CMDB
CONDIS IT Service and CMDB 2/17 Table of contents 1. Executive Summary... 3 2. ITIL Overview... 4 2.1 How CONDIS supports ITIL processes... 5 2.1.1 Incident... 5 2.1.2 Problem... 5 2.1.3 Configuration...
More informationwww.wipro.com Petroleum Retailers Ready to Fuel Omni-channel for a Seamless Customer Experience Sudhansu Choudhury Senior Consultant, Wipro
www.wipro.com Petroleum Retailers Ready to Fuel Omni-channel for a Seamless Customer Experience Sudhansu Choudhury Senior Consultant, Wipro Table of Contents 03... Petroleum Retailers: Ready to Fuel Omni
More informationThe Wipro NxtGen MEMS Advantage. Wipro NxtGen MEMS
State Health and Human Services Agencies have a lot to juggle, with evolving demands and rapid technological changes such as: need to modernize the legacy MMIS mandates from CMS to meet the MITA 3.0 framework
More informationwww.wipro.com Addressing Need-Based Consumerism for Cloud Services Robert Bates SMAC Architecture Group Head, Advanced Technologies & Solutions
www.wipro.com Addressing Need-Based Consumerism for Cloud Services Robert Bates SMAC Architecture Group Head, Advanced Technologies & Solutions Table of contents 03... Abstract 03... Introduction 04...
More informationSMART FACTORY IN THE AGE OF BIG DATA AND IoT
WWW.WIPRO.COM SMART FACTORY IN THE AGE OF BIG DATA AND IoT THE SHAPE OF THINGS TO COME Narendra Ghate Senior Manager at Wipro Analytics Table of contents 01 Industrial Revolution 4.0 is here. Where are
More informationARMING YOUR SECURITY OPERATIONS CENTER WITH THE RIGHT TECHNOLOGY & SERVICES
WWW.WIPRO.COM ARMING YOUR SECURITY OPERATIONS CENTER WITH THE RIGHT TECHNOLOGY & SERVICES Gopinathan. K Table of contents 03 Security - a key requirement 03 Challenges abound 04 The way forward 06 Essential
More informationRIGHT INTEGRATION STRATEGY - A CORNERSTONE FOR OMNI-CHANNEL RETAIL
WWW.WIPRO.COM RIGHT INTEGRATION STRATEGY - A CORNERSTONE FOR OMNI-CHANNEL RETAIL Gaurav Sai Mittal Table of Contents 03 Introduction 04 Creating an Omni-Channel Experience Functional Building Blocks 05
More informationOpen Source Software and The Enterprise
Open Source Software and The Enterprise Gain in more ways than one www.wipro.com Prajod S Vettiyattil Lead Architect Open Source Integration Group Wipro Limited Table of Contents 03 The Current Scenario
More informationENSURING SUCCESS IN AN AGILE-UX ENGAGEMENT
www.wipro.com ENSURING SUCCESS IN AN AGILE-UX ENGAGEMENT Anindita Sundaram Lead Consultant Table of Contents 03 Abstract 03 Introduction 04 04 05 Industry Perspective Solution Approach Benefits 06 Conclusion
More informationConsumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
More informationHR - A STRATEGIC PARTNER Evolution in the adoption of Human Capital Management systems
www.wipro.com HR - A STRATEGIC PARTNER Evolution in the adoption of Human Capital Management systems FUTURE READY SYSTEM FOR AN INSPIRED WORKFORCE Anand Gupta, Director, Oracle Cloud Services, Wipro Table
More informationWIPRO S ENTERPRISE UNIFIED COMMUNICATION AND CONTACT CENTER MANAGED SERVICES
WWW.WIPRO.COM WIPRO S ENTERPRISE UNIFIED COMMUNICATION AND CONTACT CENTER MANAGED SERVICES End-to-End Infrastructure Services DO BUSINESS BETTER INDUSTRY TRENDS Enterprise Unified Communications (UC) and
More informationwww.wipro.com NATURAL RESOURCES: Mining the way ahead
www.wipro.com NATURAL RESOURCES: Mining the way ahead MINING THE WAY AHEAD For a long period, the operating model of mining industry has been stagnant due to no compelling reason to evolve. But now, due
More informationDIGITAL INTEGRATED PLATFORM: BRINGING RESILIENCE TO CONSTRUCTION ENTERPRISE
www.wipro.com DIGITAL INTEGRATED PLATFORM: BRINGING RESILIENCE TO CONSTRUCTION ENTERPRISE DO BUSINESS BETTER THE NEED FOR CHANGE - WHY DIGITAL INTEGRATED PLATFORM? Few industries are as high risk and fragmented
More informationwww.wipro.com Community Analytics Catalyzing Customer Engagement Srinath Sridhar Wipro Analytics
www.wipro.com Community Analytics Catalyzing Customer Engagement Srinath Sridhar Wipro Analytics Table of Contents 03... Introduction 03... Communities: A Catalyst for Business Growth 05... Cost of Neglecting
More informationwww.wipro.com mhealth SOLUTIONS EMPOWER MASSES WITH AFFORDABILITY, ACCESSIBILITY AND QUALITY HEALTHCARE Santhosh Kumar Madathil Aparna Kumpatla
www.wipro.com mhealth SOLUTIONS EMPOWER MASSES WITH AFFORDABILITY, ACCESSIBILITY AND QUALITY HEALTHCARE Santhosh Kumar Madathil Aparna Kumpatla Table of Contents 03... Abstract 03... Overview of Health
More information