Auditing in TMF615 and its Benefits

Size: px
Start display at page:

Download "Auditing in TMF615 and its Benefits"

Transcription

1 Auditing in TMF615 and its Benefits MOHAMMED IBRAHIM ALEEM ARCHITECT, WIPRO TECHNOLOGIES

2 Table of contents Introduction Auditing in TMF615 Specification Security Breach Problem Description Problem Analysis using TMF615 Auditing Finding the Login Account and User Finding the Login and Logout time Gathering User Information Checking the Account in the Target Who Created the User? What Were the Details of This Suspect User? Who Created the Account? Asynchronous Mode in Auditing Conclusion Appendix References Terms and Definitions About the Author

3 Introduction TMF615 specification, a specification detailed by the TM Forum, empowers service providers by enabling centralized user management by detailing an interface between the centralized and local user management systems. TMF615 specification also has an exceptionally strong auditing feature which provides a comprehensive mechanism to monitor all the user and admin activities in the service provider network. This auditing feature can be effectively used in monitoring the security of the enterprise. This whitepaper lists out the advantages of auditing in TMF615 specification and explains through scenarios as to how exactly it can be used to resolve security issues. It is clear that monitoring security breaches through TMF615 auditing will help create a compliant and risk optimized system that will have a definite competitive advantage. TM Forum or the Tele- management Forum is an international association of industries that seeks to deal with the complex issues that are inherent in the business of service provision. Vendors subscribe to the standards, specifications and procedures directed by the TMF. Wipro has found it expedient to comply with TMF s guidelines to provide the best value to its customers. In this paper, we discuss TMF615 specifications in particular and how complying with these specifications can help investigate and, thereby, minimize security risks. Telecom service providers have for long lived with the problem of provisioning/managing users and access rights across the various OSS (Operation Support System) products managing the network. In order to address this major issue, TM Forum has developed the TMF615 specification which advocates managing the entire user provisioning and auditing needs from a single place for the entire organization. In Wipro s own experience with telecom service providers, auditing with these specifications has been useful in detecting security threats and managing the network effectively. The below figure gives a overview of current problem pertaining to User Provisioning in large service networks with multiple OSS vendor solutions. OSS Provider 1 User Management Network OSS Provider 2 OSS Provider n User Management Process Flow of User Management in Heterogeneous Networks 02

4 TMF615 Solution TMF615 specification details an interface which makes it possible for service providers to consistently provision telecom OSS operator s access rights and authorities across systems using a central user management system (UMS-C). The interface deals with the information exchange required between UMS-C and local user management system (), related to the provision of access rights, authorities and auditing. is a local UM solution for the OSS, which is usually vendor specific OSS. TMF615 specification introduces the concept of UMS-C and, and provides a Web Services based integration profile. Following are some of the key advantages of TMF615: Centralized User Provisioning across the Network Ability of Service Provider to Define Roles Centralized User Auditing Significant Savings in terms of Money and Effort Each administrator action at UMS-C will result in a simple object access protocol (SOAP)/http message coming to, which will be processed, based on the request type and appropriate response will be sent back to UMS-C. The picture given below illustrates the process. User Access OSS Provider 1 Network OSS Provider 2 WSDL/SOAP UMS-C OSS Provider n User Management User Access TMF615 Compliant User Management 03

5 Auditing in TMF615 Specification Auditing is absolutely necessary for any user management system to monitor the activities of provisioned users/administrators and prevent misuse. TMF615 specification supports two types of auditing. Status Audit This is mainly used to synchronize UMS-C and with each other. This checks the user accounts and their authorities currently at. Following are the Status Audit operations supported by TMF615 specification: User Provisioning Information Target Account Information Audit Trail This deals with monitoring the activities of provisioned users over a period of time and is very critical to security. Reports which provide details on the user status and actions performed can be generated. Following are the Audit Trail operations supported by TMF615 specification: User Admin Operations User Provisioning Operations Target Admin Operations Targets Account Usage Targets Authorization Usage In order to get more information on individual audit operations, please In the following chapters, we explain each of the advantages of auditing mentioned in the TMF615 specification. To make the benefits clearer, we consider a practical problem scenario and show how different auditing features can be used for analysis and reporting. Problem Description- Security Breach A major problem faced by operators is the constant threat to security. A number of operators work round the clock to ensure that there is no loss of service to the subscribers while simultaneously ensuring that there is no loss of revenue data which is a prerequisite for billing purposes. Each of these operators has a unique role and is dedicated to specific tasks like monitoring network events, faults etc. There are number of applications which the operators use for effective monitoring and reporting purposes. Typically, the operator who monitors the network is intimated of many critical alarms indicating the loss of events from the network. This is quickly escalated to the network administrator. The network administrator during his monitoring of the telecom network discovers that the configuration of the critical section was radically transformed leading to service outage to the end customers. It leads to major management escalation as it caused a huge revenue leak and loss of credibility for the organization. The below figure depicts this problem. check TMF615 specification document from TM Forum. Network OSS SSO Network update User Access Security Breach Network Configuration Change 04

6 Problem Generation- How is the problem created? The following diagram is a pictorial representation of how the administrator creates a new user. The user is added to the which, in turn, updates the Database store. Automatically, the OSS application is updated with the new User Account along with its role. UMS-C DataStore Target/ OSS Application Create New User AddUser() Admin Create User and Accounts with Role () Create User and Accounts with Role () AddUser() Sequence Diagram Administrator Creates a New User Subsequently, the new User logs in and updates the network configuration creating the problem, as illustrated below. OSS SSO Application DataStore Target/OSS Network Login() User Logout() Update Network Configuration () Update Network Configuration () Sequence Diagram User Changes the Network (Problem Creation) 05

7 In the final act the user and its accounts are deleted by the administrator, this is illustrated below. UMS-C DataStore Target/ OSS Application Delete User Remove User() Admin Delete User and Accounts with Role () Delete User and Accounts with Role () Remove User() Sequence Diagram - Admin Deletes the User Problem Analysis- Using TMF615 Auditing Ideally, the operators who were assigned the role of Network Configurators (usually administrators or senior operators) could have implemented the network update activity. However, initial investigation revealed that none of them were actually present in office when the security breach was suspected. The TMF615 Audit feature provides a good framework for tracking and locating the exact problem. Following is a step-by-step procedure that can be followed by the auditor to resolve this specific issue. See how after every step, the auditor finds more critical information that helps him get to the root of the problem. All the steps have been mapped to audit functions mentioned under TMF615. The first task is to find the login account and user. Finding the Login Account and User The only information available to the auditor at this stage is that any operator who has been assigned the role of Network Configurator is capable of damaging the network. In order to find out which users/accounts were used with this role during that time period, the auditor can use the audit operation Target Authorization Usage. This audit operation gives a list of all accounts (and their users) which posses the role Network Configurators and were active during the specified time period. Now in this list, the auditor has to scan the accounts/users and find out the account used and the suspect user. After a brief analysis, the auditor isolates the account/user which seems to be dangling and does not actually belong to any of the existing operators or administrators. Finding the login account & user Target Authorization Target Authorization Mapped to Usage under Usage gives a TMF615 Process list of all Output accounts (and their users) Suspect user & account ID The next task is to locate the time period when the suspect account was actually used. 06

8 Finding the Login and Logout time In order to find the exact time slot when the suspect account was This audit operation gives the exact time slot, with login and logout time, during which this account was active. This establishes the user, account and the time duration during which the damage was inflicted. active, the auditor uses the audit operation Target Account Usage. Finding the login & logout time Target Account Usage under Target Account Usage gives the Mapped to TMF615 exact time slot Process with login & Output logout time Time slot of the security breach Gathering User Information In order to gather all the details about the user, the auditor uses the audit operation User Provisioning Information. This audit operation However, it might happen that this audit operation does not yield any significant result. The lookup user operation informs that the user does not exist. gives all the user details like accounts, roles and its working schedule. Gathering user information User Provisioning Information under TMF615 User Provisioning Operations gives user details like accounts, role and working schedule Mapped to Process Output User does not exist Checking the Account in the Target As the user is not found, the auditor tries to check if the account exists only on a target system without user association, like a dangling Information". This operation might not lead to any substantial information either. The auditor now believes that the problem in the network is not a mistake committed while using the tools but a clear case of intentional security breach. account. For this the auditor uses the audit operation "Target Account Checking account in the target Target Account Information Mapped to under TMF615 Process Output Target Account Usage provides account information Suspect account does not exist on target The next steps are crucial in locating the exact problem. 07

9 Below is a sequential illustration of the process by which the auditor is able to track down the User, account and time slot of the problem. Auditor UMS-C Datastore 1.a Finding the login account and User 1.d Finding the login account and User 1.b Target Authorization usage() 1.c Target Authorization usage() 2.a Finding the login and Logout time 2.d Finding the login and Logout time 2.b Target Account usage() 2.c Target Account usage() 3.a Gather all the user information 3.d Gather all the user information 3.b Users Provisioning Information() 3.c Users Provisioning Information() 4.a Check the account in the Target 4.d Check the account in the Target 4.b Target account Information() 4.c Target account Information() Sequence Diagram Auditor Locates Suspect User, Account & Time Slot of Problem Creation Who Created the User? In order to determine who was responsible for creating the user, the auditor uses the audit operation User Admin Operations and specifies the time range in which the deed was committed. This audit the suspected user was created and deleted after a short span of time. Also, it reveals crucial information about which of the existing administrators created it. Administrator can be identified using the request identifier at UMS-C. operation gives a wealth of information to the auditor. It reveals that User creation User Admin Operations User Admin Operations Mapped to under TMF615 provides Process information about Output the administrator who created the user Suspect account does not exist on target What were the Details of this Suspect User? Auditor can use the audit operation User Provisioning Operations to determine the exact provisioning details of this user. Details of the suspect user User Provisioning User Provisioning Operations Mapped to Operations provides under TMF615 Process provisioning details Output Provisioning details of the user 08

10 Who Created the Account? at the root of the problem is identified by using the advanced audit features supported by TM615 specification. Thus, the TM615 specification is successful in delivering in a situation that requires investigation into a security breach problem. Similarly, several other problems can also be identified and resolved by the TM615 specification. Finally, in order to determine similar details for the account, the auditor uses the audit operation Target Admin Operations and specifies the time range. This step reveals that the suspected account was created and deleted after a short span of time. More importantly, the administrator responsible for creating it is identified. The administrator who is Creator of the account User Provisioning Operations under TMF615 User Provisioning Operations provides provisioning details Mapped to Process Output Provisioning details of the user Below is a sequential illustration of how the auditor is able to isolate the details of the suspect User, account and administrator 5.a Who created the user? 5.d Who created the user? 6.a Get the details of this suspect user 6.d Get the details of this suspect user 5.b User Admin Operation() 5.c User Admin Operation() 6.b Users Provisioning Operations() 6.c Users Provisioning Operations() Get Admin Operation Data() Get Admin Operation Data() Get History User Data() Get History User Data() 7.a Who created the account? 7.d Who created the account? 7.b Target Admin Operations() 7.c Target Admin Operations() Get History Account Data() Get History Account Data() Sequence Diagram Auditor Gets Details about Suspect User, Account & Administrator 09

11 Future challenges: Asynchronous Mode in Auditing The only aspect of auditing that TMF615 leaves unresolved is the asynchronous mode of auditing. This, however, is a challenge for the future. As depicted in the illustration below, the asynchronous mode of auditing allows the to collect auditing data regularly and send the reports to UMS-C. Such reports are extremely useful to the administrator in managing and monitoring the OSS security effectively. UMS-C DataStore Target/ OSS Application Create New Auditing Request Enable Auditing() Admin Activate Auditing Log Collection() Activate Auditing Log Collection() Enable Auditing() Collect Audit Data() Auditing Report Collect Audit Data() Collect Audit Data() Auditing Report Collect Audit Data() Sequence Diagram Asynchronous Mode in Auditing Compliant and risk optimized solution TMF615 is specifically geared towards enhancing the efficiency of a system focusing on the security threats that plague modern result in compliant and risk optimized solutions that have a distinct competitive advantage. Given this benefit, it is only a question of time before more telecom services providers adopt TMF615 specifications to ward-off security threats and manage the system more effectively. organizations and systems. Systematic investigation of security breaches 10

12 Conclusion It is clear that TMF615 supported auditing delivers huge benefits to service providers. Auditing can also be managed completely at the UMS-C, if it captures all the user provisioning data sent to sthe major advantages of TMF615 are: Centralized management of all operators in the service provider network Single sign on/off can be realized quickly through proper integration with TMF614 specification Increased security with the auditing feature Increased security due to proper management of operator permission and schedule Following future improvements are being considered for enterprise security at TM Forum: Asynchronous operations support Enhanced error reporting More information for operators relating to integration and migration to TMF615/TMF614 and SCA standards Specific ongoing work in order to standardize audit through "Security Compliance Audit Automation (SCA)" Faster user provisioning and increased automation leading to considerable cost benefits Despite these improvements suggested for the future, TMF615 is definitely geared towards creating compliant and risk optimized systems. Telecom services providers would have a competitive edge were they to adopt this solution for their systems. 11

13 Appendix References Terms and Definitions TM Forum. TMF615 Specification. Website: omoss/37358/article.html Unified Modeling Language (UML). Website: World Wide Web Consortium (W3C). SOAP 1.2 Specification. Website: Oasis Advancing Open Standards for the Information Society. SPML 2.0 specification. Website: etom enhanced Telecom Operation Map NE Network Element OS Operating System OSS Operation Support System SOAP Simple Object Access Protocol SSO Single Sign On TMF Tele Management Forum World Wide Web Consortium (W3C). WSDL 2.0 Specification. Website: 12

14 Mohammed Ibrahim Aleem is an Architect working with Wipro's Global Media and Telecom division. He has extensive experience is architecting/designing and providing consultancy for telecom OSS solutions. He is a specialist in the areas of identity management and security. He has been involved with many telecom solution implementations and consulting assignments and is well aware of the processes, standards and the best practices involved. He is an active member of the Enterprise Security Group at TM Forum and is working closely towards the development of user management and single sign on/off standards. Wipro in Media & Telecom Wipro Global Media and Telecom is the newly formed SBU which combines Telecom Equipment Vendors (TEV), Global Communications Service Providers (GCSP) and Media & OTT business units globally. Wipro is a strategic partner across the digital supply chain starting from content creation to content consumption and uniquely positioned to address Digital transformation and help organizations Do Business Better in a Digital World. Wipro s vertically aligned business model gives a deep understanding of customers businesses to build industry specific solutions, while technology service lines provide the ability to design new solutions on emerging technologies delivering winning business outcomes. About Wipro Technologies Wipro Technologies, the global IT business of Wipro Limited (NYSE:WIT) is a leading Information Technology, Consulting and Outsourcing company, that delivers solutions to enable its clients do business better. Wipro Technologies delivers winning business outcomes through its deep industry experience and a 360 degree view of Business through Technology helping clients create successful and adaptive businesses. A company recognised globally for its comprehensive portfolio of services, a practitioner s approach to delivering innovation and an organization wide commitment to sustainability, Wipro Technologies has over 120,000 employees and clients across 54 countries. For more information, please visit or 13

15 DO BUSINESS BETTER W W W. W I P R O. C O M N Y S E : W I T OV E R 1 2 0, E M P L OY E E S 5 4 C O U N T R I E S C O N S U L T I N G S Y S T E M I N T E G R AT I O N O U T S O U R C I N G WIPRO TECHNOLOGIES, DODDAKANNELLI, SARJAPUR ROAD, BANGALORE , INDIA TEL : +91 (80) , FAX : +91 (80) , North America South America Canada United Kingdom Germany France Switzerland Poland Austria Sweden Finland Benelux Portugal Romania Japan Philippines Singapore Malaysia Australia Copyright Wipro Technologies. All rights reserved. No part of this document may be reproduced, stored in a retrieval system, transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without express written permission from Wipro Technologies. Specifications subject to change without notice. All other trademarks mentioned herein are the property of their respective owners. Specifications subject to change without notice. IND/UNPL/JULY2011-DEC2011

Decoding Middleware DNA for Successful Migration

Decoding Middleware DNA for Successful Migration Decoding Middleware DNA for Successful Migration www.wipro.com Sankara Subramanian Palanisamy Middleware Migration Solutions, Enterprise Business Integration Table of contents 03... DNA The Blueprint of

More information

DEMANTRA DEMAND MANAGEMENT CONFIGURE TO ORDER IMPLEMENTATION ENGINEERING A COMPLETE ORACLE SOLUTION DO BUSINESS BETTER.

DEMANTRA DEMAND MANAGEMENT CONFIGURE TO ORDER IMPLEMENTATION ENGINEERING A COMPLETE ORACLE SOLUTION DO BUSINESS BETTER. www.wipro.com DEMANTRA DEMAND MANAGEMENT CONFIGURE TO ORDER IMPLEMENTATION ENGINEERING A COMPLETE ORACLE SOLUTION Scan the QR Code to learn more DO BUSINESS BETTER Table of Contents 03...Overview 03...Business

More information

Risks in Middleware Migration- Demystifying the Journey

Risks in Middleware Migration- Demystifying the Journey Risks in Middleware Migration- Demystifying the Journey www.wipro.com Sankara Subramanian Palanisamy Middleware Migration Solutions, Enterprise Business Integration Table of contents 03... Risks in Middleware

More information

BANKS BRACE FOR BASEL III

BANKS BRACE FOR BASEL III BANKS BRACE FOR BASEL III Industry Best Practices in Integrated Risk & Finance IT (Basel III and GL Consolidation) www.wipro.com CONTENTS Introduction Data Management Challenges for Banks Oracle PeopleSoft

More information

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD IDENTITY & ACCESS MANAGEMENT IN THE CLOUD www.wipro.com Niraj Kumar Shukla Table of Contents 3... 1. Introduction 3... 2. IAM Approach 4... 2.1. Phase I - Plan 4...2.1.1. Understanding the Environment

More information

Standardize & Manage Test Environments

Standardize & Manage Test Environments www.wipro.com Standardize & Manage Test Environments Ensure Higher Test Coverage and De-Risk Testing from Test Environmental Bottlenecks Testing Services Wipro Technologies Table of Contents 03 Need for

More information

ADDRESSING THE PAYMENT PROGRAM CHALLENGES

ADDRESSING THE PAYMENT PROGRAM CHALLENGES www.wipro.com ADDRESSING THE PAYMENT PROGRAM CHALLENGES Narayanan Venkateswaran Banking and Financial Services, Wipro Technologies Table of Contents 03... Introduction 04... Need for Payments Transformation

More information

STANDARDIZATION IN THE OUTSOURCING INDUSTRY

STANDARDIZATION IN THE OUTSOURCING INDUSTRY WWW.WIPRO.COM STANDARDIZATION IN THE OUTSOURCING INDUSTRY Moving from Variation by Rule to Variation by Exception resulting in better quality, faster delivery, and lesser cost of operations. Wipro BPO

More information

Ensuring procurement compliance in infrastructure maintenance business

Ensuring procurement compliance in infrastructure maintenance business www.wipro.com Ensuring procurement compliance in infrastructure maintenance business Amarnath Shete Saju Paul Table of Contents 3... Abstract 3... Modus operandi of Maintenance Service Companies 3... What

More information

DB2 to Oracle database Migration during JD Edwards Upgrade

DB2 to Oracle database Migration during JD Edwards Upgrade DB2 to Oracle database Migration during JD Edwards Upgrade www.wipro.com Author : Ashish Kumar Mandal Table of contents 1. INTRODUCTION...02 2. DATABASE INSIGHT...02 3. MIGRATION CHALLENGES 4. MIGRATION

More information

NEW PLAY GROUND OF GLOBAL FASHION PLAYERS CHINA & INDIA

NEW PLAY GROUND OF GLOBAL FASHION PLAYERS CHINA & INDIA NEW PLAY GROUND OF GLOBAL FASHION PLAYERS CHINA & INDIA www.wipro.com RETAIL INDUSTRY IS ALL ABOUT CONNECTING WITH THE CUSTOMER. In the value chain of Fashion Industry, if each Vendor, Manufacturer, Wholesaler

More information

Freight aggregation in order fulfilment lifecycle to achieve better freight planning

Freight aggregation in order fulfilment lifecycle to achieve better freight planning Freight aggregation in order fulfilment lifecycle to achieve better freight planning www.wipro.com Agathian Sannasi Email: agathian.sannasi@wipro.com Table of contents 1. ABSTRACT...02 2. THE SALES ORDER

More information

BETTER DESIGNED BUSINESS PROCESSES

BETTER DESIGNED BUSINESS PROCESSES BETTER DESIGNED BUSINESS PROCESSES Select The Right Process Modeling Tool Base))) Nithya Ramkumar Vice President, Base))), Wipro Business Process Services Table of Contents 03 The Right Modeling Tool To

More information

Six Steps to Successful APR-PQR Automation

Six Steps to Successful APR-PQR Automation WIPRO CONSULTING SERVICES Six Steps to Successful APR-PQR Automation www.wipro.com/consulting Six Steps to Successful APR-PQR Automation By Aman Gupta As a pharmaceutical manufacturer, you know the drill.

More information

Oil & Gas. Upstream Data and Information Management Survey. Conducted for WIPRO by the Oil & Gas Journal Online Research Center.

Oil & Gas. Upstream Data and Information Management Survey. Conducted for WIPRO by the Oil & Gas Journal Online Research Center. Oil & Gas Upstream Data and Information Management Survey Conducted for WIPRO by the Oil & Gas Journal Online Research Center April 11 www.wipro.com/industries/energy Authors: Jim Lawnin & Mark Allen Industry

More information

Mobile Application Management. www.wipro.com. Anand Kale Mobility Solutions Head- Banking & Financial Services, Wipro Mobility Solutions

Mobile Application Management. www.wipro.com. Anand Kale Mobility Solutions Head- Banking & Financial Services, Wipro Mobility Solutions Mobile Application Management www.wipro.com Anand Kale Mobility Solutions Head- Banking & Financial Services, Wipro Mobility Solutions Table of contents 03... Mobile Application Management (MAM): Reduce

More information

RETAIL STORE INTEGRATOR (RSI) ENGINEERING A COMPLETE ORACLE SOLUTION DO BUSINESS BETTER Scan the QR Code to learn more

RETAIL STORE INTEGRATOR (RSI) ENGINEERING A COMPLETE ORACLE SOLUTION DO BUSINESS BETTER Scan the QR Code to learn more www.wipro.com RETAIL STORE INTEGRATOR (RSI) ENGINEERING A COMPLETE ORACLE SOLUTION Scan the QR Code to learn more DO BUSINESS BETTER Table of contents 03... Introduction 03... Key Requirements 04... Solution

More information

BETTER SELF SERVICE USING ORACLE KNOWLEDGE FOR TRANSFORMING CUSTOMER EXPERIENCE ENGINEERING A COMPLETE ORACLE SOLUTION DO BUSINESS BETTER

BETTER SELF SERVICE USING ORACLE KNOWLEDGE FOR TRANSFORMING CUSTOMER EXPERIENCE ENGINEERING A COMPLETE ORACLE SOLUTION DO BUSINESS BETTER www.wipro.com BETTER SELF SERVICE USING ORACLE KNOWLEDGE FOR TRANSFORMING CUSTOMER EXPERIENCE ENGINEERING A COMPLETE ORACLE SOLUTION Scan the QR Code to learn more DO BUSINESS BETTER Table of Contents

More information

SaaS Maturity Evolution for Transforming ISVs business

SaaS Maturity Evolution for Transforming ISVs business SaaS Maturity Evolution for Transforming ISVs business www.wipro.com www.wipro.com Hemanth Kumar A. (Solution Architect) Rajesh Gupta Hemanth Kumar Amitoj Singh Amitoj Practice Singh Head (Product Solution

More information

Analytics in an Omni Channel World. Arun Kumar, General Manager & Global Head of Retail Consulting Practice, Wipro Ltd.

Analytics in an Omni Channel World. Arun Kumar, General Manager & Global Head of Retail Consulting Practice, Wipro Ltd. Analytics in an Omni Channel World www.wipro.com Arun Kumar, General Manager & Global Head of Retail Consulting Practice, Wipro Ltd. Table of Contents 03...Extending the Single View of Consumer 04...Extending

More information

WWW.WIPRO.COM CRITICAL SUCCESS FACTORS FOR A SUCCESSFUL TEST ENVIRONMENT MANAGEMENT

WWW.WIPRO.COM CRITICAL SUCCESS FACTORS FOR A SUCCESSFUL TEST ENVIRONMENT MANAGEMENT WWW.WIPRO.COM CRITICAL SUCCESS FACTORS FOR A SUCCESSFUL TEST ENVIRONMENT MANAGEMENT Table of contents 01 Abstract 02 Key factors for a successful test environment management 05 Conclusion 05 About the

More information

Cyber Warfare, Governance, and the Art of War

Cyber Warfare, Governance, and the Art of War WIPRO CONSULTING SERVICES Cyber Warfare, Governance, and the Art of War www.wipro.com/consulting Cyber Warfare, Governance, and the Art of War By Manohar Ganshani It was a catastrophic Christmas for retailer

More information

Steel Companies Look to Join IT Outsourcing Bandwagon Bibartak Mandal

Steel Companies Look to Join IT Outsourcing Bandwagon Bibartak Mandal www.wipro.com Steel Companies Look to Join IT Outsourcing Bandwagon Bibartak Mandal Table of Contents 3...Steel Companies Look to Join IT Outsourcing Bandwagon 4...Phased Approach to Outsourcing 5...Benefits

More information

Evaluating Managed File Transfer Solutions

Evaluating Managed File Transfer Solutions Evaluating Managed File Transfer Solutions Right evaluation is essential to make the right choice of a Managed File Transfer solution www.wipro.com Manish Dhama B2B Integration Practice, Wipro Technologies

More information

Software vendors evolution in the new industry paradigm

Software vendors evolution in the new industry paradigm Software vendors evolution in the new industry paradigm Future of independent software vendors www.wipro.com Rajesh Gupta Rajesh Gupta Practice head- ISV vertical Practice head- ISV vertical Manufacturing

More information

HOW TO PROVISION THE RIGHT TEST DATA FOR BUSINESS EVENTS?

HOW TO PROVISION THE RIGHT TEST DATA FOR BUSINESS EVENTS? www.wipro.com HOW TO PROVISION THE RIGHT TEST DATA FOR BUSINESS EVENTS? Sunder Nochilur Sr. Consultant, Wipro Technologies Table of Contents 03... Abstract 03... Introduction 04... The Challenge 05...

More information

How will Manufacturing Adapt to the Digital World? Marlon Hiralal Director Europe Smart Manufacturing

How will Manufacturing Adapt to the Digital World? Marlon Hiralal Director Europe Smart Manufacturing www.wipro.com How will Manufacturing Adapt to the Digital World? Marlon Hiralal Director Europe Smart Manufacturing Table of Contents 03... Changing Winds 04... Game Shifter: Smart Manufacturing/Industry

More information

TRANSFORMING BANKING ANALYTICS ENGINEERING A COMPLETE ORACLE SOLUTION DO BUSINESS BETTER Scan the QR Code to learn more

TRANSFORMING BANKING ANALYTICS ENGINEERING A COMPLETE ORACLE SOLUTION DO BUSINESS BETTER Scan the QR Code to learn more www.wipro.com TRANSFORMING BANKING ANALYTICS ENGINEERING A COMPLETE ORACLE SOLUTION Scan the QR Code to learn more DO BUSINESS BETTER ANALYTICS AS A BUSINESS ENABLER Data availability for banks has grown

More information

Partnering for Success: Transitioning from Shared Services to Global Business Services

Partnering for Success: Transitioning from Shared Services to Global Business Services WIPRO CONSULTING SERVICES Partnering for Success: Transitioning from Shared Services to Global Business Services www.wipro.com/consulting Partnering For Success: Transitioning from Shared Services to Global

More information

INTEROPERABILITY FOR POINT OF CARE TESTING DEVICES

INTEROPERABILITY FOR POINT OF CARE TESTING DEVICES www.wipro.com INTEROPERABILITY FOR POINT OF CARE TESTING DEVICES Vijay Kumar Zharotia Table of Contents 03... Abstract 03... Introduction 04... Approaches for Implementing POCT1-A2 05... Interface Definition

More information

COGNITIVE RADIO Niladri Shekhar Paria (WT01 Mfg. & Hi-Tech) Wipro Technologies [Company address]

COGNITIVE RADIO Niladri Shekhar Paria (WT01 Mfg. & Hi-Tech) Wipro Technologies [Company address] www.wipro.com COGNITIVE RADIO Niladri Shekhar Paria (WT01 Mfg. & Hi-Tech) Wipro Technologies [Company address] Table of Contents 03... Cognitive Radio 03... Cognitive Radio Explained 05... Existing Cognitive

More information

INTELLIGENT TECHNOLOGY INFRASTRUCTURE PROVIDER FOR NEXT GENERATION RAIL SYSTEMS

INTELLIGENT TECHNOLOGY INFRASTRUCTURE PROVIDER FOR NEXT GENERATION RAIL SYSTEMS www.wipro.com INTELLIGENT TECHNOLOGY INFRASTRUCTURE PROVIDER FOR NEXT GENERATION RAIL SYSTEMS THE CHALLENGE Wipro s Intelligent Technology infrastructure services have the potential to transform rail management,

More information

WIPRO OFFERINGS ON ORACLE PEOPLESOFT ENGINEERING A COMPLETE ORACLE SOLUTION DO BUSINESS BETTER

WIPRO OFFERINGS ON ORACLE PEOPLESOFT ENGINEERING A COMPLETE ORACLE SOLUTION DO BUSINESS BETTER www.wipro.com WIPRO OFFERINGS ON ORACLE PEOPLESOFT Leverage Best-in-class Offerings to Build that Elusive Business Case ENGINEERING A COMPLETE ORACLE SOLUTION Scan the QR Code to learn more DO BUSINESS

More information

Incentive compensation drivers and best practices

Incentive compensation drivers and best practices Incentive compensation drivers and best practices www.wipro.com Vaibhav Chauhan, Abhishek Sharma Saurabh Satpute Table of contents 1. INTRODUCTION...02 2. DRIVERS FOR SALES INCENTIVE MANAGEMENT...02 3.

More information

RUN SAP: SIMPLIFYING COMPLEX APPLICATION LANDSCAPES THROUGH STANDARDIZATION

RUN SAP: SIMPLIFYING COMPLEX APPLICATION LANDSCAPES THROUGH STANDARDIZATION RUN SAP: SIMPLIFYING COMPLEX APPLICATION LANDSCAPES THROUGH STANDARDIZATION www.wipro.com Introduction The modern organization is faced with a fast evolving landscape in the wake of volatile and interconnected

More information

Agile Change: The Key to Successful Cloud/SaaS Deployment

Agile Change: The Key to Successful Cloud/SaaS Deployment WIPRO CONSULTING SERVICES Agile Change: The Key to Successful Cloud/SaaS Deployment www.wipro.com/consulting Agile Change: The Key to Successful Cloud/SaaS Deployment By Robert Staeheli and Gregor Marshall

More information

ENABLING PERSONALIZATION IN THE WORLD OF GROCERY

ENABLING PERSONALIZATION IN THE WORLD OF GROCERY WWW.WIPRO.COM ENABLING PERSONALIZATION IN THE WORLD OF GROCERY With the advent in technology, retailers need to provide a seamless personalized shopping experience both online and in stores. Kuru Subramaniam

More information

WARRANTY AS A COMPETITIVE DIFFERENTIATOR IN MANUFACTURING

WARRANTY AS A COMPETITIVE DIFFERENTIATOR IN MANUFACTURING www.wipro.com WARRANTY AS A COMPETITIVE DIFFERENTIATOR IN MANUFACTURING Prasanna Krishnan Prasanna.Krishnan@wipro.com Table of Contents 03 Introduction 03 Warranty Opportunities 04 05 05 Warranty Strategy

More information

PREDICTIVE INSIGHT ON BATCH ANALYTICS A NEW APPROACH

PREDICTIVE INSIGHT ON BATCH ANALYTICS A NEW APPROACH WWW.WIPRO.COM PREDICTIVE INSIGHT ON BATCH ANALYTICS A NEW APPROACH Floya Muhury Ghosh Table of contents 01 Abstract 01 Industry Landscape 02 Current OM Tools Limitations 02 Current OM Tools Potential Improvements

More information

CREATING BUSINESS VALUE

CREATING BUSINESS VALUE WWW.WIPRO.COM CREATING BUSINESS VALUE Making our customer succeed by enabling their business to improve end user experience, reducing cost of operations, and improving revenue. Wipro BPO Authors: Rajesh

More information

EMPOWER YOUR ORGANIZATION - DRIVING WORKFORCE ANALYTICS

EMPOWER YOUR ORGANIZATION - DRIVING WORKFORCE ANALYTICS WWW.WIPRO.COM EMPOWER YOUR ORGANIZATION - DRIVING WORKFORCE ANALYTICS Using tactical workforce intelligence to optimize talent and set the cornerstone to manage workforce competency risks. Suvrat Mathur,

More information

MOBILE ENTERPRISE APP STORES: THE SAP GAME CHANGER

MOBILE ENTERPRISE APP STORES: THE SAP GAME CHANGER MOBILE ENTERPRISE APP STORES: THE SAP GAME CHANGER www.wipro.com CONTENTS Testing times for time-tested strategies Picking best practices from a consumer app store Going beyond a consumer app store New

More information

Shift in Pharmaceutical status-quo

Shift in Pharmaceutical status-quo Shift in Pharmaceutical status-quo Is Manufacturing analytics playing a big role? www.wipro.com Prasad Shyam General Manager, Advanced Technologies & Solutions Table of Contents 03... Introduction 03...

More information

Driving Innovation for Transformation: How CIOs Can Capture the Opportunity in Mobile Business Applications

Driving Innovation for Transformation: How CIOs Can Capture the Opportunity in Mobile Business Applications WIPRO CONSULTING SERVICES Driving Innovation for Transformation: How CIOs Can Capture the Opportunity in Mobile Business Applications www.wipro.com/consulting Driving Innovation for Transformation: How

More information

INTERNET OF THINGS Delight. Optimize. Revolutionize.

INTERNET OF THINGS Delight. Optimize. Revolutionize. WWW.WIPRO.COM INTERNET OF THINGS Delight. Optimize. Revolutionize. DO BUSINESS BETTER HOW IS YOUR BUSINESS ALIGNED TO CAPITALIZE ON THE FASCINATING OPPORTUNITIES OF THE FUTURE? ARE YOU LOOKING AT DOING

More information

WHEN IT COMES TO ENROLLMENT AND MEMBERSHIP MANAGEMENT SOLUTIONS

WHEN IT COMES TO ENROLLMENT AND MEMBERSHIP MANAGEMENT SOLUTIONS WWW.WIPRO.COM WHEN IT COMES TO ENROLLMENT AND MEMBERSHIP MANAGEMENT SOLUTIONS You need to look no further! DO BUSINESS BETTER ENROLLMENT AND MEMBERSHIP MANAGEMENT THE TRANSFORMING LANDSCAPE AND ITS IMPACT

More information

The Integrated Customer View

The Integrated Customer View WIPRO CONSULTING SERVICES The Integrated Customer View www.wipro.com/consulting As covered by The Integrated Customer View By Philip Watt and Peter Barnsley With consumer expectations at an all-time high,

More information

MANAGING LINEAR ASSETS Managing Linear Assets has always been a challenge; find out how customers leverage SAP to meet industry requirements.

MANAGING LINEAR ASSETS Managing Linear Assets has always been a challenge; find out how customers leverage SAP to meet industry requirements. WWW.WIPRO.COM MANAGING LINEAR ASSETS Managing Linear Assets has always been a challenge; find out how customers leverage SAP to meet industry requirements. Venkatesh Pulijala, EAM Consultant - Oil & Gas,

More information

SERVICE-BASED SALES AND CHANNEL MANAGEMENT IN TELECOM

SERVICE-BASED SALES AND CHANNEL MANAGEMENT IN TELECOM www.wipro.com SERVICE-BASED SALES AND CHANNEL MANAGEMENT IN TELECOM Sridhar Marella Padam Jain Table of Contents 3...Introduction 4... Typical Challenges in Sales & Distribution 4... Solution Capabilities

More information

DATA APPLIANCES FOR THE INSURANCE INDUSTRY

DATA APPLIANCES FOR THE INSURANCE INDUSTRY WWW.WIPRO.COM DATA APPLIANCES FOR THE INSURANCE INDUSTRY A BIG STEP FORWARD Sankar Natarajan Wipro Technologies Vasudevan Easwaran Table of contents 01 The challenges of data volumes Limitations of traditional

More information

Reimagining Quality Assurance for the Digital Enterprise

Reimagining Quality Assurance for the Digital Enterprise www.wipro.com M ER LO MER LO Reimagining Quality Assurance for the Digital Enterprise Ramesh Pai Practice Head, Digital Assurance practice Consumerization and digital adoption are leading to polarization

More information

CHANGING NATURE OF THE WEALTH MANAGEMENT INDUSTRY

CHANGING NATURE OF THE WEALTH MANAGEMENT INDUSTRY Point of View - Wipro Banking and Financial Services CHANGING NATURE OF THE WEALTH MANAGEMENT INDUSTRY Challenges and opportunities for wealth advisors www.wipro.com Author: Dr. Ashok Hegde, Global Head

More information

UNIVERSAL INVESTMENT BANKING RETRACING GROWTH PATH

UNIVERSAL INVESTMENT BANKING RETRACING GROWTH PATH Point of View - Wipro Banking Practice UNIVERSAL INVESTMENT BANKING RETRACING GROWTH PATH www.wipro.com Author : Angan Guha Head of Investment & Universal Banking Global Managing Partner for a key banking

More information

CLOUD OPERATIONS CENTER

CLOUD OPERATIONS CENTER www.wipro.com CLOUD OPERATIONS CENTER TRANSFORMING TO A SEAMLESS HYBRID CLOUD EXPERIENCE DO BUSINESS BETTER Whether you use traditional data centers, virtualized environments, on/off-prem private clouds,

More information

Empowering business intelligence through BI transformation

Empowering business intelligence through BI transformation www.wipro.com Empowering business intelligence through BI transformation Deepak Maheshwari Prinicipal Architect, Business Intelligence - Wipro Analytics Table of content 03... Introduction 04... De-bottlenecking

More information

The Intelligent Business: How Benefits-Led Business Intelligence Can Drive Value

The Intelligent Business: How Benefits-Led Business Intelligence Can Drive Value WIPRO CONSULTING SERVICES The Intelligent Business: How Benefits-Led Business Intelligence Can Drive Value www.wipro.com/consulting Also covered by The Intelligent Business: How Benefits-Led Business

More information

MOBILITY AS A SERVICE (MaaS)

MOBILITY AS A SERVICE (MaaS) www.wipro.com DEVELOP AND DEPLOY MOBILE APPLICATIONS TRANSFORMING THE WAY BUSINESSES MOBILITY AS A SERVICE (MaaS) Two of the most exciting technologies today, Mobility and Cloud, are helping enterprises

More information

Design with a Purpose: An International Bank Turns to Lean

Design with a Purpose: An International Bank Turns to Lean WIPRO CONSULTING SERVICES Design with a Purpose: An International Bank Turns to Lean www.wipro.com/consulting Design with a Purpose: An International Bank Turns to Lean By Anil Mathews & Muguntharajan

More information

www.wipro.com Software Defined Infrastructure The Next Wave of Workload Portability Vinod Eswaraprasad Principal Architect, Wipro

www.wipro.com Software Defined Infrastructure The Next Wave of Workload Portability Vinod Eswaraprasad Principal Architect, Wipro www.wipro.com Software Defined Infrastructure The Next Wave of Workload Portability Vinod Eswaraprasad Principal Architect, Wipro Table of Contents Abstract... 03 The Emerging Need... 03 SDI Impact for

More information

INTEGRATED APPROACH TO FUEL MANAGEMENT IN POWER GENERATION COMPANIES

INTEGRATED APPROACH TO FUEL MANAGEMENT IN POWER GENERATION COMPANIES WWW.WIPRO.COM INTEGRATED APPROACH TO FUEL MANAGEMENT IN POWER GENERATION COMPANIES Solution for Improved Electricity Cost Control Murty Vedula Table of contents 01 Executive Summary 02 Business Challenge

More information

Enriching In-Store Experience with Analytics

Enriching In-Store Experience with Analytics Enriching In-Store Experience with Analytics Arun Kumar, General Manager & Global Head of Retail Consulting Practice, Wipro Ltd. www.wipro.com Balakrishna Parankusam Venkata, Principal Consultant, Retail

More information

Source to Pay: Transforming Invoice Processing and Document Management

Source to Pay: Transforming Invoice Processing and Document Management WIPRO CONSULTING SERVICES Business Methods Series Source to Pay: Transforming Processing and Document Management Paulo Jose Freixa Calhau Preto Senior Manager, Finance & Accounting Transformation Practice,

More information

The embms Puzzle: Hype or Reality? Vishnu Vardhan Kandan

The embms Puzzle: Hype or Reality? Vishnu Vardhan Kandan www.wipro.com The embms Puzzle: Hype or Reality? Vishnu Vardhan Kandan Table of Contents 03...Introduction 04...Why embms? 04...Highlights of embms 05...Applications of embms 06...Conclusion 07...About

More information

www.wipro.com NFV and its Implications on Network Fault Management Abhinav Anand

www.wipro.com NFV and its Implications on Network Fault Management Abhinav Anand www.wipro.com NFV and its Implications on Network Fault Management Abhinav Anand Table of Contents Introduction... 03 Network Fault Management operations today... 03 NFV and Network Fault Management...

More information

High Performance Analytics through Data Appliances

High Performance Analytics through Data Appliances WWW.WIPRO.COM High Performance Analytics through Data Appliances Deriving more from data Sankar Natarajan Practice Lead (Netezza & Vertica Data Warehouse Appliance) at Wipro Technologies Table of contents

More information

TRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION

TRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION www.wipro.com TRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION Renaissance Delivery Experience Ecosystem Sabir Ahmad Senior Architect ... Table of Content Introduction 3 Driving Transformational

More information

WWW.WIPRO.COM UP IN THE CLOUD

WWW.WIPRO.COM UP IN THE CLOUD WWW.WIPRO.COM UP IN THE CLOUD Will the chemical industry be one of the first adopters or fast followers in transitioning to the Cloud? Read on to learn the latest Cloud technology trends in the global

More information

AUTOMATION CHECKERBOARD WHAT MOVES MY BENEFITS?

AUTOMATION CHECKERBOARD WHAT MOVES MY BENEFITS? www.wipro.com AUTOMATION CHECKERBOARD WHAT MOVES MY BENEFITS? Girish Kulkarni Global Practice Head - Test Automation, Testing Services Table of Content 03... Abstract 03... Introduction 04... Understanding

More information

OPERATIONAL BENCHMARKING DRIVING BUSINESS EFFICIENCY

OPERATIONAL BENCHMARKING DRIVING BUSINESS EFFICIENCY WWW.WIPRO.COM OPERATIONAL BENCHMARKING DRIVING BUSINESS EFFICIENCY Delivering best in class performance by targeting world class benchmarks and making processes more efficient and effective. Wipro BPO

More information

Driving health outcomes through pharmacy-based services Vijay Garg Somraj Choudhary

Driving health outcomes through pharmacy-based services Vijay Garg Somraj Choudhary www.wipro.com Driving health outcomes through pharmacy-based services Vijay Garg Somraj Choudhary Table of Contents 03... Introduction 03... Want Better Medical Adherence? Drive Quality Of Care 04... Trends

More information

OPTIMIZING INSURANCE DISTRIBUTION THROUGH A HYBRID MODEL

OPTIMIZING INSURANCE DISTRIBUTION THROUGH A HYBRID MODEL www.wipro.com OPTIMIZING INSURANCE DISTRIBUTION THROUGH A HYBRID MODEL Sasi Koyalloth Connected Enterprise Services (CES) BAS Table of Content 03... Abstract 04... Challenges of Direct and Agent-based

More information

Powering the New Supply Chain: Demand Sensing for Small and Medium-Sized Businesses

Powering the New Supply Chain: Demand Sensing for Small and Medium-Sized Businesses WIPRO CONSULTING SERVICES Powering the New Supply Chain: Demand Sensing for Small and Medium-Sized Businesses www.wipro.com/consulting Powering the New Supply Chain: Demand Sensing for Small and Medium-Sized

More information

Six Steps to Putting HR on the Path to Corporate Strategic Partner

Six Steps to Putting HR on the Path to Corporate Strategic Partner WIPRO CONSULTING SERVICES Six Steps to Putting HR on the Path to Corporate Strategic Partner www.wipro.com/consulting Six Steps to Putting HR on the Path to Corporate Strategic Partner By Robert Staeheli

More information

SAP ON-SHELF-AVAILABILITY Providing real-time alerts for out-of-shelf situations

SAP ON-SHELF-AVAILABILITY Providing real-time alerts for out-of-shelf situations www.wipro.com SAP ON-SHELF-AVAILABILITY Providing real-time alerts for out-of-shelf situations RCTG Retail DO BUSINESS BETTER THE RIGHT PRODUCT IN THE RIGHT PLACE AT THE RIGHT TIME In a customer-centric

More information

Simplify Telecom Network Migration with Repeatable Frameworks

Simplify Telecom Network Migration with Repeatable Frameworks WWW.WIPRO.COM Simplify Telecom Network Migration with Repeatable Frameworks A perfect 10 in network migrations in the Telecom world is almost a mirage, but there s a lot that you could get a grip over

More information

Future of Minerals Exploration Helping the mining industry go deeper.

Future of Minerals Exploration Helping the mining industry go deeper. Future of Minerals Exploration Helping the mining industry go deeper. WWW.WIPRO.COM David Lee, GM Strategy- Mining, Wipro Technologies Table of contents 02 Future of Minerals Exploration 03 Minerals Exploration

More information

www.wipro.com ENGINEERING & CONSTRUCTION: TECHNOLOGY PARTNER FOR TOMORROW S INFRASTRUCTURE

www.wipro.com ENGINEERING & CONSTRUCTION: TECHNOLOGY PARTNER FOR TOMORROW S INFRASTRUCTURE www.wipro.com ENGINEERING & CONSTRUCTION: TECHNOLOGY PARTNER FOR TOMORROW S INFRASTRUCTURE TECHNOLOGY PARTNER FOR TOMORROW S INFRASTRUCTURE The growth story of Engineering & Construction industry has been

More information

Enterprise Architecture for Communication Service Providers: Aligning Business Goals to IT

Enterprise Architecture for Communication Service Providers: Aligning Business Goals to IT WIPRO CONSULTING SERVICES Enterprise Architecture for Communication Service Providers: Aligning Business Goals to IT www.wipro.com/consulting Enterprise Architecture for Communication Service Providers:

More information

Revenue Enhancement and Churn Prevention

Revenue Enhancement and Churn Prevention Revenue Enhancement and Churn Prevention for Telecom Service Providers A Telecom Event Analytics Framework to Enhance Customer Experience and Identify New Revenue Streams www.wipro.com Anindito De Senior

More information

CFO: THE NEW TECHNOLOGY EVANGELIST OF THE ENTERPRISE Sriram Kannan Practice Partner - CXO Services, Wipro Analytics

CFO: THE NEW TECHNOLOGY EVANGELIST OF THE ENTERPRISE Sriram Kannan Practice Partner - CXO Services, Wipro Analytics www.wipro.com CFO: THE NEW TECHNOLOGY EVANGELIST OF THE ENTERPRISE Sriram Kannan Practice Partner - CXO Services, Wipro Analytics Table of Contents 03...Evolution of the CFO Role 03...Transforming Businesses

More information

WIPRO BOUNDARYLESS DATA CENTER SERVICES

WIPRO BOUNDARYLESS DATA CENTER SERVICES www.wipro.com WIPRO BOUNDARYLESS DATA CENTER SERVICES Redefining Possibilities to drive Rapid Business Outcomes What Customers Say? Globalization, Entering new markets Changing consumer expectations Legacy

More information

Clothing Stores with Right-fit Technology!

Clothing Stores with Right-fit Technology! www.wipro.com Clothing Stores with Right-fit Technology! Prasad Pillalamarri Consulting Partner, Wipro Paresh Saraf Senior Software Engineer, Wipro Table of Content 03... Abstract 03... Introduction 04...

More information

Table of Contents. 03...Cut the Clutter, Join the Big Data Wellness Club. 06...About the Author. 06...About Wipro Ltd.

Table of Contents. 03...Cut the Clutter, Join the Big Data Wellness Club. 06...About the Author. 06...About Wipro Ltd. www.wipro.com Cut the Clutter, Join the Big Data Wellness Club FIs, Retailers aiming to derive business value from Big Data need to ensure Srinivasagopalan data correctness, Venkataraman timeliness and

More information

www.wipro.com THE FORECAST FOR CLOUD IS SUNNY Sudeshna Bhadury

www.wipro.com THE FORECAST FOR CLOUD IS SUNNY Sudeshna Bhadury www.wipro.com THE FORECAST FOR CLOUD IS SUNNY Sudeshna Bhadury Table of Contents 03...The Forecast for Cloud is Sunny 04...Data Privacy 04...Loss of Control 04...Latency 04...Location 04...When to think

More information

Re-Shaping Retail Integration. Changing retail landscape with Social-Mobile-Analytics-Cloud. www.wipro.com

Re-Shaping Retail Integration. Changing retail landscape with Social-Mobile-Analytics-Cloud. www.wipro.com www.wipro.com Re-Shaping Retail Integration Changing retail landscape with Social-Mobile-Analytics-Cloud Gaurav Mittal Principal Consultant Wipro Ltd. Table of contents 03... Abstract 03... Retail Industry

More information

MAXIMIZE BUSINESS VALUE FROM ORACLE FUSION APPLICATIONS. Leveraging Our Next-gen Offerings in Your Emerging Business Situations

MAXIMIZE BUSINESS VALUE FROM ORACLE FUSION APPLICATIONS. Leveraging Our Next-gen Offerings in Your Emerging Business Situations www.wipro.com MAXIMIZE BUSINESS VALUE FROM ORACLE FUSION APPLICATIONS Leveraging Our Next-gen Offerings in Your Emerging Business Situations ENGINEERING A COMPLETE ORACLE SOLUTION DO BUSINESS BETTER ORACLE

More information

Driving Strategy to Execution

Driving Strategy to Execution WIPRO CONSULTING SERVICES Driving Strategy to Execution www.wipro.com/consulting Driving Strategy to Execution By Gerhard Plenert Facing financial and competitive pressures of historic proportions, operations

More information

CENTRALIZED CONTROL CENTERS FOR THE OIL & GAS INDUSTRY A detailed analysis on Business challenges and Technical adoption.

CENTRALIZED CONTROL CENTERS FOR THE OIL & GAS INDUSTRY A detailed analysis on Business challenges and Technical adoption. WWW.WIPRO.COM CENTRALIZED CONTROL CENTERS FOR THE OIL & GAS INDUSTRY A detailed analysis on Business challenges and Technical adoption. Senthilvelan Umapathi Practice Lead Table of contents 02 Executive

More information

The Top 3 Reasons Why ERP Transformations Fail And How You Can Avoid Them

The Top 3 Reasons Why ERP Transformations Fail And How You Can Avoid Them WIPRO CONSULTING SERVICES The Top 3 Reasons Why ERP Transformations Fail And How You Can Avoid Them www.wipro.com/consulting The Top 3 Reasons Why ERP Transformations Fail And How You Can Avoid Them By

More information

DIGITAL WEALTH MANAGEMENT FOR MASS-AFFLUENT INVESTORS

DIGITAL WEALTH MANAGEMENT FOR MASS-AFFLUENT INVESTORS www.wipro.com DIGITAL WEALTH MANAGEMENT FOR MASS-AFFLUENT INVESTORS Sasi Koyalloth Connected Enterprise Services Table of Contents 03... Abstract 03... The Emerging New Disruptive Digital Business Model

More information

UNLOCKING THE POTENTIAL OF PRODUCT LIFECYCLE MANAGEMENT Building Capabilities that can be Cross-Leveraged for Food Safety

UNLOCKING THE POTENTIAL OF PRODUCT LIFECYCLE MANAGEMENT Building Capabilities that can be Cross-Leveraged for Food Safety UNLOCKING THE POTENTIAL OF PRODUCT LIFECYCLE MANAGEMENT Building Capabilities that can be Cross-Leveraged for Food Safety www.wipro.com Srinivas Ramanujam Practice Head, Domain Consulting Group, Consumer

More information

THE OSS CLOUD OPPORTUNITY

THE OSS CLOUD OPPORTUNITY THE OSS CLOUD OPPORTUNITY Exploring the challenges and benefits of cloud-based operational support systems www.wipro.com Raghavendra Tadepalli Jayanta Dey Table of Contents 1. Introduction...4 2. The OSS

More information

www.wipro.com Petroleum Retailers Ready to Fuel Omni-channel for a Seamless Customer Experience Sudhansu Choudhury Senior Consultant, Wipro

www.wipro.com Petroleum Retailers Ready to Fuel Omni-channel for a Seamless Customer Experience Sudhansu Choudhury Senior Consultant, Wipro www.wipro.com Petroleum Retailers Ready to Fuel Omni-channel for a Seamless Customer Experience Sudhansu Choudhury Senior Consultant, Wipro Table of Contents 03... Petroleum Retailers: Ready to Fuel Omni

More information

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization

More information

The People Data Imperative

The People Data Imperative WIPRO CONSULTING SERVICES The People Data Imperative www.wipro.com/consulting The People Data Imperative By Spyros Stamoulis and Martin Hill You re an HR executive of a multinational corporation with thousands

More information

ENCOURAGING STORE ASSOCIATES IN AN OMNI CHANNEL WORLD MAKING INCENTIVE SCHEMES TRUE AND FAIR

ENCOURAGING STORE ASSOCIATES IN AN OMNI CHANNEL WORLD MAKING INCENTIVE SCHEMES TRUE AND FAIR WWW.WIPRO.COM ENCOURAGING STORE ASSOCIATES IN AN OMNI CHANNEL WORLD MAKING INCENTIVE SCHEMES TRUE AND FAIR Girish Kumar Global Practice Partner and Heads the Omni Channel Retail Practice Nirmal Jeyapal

More information

Going Seamless with SIAM. Why you need a platform-based approach for Service Integration and Management WWW.WIPRO.COM

Going Seamless with SIAM. Why you need a platform-based approach for Service Integration and Management WWW.WIPRO.COM WWW.WIPRO.COM Going Seamless with SIAM Why you need a platform-based approach for Service Integration and Management Ramesh Dorairaj, Principal Consultant, Application Support and Maintenance Table of

More information

Amanda, a working mom, spotted a summer skirt on the website of a top clothing brand and ordered it. When the skirt arrived it was the wrong color.

Amanda, a working mom, spotted a summer skirt on the website of a top clothing brand and ordered it. When the skirt arrived it was the wrong color. www.wipro.com DRIVING CUSTOMER INSIGHTS FOR RETAILERS IN THE DIGITAL ERA Venkataraman Ramanathan Senior Architect, Information Management, Wipro Analytics Amanda, a working mom, spotted a summer skirt

More information

Transforming Distribution Utilities

Transforming Distribution Utilities www.wipro.com Transforming Distribution Utilities Digitizing the Core Anjan Lahiri Table of Contents 02 Abstract 02 Customers Steering the Change 03 Deconstructing the Digital Character 05 Utilities at

More information

OPTIMIZATION OF QUASI FAST RETURN TECHNIQUE IN TD-SCDMA

OPTIMIZATION OF QUASI FAST RETURN TECHNIQUE IN TD-SCDMA www.wipro.com OPTIMIZATION OF QUASI FAST RETURN TECHNIQUE IN TD-SCDMA Niladri Shekhar Paria Table of Contents 03... Abstract 03... Overview of QFR Technique 05... Problem in Existing QFR Technique 05...

More information