RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information
|
|
|
- Luke Lucas
- 10 years ago
- Views:
Transcription
1 RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information Saritha Auti Practice Head - Enterprise Security Solutions, Wipro
2 Table of Contents Abstract Why is Infrastructure Critical? Guidelines to Defining a Successful Critical Infrastructure Protection (CIP) Strategy Cyber Security and Critical Infrastructure Illustration: Example of Industrial Control Systems Networks Solution for securing Industrial Control Systems Networks Cyber Security Solution Roadmap Conclusion About the Author About Wipro Ltd.
3 Abstract The recent increase in the frequency and impact of cyber-attacks have kept Critical Infrastructure companies on their toes, fearing the worst for their organizations if an attack occurs on their critical infrastructure. A recent news article published by the New York Times states that cyber attacks are on the rise against corporations in the United States, with a particular focus on Energy companies. Reports of an attack similar to the Shamoon Saudi Aramco attack are expected but the impact of such an attack in the United States would be of a magnitude much greater than Shamoon. These threats have made governments across the world wake up and take notice of Critical Infrastructure Protection as one of their highest priorities. Why is Infrastructure Critical? An infrastructure becomes critical when a disruption to this infrastructure results in irreversible and enormous loss (e.g. loss of life, environment etc.). The growing threat of international terrorism led policy makers to reconsider the definition of infrastructure in the context of specific non-functional requirements (NFR) of the business. These NFRs included Security, Performance, Availability, Integrity and Confidentiality (SPAIC). Each business has its own definition of SPAIC based on the regulatory requirements and country specific policies. Critical Infrastructure is always associated with regulatory requirements and key resources who are directly handling the critical infrastructure. As such, any intentional or unintentional disruption to these will have a significant impact on the environment and life. 03
4 The following areas are considered to be a part of Critical Infrastructure: There is an impending need for countries to develop a national critical infrastructure strategy which will provide a comprehensive and collaborative approach to enhance the Agriculture Food resiliency of critical infrastructure. This common approach will enable partners to respond collectively to risks and target resources to the most vulnerable areas of critical infrastructure. Utilities - Drinking water and sewage management system Government Defense Oil and Gas infrastructure Nuclear Power Plants and the facilities that produce, use, store, and dispose off nuclear material Energy - production, transmission, and distribution services and critical facilities Special events of national significance Healthcare - drug discovery and development, patient information Banking and Finance Process industries Transportation - including railways, highways, shipping ports and airports & civilian aircrafts Livestock, agriculture, and systems for the provision of water Communication links Public and privately owned information systems with critical business data (e.g., information about oil reserves, information within Stock Exchanges, information about nuclear programs, drug research data, privacy information, financial data etc.) Guidelines to Defining a Successful Critical Infrastructure Protection (CIP) Strategy Industry leaders suggest that the government and the private sector should collaborate to protect a nation s critical infrastructure. This collaboration calls for the development of trusted partnerships to build regulatory requirements, governance processes, and resilience options jointly based on the existing mandates and responsibilities. The strategy should outline mechanisms to: 1. Create a government owned CIP Forum to share information about potential threats and disruptions through a highly confidential government owned body. Discussions in this forum should: a. Feed into the regulatory enhancements as a continuous improvement program b. Create awareness in both urban and rural areas 2. Create guidelines to protect critical assets and information 3. Build country specific risk frameworks for each critical infrastructure with guidelines to define asset criticality 4. Build a RACI (responsibility, accountability, consulted, informed) matrix 04
5 The Strategy should: 1. Put the onus on Critical Infrastructure companies to give high priority to the protection of their critical infrastructure 2. Should be defined considering Central Governments, States, Districts, and City Corporations responsible for protecting their own critical infrastructure and for supporting owners and operators in addressing this challenge 3. Enhance the resiliency of critical infrastructure through an appropriate combination of security measures to address human induced intentional threats, business continuity practices to deal with disruptions and ensure the continuation of essential services, and emergency planning to ensure adequate response procedures are in place to deal with unforeseen disruptions to critical infrastructure Actionizing the Strategy for a Safer Future 1. Review existing Risk and Resilience processes (Sector wise) 2. Standardize it based on the new definition of critical infrastructure and assets Level 4 Level 3 Regulate and Standardize the CIP Security Risk Management 1. Create a risk committee at each governance level along with an emergency response team 2. Undertake risk assessments of sector wise critical infrastructure 3. Develop emergency programs and plans 4. Define assessment programs 5. Define vulnerability metrics and threat map Level 2 Level 1 Build Partnerships Define Critical Infrastructure and Assets 1. Develop sector networks 2. Establish the national Cross-Sector forum 3. Conduct Research and Development 4. Develop joint intiatives 1. Define guidlines to identity and categorize a critical infrastruture component 2. Define the life of each critical asset 05
6 Cyber Security and Critical Infrastructure Cyber security for critical infrastructure depends a lot on the sector to which the critical infrastructure belongs. Its objectives are: 1. Integrated security operations platform This should Broadly, cyber security can be classified into the following components for all Sectors: 1. Cyber Security Governance 2. Security Convergence Platform 3. Integrated security operations 4. Security Analytics 5. Risk and Threat Intelligence provide a single platform where logs are collected, correlated, analyzed. This platform should collect logs from both IP and non IP devices, should be intelligent to dynamically build rules to eliminate False Positives 2. Unified Security view The platform should be built on regulatory requirements, country specific rules, risk framework, criticality of assets and information. It should be based on Security Analytics framework which will score incidents, identify patterns and provide security and risk posture of the critical infrastructure at any point of time. An extension to this is predictive analysis which should help predict threat patterns and help sectors to plan mitigation 3. Resilience strategy It is the quickness with which the critical infrastructure can bounce back after disruption. This should primarily be the Disaster Recovery and Business Continuity Plan for Critical Infrastructure. This is more of a policy and process which should be reviewed at pre-defined schedules for readiness Illustration: Example of Industrial Control Systems Networks Cyber security is becoming important for critical infrastructure due to the latest technology implementations like IP communications, BYOD policies etc. Similar to IT Infrastructure, Critical Infrastructure has its share of vulnerabilities that can t be addressed due to the proprietary nature of the OS and hardware. These devices are not regularly patched as the hardware patch release cycle is adhoc or longer than software patches. This being the problem statement, the critical infrastructure component becomes vulnerable to malwares, advanced persistent threats and service disruption. In general, ICS networks lack features like monitoring, metrics, analytics and intelligence to predict threats. The solution should be capable of handling known problems and zero day vulnerabilities. 06
7 Solution for securing Industrial Control Systems Networks Industrial User 1 Industrial User 2 Business User Enterprise User Access Control Gateway Privilege User Management Identity Governance Secure Link- Authenticated Users Basic authentication and authorization Enterprise Portal User 1 User 2 Access Control Gateway - Request Router and Personalization Industrial Network Historian Servers Controllers, Data Awareness HMI Alert management & situational awareness Event Logger from Smart Meter Networks Security Operations - Log aggregation, Event Correlation for both Industrial Networks and Corporte Networks Event Logger from IT Networks Security Analytics, Risk Framework, Risk and threat Intelligence Alert mangement & Situational Awareness Event Logger from Smart Meter Network Headend Headend Logger Unidirectional Firewalls Corporate Networks Concentrator Concentrator Meter The solution platform should address the issues mapping the solution-to-sector specific value chain, applying global regulatory requirements and defining points of vulnerability to address known and unknown threat vectors. 07
8 Cyber Security Solution Roadmap Cyber security for critical infrastructure should be broadly developed as per the roadmap shown in the illustration below Integrated Security Solutions for Each Sector Spanning Business Processes and Architecture Predictive Analysis, Pattern Analysis, Risk & Threat Inteligence Security Convergence Maturity Security Convergence Hygene Creating a Platform for Security Analytics End-to-End Corelation across the Infrastructure Core Security services IT Security Securing Business Enabling Application and IT Infrastructure Securing Business Processes and related IT Infrastructure The level of maturity of a Cyber Security solution for CIP needs to progress through the stages shown in the illustration, gradually making the transformation from Core Integrated Security Solutions which involve predictive analytics and intelligence spanning business processes and architecture. Security Services to Security Convergence and finally to 08
9 Conclusion The implications of a Critical Infrastructure collapse are huge and need to be looked at from a long-term perspective. Close synergies between the government and the private sector need to be present to develop a comprehensive and robust strategy for thwarting off impending threats from politically motivated groups, cyber criminals and other such rogues. Steps should be taken to ensure CIP across all layers of CI Architecture, with components addressing business and operational processes, applications, data, communication, network and perimeter for IT and Operations Technology Network. 09
10 About the Author Saritha Auti, Practice Head - Enterprise Security Solutions, Wipro Saritha has over 17 years of experience in Enterprise Security & Architecture, spanning a wide gamut across product development, application security, systems integration, Enterprise Architecture and security architecture consulting. She heads Enterprise Security Architecture and Industrial Security Practice for Wipro with specific focus on Critical Infrastructure Security. She has devised several security solutions and architecture strategy for Oil & Gas, Telecom, Financial Sectors, Utilities, Defense, and has lead Security Architecture transformation programs. Apart from technology she is an ardent trekker, culture enthusiast and loves connecting with people. To know more, contact: [email protected] About Wipro Ltd. Wipro Ltd. (NYSE:WIT) is a leading Information Technology, Consulting and Outsourcing company that delivers solutions to enable its clients do business better. Wipro delivers winning business outcomes through its deep industry experience and a 360 degree view of "Business through Technology" - helping clients create successful and adaptive businesses. A company recognized globally for its comprehensive portfolio of services, a practitioner's approach to delivering innovation and an organization wide commitment to sustainability, Wipro has a workforce of 140,000 serving clients across 61 countries. For more information, please visit 10
11 DO BUSINESS BETTER NYSE:WIT OVER 140,000 EMPLOYEES 61 COUNTRIES CONSULTING SYSTEM INTEGRATION OUTSOURCING WIPRO TECHNOLOGIES, DODDAKANNELLI, SARJAPUR ROAD, BANGALORE , INDIA. TEL : +91 (80) , FAX : +91 (80) , [email protected] North America South America United Kingdom Germany France Switzerland Poland Austria Sweden Finland Benelux Portugal Romania Japan Philippines Singapore Malaysia Australia China South Korea New Zealand WIPRO LTD No part of this booklet may be reproduced in any form by any electronic or mechanical means (including photocopying, recording and printing) without permission in writing from the publisher, except for reading and browsing via the world wide web. Users are not permitted to mount this booklet on any network server. IND/BRD/MAR 2014-MAY2015
CENTRALIZED CONTROL CENTERS FOR THE OIL & GAS INDUSTRY A detailed analysis on Business challenges and Technical adoption.
WWW.WIPRO.COM CENTRALIZED CONTROL CENTERS FOR THE OIL & GAS INDUSTRY A detailed analysis on Business challenges and Technical adoption. Senthilvelan Umapathi Practice Lead Table of contents 02 Executive
EMPOWER YOUR ORGANIZATION - DRIVING WORKFORCE ANALYTICS
WWW.WIPRO.COM EMPOWER YOUR ORGANIZATION - DRIVING WORKFORCE ANALYTICS Using tactical workforce intelligence to optimize talent and set the cornerstone to manage workforce competency risks. Suvrat Mathur,
www.wipro.com Software Defined Infrastructure The Next Wave of Workload Portability Vinod Eswaraprasad Principal Architect, Wipro
www.wipro.com Software Defined Infrastructure The Next Wave of Workload Portability Vinod Eswaraprasad Principal Architect, Wipro Table of Contents Abstract... 03 The Emerging Need... 03 SDI Impact for
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
High Performance Analytics through Data Appliances
WWW.WIPRO.COM High Performance Analytics through Data Appliances Deriving more from data Sankar Natarajan Practice Lead (Netezza & Vertica Data Warehouse Appliance) at Wipro Technologies Table of contents
SMART FACTORY IN THE AGE OF BIG DATA AND IoT
WWW.WIPRO.COM SMART FACTORY IN THE AGE OF BIG DATA AND IoT THE SHAPE OF THINGS TO COME Narendra Ghate Senior Manager at Wipro Analytics Table of contents 01 Industrial Revolution 4.0 is here. Where are
WWW.WIPRO.COM UP IN THE CLOUD
WWW.WIPRO.COM UP IN THE CLOUD Will the chemical industry be one of the first adopters or fast followers in transitioning to the Cloud? Read on to learn the latest Cloud technology trends in the global
WWW.WIPRO.COM CRITICAL SUCCESS FACTORS FOR A SUCCESSFUL TEST ENVIRONMENT MANAGEMENT
WWW.WIPRO.COM CRITICAL SUCCESS FACTORS FOR A SUCCESSFUL TEST ENVIRONMENT MANAGEMENT Table of contents 01 Abstract 02 Key factors for a successful test environment management 05 Conclusion 05 About the
Re-Shaping Retail Integration. Changing retail landscape with Social-Mobile-Analytics-Cloud. www.wipro.com
www.wipro.com Re-Shaping Retail Integration Changing retail landscape with Social-Mobile-Analytics-Cloud Gaurav Mittal Principal Consultant Wipro Ltd. Table of contents 03... Abstract 03... Retail Industry
PREDICTIVE INSIGHT ON BATCH ANALYTICS A NEW APPROACH
WWW.WIPRO.COM PREDICTIVE INSIGHT ON BATCH ANALYTICS A NEW APPROACH Floya Muhury Ghosh Table of contents 01 Abstract 01 Industry Landscape 02 Current OM Tools Limitations 02 Current OM Tools Potential Improvements
Evaluating Managed File Transfer Solutions
Evaluating Managed File Transfer Solutions Right evaluation is essential to make the right choice of a Managed File Transfer solution www.wipro.com Manish Dhama B2B Integration Practice, Wipro Technologies
DIGITAL WEALTH MANAGEMENT FOR MASS-AFFLUENT INVESTORS
www.wipro.com DIGITAL WEALTH MANAGEMENT FOR MASS-AFFLUENT INVESTORS Sasi Koyalloth Connected Enterprise Services Table of Contents 03... Abstract 03... The Emerging New Disruptive Digital Business Model
MANAGING LINEAR ASSETS Managing Linear Assets has always been a challenge; find out how customers leverage SAP to meet industry requirements.
WWW.WIPRO.COM MANAGING LINEAR ASSETS Managing Linear Assets has always been a challenge; find out how customers leverage SAP to meet industry requirements. Venkatesh Pulijala, EAM Consultant - Oil & Gas,
www.wipro.com NFV and its Implications on Network Fault Management Abhinav Anand
www.wipro.com NFV and its Implications on Network Fault Management Abhinav Anand Table of Contents Introduction... 03 Network Fault Management operations today... 03 NFV and Network Fault Management...
Powering the New Supply Chain: Demand Sensing for Small and Medium-Sized Businesses
WIPRO CONSULTING SERVICES Powering the New Supply Chain: Demand Sensing for Small and Medium-Sized Businesses www.wipro.com/consulting Powering the New Supply Chain: Demand Sensing for Small and Medium-Sized
TRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION
www.wipro.com TRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION Renaissance Delivery Experience Ecosystem Sabir Ahmad Senior Architect ... Table of Content Introduction 3 Driving Transformational
www.wipro.com THE FORECAST FOR CLOUD IS SUNNY Sudeshna Bhadury
www.wipro.com THE FORECAST FOR CLOUD IS SUNNY Sudeshna Bhadury Table of Contents 03...The Forecast for Cloud is Sunny 04...Data Privacy 04...Loss of Control 04...Latency 04...Location 04...When to think
MOBILITY AS A SERVICE (MaaS)
www.wipro.com DEVELOP AND DEPLOY MOBILE APPLICATIONS TRANSFORMING THE WAY BUSINESSES MOBILITY AS A SERVICE (MaaS) Two of the most exciting technologies today, Mobility and Cloud, are helping enterprises
Future of Minerals Exploration Helping the mining industry go deeper.
Future of Minerals Exploration Helping the mining industry go deeper. WWW.WIPRO.COM David Lee, GM Strategy- Mining, Wipro Technologies Table of contents 02 Future of Minerals Exploration 03 Minerals Exploration
Enriching In-Store Experience with Analytics
Enriching In-Store Experience with Analytics Arun Kumar, General Manager & Global Head of Retail Consulting Practice, Wipro Ltd. www.wipro.com Balakrishna Parankusam Venkata, Principal Consultant, Retail
Going Seamless with SIAM. Why you need a platform-based approach for Service Integration and Management WWW.WIPRO.COM
WWW.WIPRO.COM Going Seamless with SIAM Why you need a platform-based approach for Service Integration and Management Ramesh Dorairaj, Principal Consultant, Application Support and Maintenance Table of
Analytics in an Omni Channel World. Arun Kumar, General Manager & Global Head of Retail Consulting Practice, Wipro Ltd.
Analytics in an Omni Channel World www.wipro.com Arun Kumar, General Manager & Global Head of Retail Consulting Practice, Wipro Ltd. Table of Contents 03...Extending the Single View of Consumer 04...Extending
Telecom Analytics: Powering Decision Makers with Real-Time Insights
Telecom Analytics: Powering Decision Makers with Real-Time Insights www.wipro.com Anindito De, Practice Manager - Industry Solutions, CXO Services, Advanced Technologies & Solutions Subhas Mondal, Head
IDENTITY & ACCESS MANAGEMENT IN THE CLOUD
IDENTITY & ACCESS MANAGEMENT IN THE CLOUD www.wipro.com Niraj Kumar Shukla Table of Contents 3... 1. Introduction 3... 2. IAM Approach 4... 2.1. Phase I - Plan 4...2.1.1. Understanding the Environment
INTERNET OF THINGS Delight. Optimize. Revolutionize.
WWW.WIPRO.COM INTERNET OF THINGS Delight. Optimize. Revolutionize. DO BUSINESS BETTER HOW IS YOUR BUSINESS ALIGNED TO CAPITALIZE ON THE FASCINATING OPPORTUNITIES OF THE FUTURE? ARE YOU LOOKING AT DOING
WIPRO S MEDICAL DEVICES FRAMEWORK
WIPRO S MEDICAL DEVICES FRAMEWORK JUMP-START AND ACCELERATE YOUR CRM TRANSFORMATION DO BUSINESS BETTER INDUSTRY LANDSCAPE The medical technology industry is trending towards commoditization of products
www.wipro.com NATURAL RESOURCES: Mining the way ahead
www.wipro.com NATURAL RESOURCES: Mining the way ahead MINING THE WAY AHEAD For a long period, the operating model of mining industry has been stagnant due to no compelling reason to evolve. But now, due
How To Manage A Supply Chain
www.wipro.com SERVICE-BASED SALES AND CHANNEL MANAGEMENT IN TELECOM Sridhar Marella Padam Jain Table of Contents 3...Introduction 4... Typical Challenges in Sales & Distribution 4... Solution Capabilities
BENCHMARKING THE ENTERPRISE S B2B INTEGRATION MATURITY
www.wipro.com BENCHMARKING THE ENTERPRISE S B2B INTEGRATION MATURITY Presanna Venkadesh Sundararajan Senior Architect in Wipro Technologies Table of contents 03...Background 03...Why do we have to measure
OPERATIONAL BENCHMARKING DRIVING BUSINESS EFFICIENCY
WWW.WIPRO.COM OPERATIONAL BENCHMARKING DRIVING BUSINESS EFFICIENCY Delivering best in class performance by targeting world class benchmarks and making processes more efficient and effective. Wipro BPO
DIGITAL INTEGRATED PLATFORM: BRINGING RESILIENCE TO CONSTRUCTION ENTERPRISE
www.wipro.com DIGITAL INTEGRATED PLATFORM: BRINGING RESILIENCE TO CONSTRUCTION ENTERPRISE DO BUSINESS BETTER THE NEED FOR CHANGE - WHY DIGITAL INTEGRATED PLATFORM? Few industries are as high risk and fragmented
CONNECTED HEALTHCARE. Multiple Devices. One Interface. www.wipro.com
www.wipro.com CONNECTED HEALTHCARE Multiple Devices. One Interface. Anirudha Gokhale Senior Architect, Product Engineering Services division at Wipro Technologies Table of Contents Abstract... 03 The Not-So-Connected
www.wipro.com Application of Big Data Solution to Mining Analytics Sandipan Chakraborti Senior Architect ENU
www.wipro.com Application of Big Data Solution to Mining Analytics Sandipan Chakraborti Senior Architect ENU Table of Content 03... Introduction 03... Big Data & Analytics Across Mining Functions 05...
ENCOURAGING STORE ASSOCIATES IN AN OMNI CHANNEL WORLD MAKING INCENTIVE SCHEMES TRUE AND FAIR
WWW.WIPRO.COM ENCOURAGING STORE ASSOCIATES IN AN OMNI CHANNEL WORLD MAKING INCENTIVE SCHEMES TRUE AND FAIR Girish Kumar Global Practice Partner and Heads the Omni Channel Retail Practice Nirmal Jeyapal
An Integrated Validation Approach to SDN & NFV
www.wipro.com An Integrated Validation Approach to SDN & NFV Key challenges, implementation strategies and the road ahead. Jayaprakash Hariharan Mohan Kumar Table of Contents 03...Abstract 04...Introduction
RIGHT INTEGRATION STRATEGY - A CORNERSTONE FOR OMNI-CHANNEL RETAIL
WWW.WIPRO.COM RIGHT INTEGRATION STRATEGY - A CORNERSTONE FOR OMNI-CHANNEL RETAIL Gaurav Sai Mittal Table of Contents 03 Introduction 04 Creating an Omni-Channel Experience Functional Building Blocks 05
Revenue Enhancement and Churn Prevention
Revenue Enhancement and Churn Prevention for Telecom Service Providers A Telecom Event Analytics Framework to Enhance Customer Experience and Identify New Revenue Streams www.wipro.com Anindito De Senior
www.wipro.com mhealth SOLUTIONS EMPOWER MASSES WITH AFFORDABILITY, ACCESSIBILITY AND QUALITY HEALTHCARE Santhosh Kumar Madathil Aparna Kumpatla
www.wipro.com mhealth SOLUTIONS EMPOWER MASSES WITH AFFORDABILITY, ACCESSIBILITY AND QUALITY HEALTHCARE Santhosh Kumar Madathil Aparna Kumpatla Table of Contents 03... Abstract 03... Overview of Health
Averting Chaos with Dual Supply Chain Management Strategy
WIPRO CONSULTING SERVICES Averting Chaos with Dual Supply Chain Management Strategy www.wipro.com/services/consulting/ Averting Chaos with Dual Supply Chain Management Strategy By Ramanan Sambukumar, Vinay
www.wipro.com Managing Skills Challenge in an Open Source World Prajod Vettiyattil Software Architect Wipro Limited
www.wipro.com Managing Skills Challenge in an Open Source World Prajod Vettiyattil Software Architect Wipro Limited Table of Contents 03... The Rise of Open Source 04... The Talent Crunch 06... Insights
BETTER DESIGNED BUSINESS PROCESSES
BETTER DESIGNED BUSINESS PROCESSES Select The Right Process Modeling Tool Base))) Nithya Ramkumar Vice President, Base))), Wipro Business Process Services Table of Contents 03 The Right Modeling Tool To
OPTIMIZING INSURANCE DISTRIBUTION THROUGH A HYBRID MODEL
www.wipro.com OPTIMIZING INSURANCE DISTRIBUTION THROUGH A HYBRID MODEL Sasi Koyalloth Connected Enterprise Services (CES) BAS Table of Content 03... Abstract 04... Challenges of Direct and Agent-based
Transforming Distribution Utilities
www.wipro.com Transforming Distribution Utilities Digitizing the Core Anjan Lahiri Table of Contents 02 Abstract 02 Customers Steering the Change 03 Deconstructing the Digital Character 05 Utilities at
www.wipro.com Big Data Analytics Driving Revenue Growth in Retail Banking Sandeep Bhagat, Practice Head, Big Data Analytics, Wipro Analytics
www.wipro.com Big Data Analytics Driving Revenue Growth in Retail Banking Sandeep Bhagat, Practice Head, Big Data Analytics, Wipro Analytics Banking on Big Data Nicolas i has a vision of running a nouveau
www.wipro.com Manage Your Leads Well to Boost Sales Volumes Anupam Bhattacharjee Shine Gangadharan
www.wipro.com Manage Your Leads Well to Boost Sales Volumes Anupam Bhattacharjee Shine Gangadharan Table of Content 03... Introduction 04... The Great Transition 05... The way Forward 06... About the Authors
Standardize & Manage Test Environments
www.wipro.com Standardize & Manage Test Environments Ensure Higher Test Coverage and De-Risk Testing from Test Environmental Bottlenecks Testing Services Wipro Technologies Table of Contents 03 Need for
The Wipro NxtGen MEMS Advantage. Wipro NxtGen MEMS
State Health and Human Services Agencies have a lot to juggle, with evolving demands and rapid technological changes such as: need to modernize the legacy MMIS mandates from CMS to meet the MITA 3.0 framework
WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com
WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com Table of Contents 03...Introduction 04...Wipro Cloud (WIC) as a Service Type 05...Wipro Cloud Capabilities
HR - A STRATEGIC PARTNER Evolution in the adoption of Human Capital Management systems
www.wipro.com HR - A STRATEGIC PARTNER Evolution in the adoption of Human Capital Management systems FUTURE READY SYSTEM FOR AN INSPIRED WORKFORCE Anand Gupta, Director, Oracle Cloud Services, Wipro Table
www.wipro.com Petroleum Retailers Ready to Fuel Omni-channel for a Seamless Customer Experience Sudhansu Choudhury Senior Consultant, Wipro
www.wipro.com Petroleum Retailers Ready to Fuel Omni-channel for a Seamless Customer Experience Sudhansu Choudhury Senior Consultant, Wipro Table of Contents 03... Petroleum Retailers: Ready to Fuel Omni
www.wipro.com Data Quality Obligation by Character but Compulsion for Existence Sukant Paikray
www.wipro.com Data Quality Obligation by Character but Compulsion for Existence Sukant Paikray Table of Contents 02 Introduction 03 Quality Quandary 04 Major Industry Initiatives 05 Conclusion 06 06 About
MULTI-TENANT UTILITIES: THE FUTURE OF SECURITIES PROCESSING
www.wipro.com MULTI-TENANT UTILITIES: THE FUTURE OF SECURITIES PROCESSING Venkata Ramakrishna Senior Consultant, Solution Design Group Kanishka Dasgupta Domain Consultant, Industry Advisory Group Table
WIPRO S ENTERPRISE UNIFIED COMMUNICATION AND CONTACT CENTER MANAGED SERVICES
WWW.WIPRO.COM WIPRO S ENTERPRISE UNIFIED COMMUNICATION AND CONTACT CENTER MANAGED SERVICES End-to-End Infrastructure Services DO BUSINESS BETTER INDUSTRY TRENDS Enterprise Unified Communications (UC) and
OPTIMIZATION OF QUASI FAST RETURN TECHNIQUE IN TD-SCDMA
www.wipro.com OPTIMIZATION OF QUASI FAST RETURN TECHNIQUE IN TD-SCDMA Niladri Shekhar Paria Table of Contents 03... Abstract 03... Overview of QFR Technique 05... Problem in Existing QFR Technique 05...
Mobile Application Management. www.wipro.com. Anand Kale Mobility Solutions Head- Banking & Financial Services, Wipro Mobility Solutions
Mobile Application Management www.wipro.com Anand Kale Mobility Solutions Head- Banking & Financial Services, Wipro Mobility Solutions Table of contents 03... Mobile Application Management (MAM): Reduce
Amanda, a working mom, spotted a summer skirt on the website of a top clothing brand and ordered it. When the skirt arrived it was the wrong color.
www.wipro.com DRIVING CUSTOMER INSIGHTS FOR RETAILERS IN THE DIGITAL ERA Venkataraman Ramanathan Senior Architect, Information Management, Wipro Analytics Amanda, a working mom, spotted a summer skirt
The New Developments in Telecom. Threat or Opportunity? Venkataraman Mahadevan General Manager Wipro BPO, Global Media and Telecom. www.wipro.
The New Developments in Telecom Threat or Opportunity? www.wipro.com Venkataraman Mahadevan General Manager Wipro BPO, Global Media and Telecom Table of contents 03.. Threat or opportunity? 04.. Leveraging
www.wipro.com Community Analytics Catalyzing Customer Engagement Srinath Sridhar Wipro Analytics
www.wipro.com Community Analytics Catalyzing Customer Engagement Srinath Sridhar Wipro Analytics Table of Contents 03... Introduction 03... Communities: A Catalyst for Business Growth 05... Cost of Neglecting
www.wipro.com ACCOMMODATING IOT / M2M REQUIREMENTS IN THE CELLULAR ECOSYSTEM Mahendra Agarwal Architect, Wipro Tecnologies
www.wipro.com ACCOMMODATING IOT / M2M REQUIREMENTS IN THE CELLULAR ECOSYSTEM Mahendra Agarwal Architect, Wipro Tecnologies Table of Contents Abstract... 03 What s new in Cellular Technology?... 03 Device
Real-Time Data Access Using Restful Framework for Multi-Platform Data Warehouse Environment
www.wipro.com Real-Time Data Access Using Restful Framework for Multi-Platform Data Warehouse Environment Pon Prabakaran Shanmugam, Principal Consultant, Wipro Analytics practice Table of Contents 03...Abstract
SDN/NFV TRANSFORMATION FOR SERVICE PROVIDER NETWORK
www.wipro.com SDN/NFV TRANSFORMATION FOR SERVICE PROVIDER NETWORK Subhas Chandra Mondal Ravi Kumar Emani Rahul Mann Table of Contents 1 Abstract... 3 2 Evaluation of use cases... 3 2.1 vcpe (virtual Consumer
The Global Supply Chain Goes Collaborative
WIPRO CONSULTING SERVICES The Global Supply Chain Goes Collaborative www.wipro.com/consulting The Global Supply Chain Goes Collaborative By Sebastian Ennulat In today s era of high customer expectations,
KNOW THE UNKNOWN WITH SECURITY ANALYTICS
KNOW THE UNKNOWN WITH SECURITY ANALYTICS Understanding the Security Analytics and Intelligence (SAI) Framework for Intelligent Data Analysis & Actionable Insights www.wipro.com Bharat Shetty, Shailesh
PRODUCTION SURVEILLANCE DASHBOARDS IN UPSTREAM INDUSTRY
WWW.WIPRO.COM PRODUCTION SURVEILLANCE DASHBOARDS IN UPSTREAM INDUSTRY Making Them Work Hemant Kumar Table of contents 01 Executive Summary 02 Introduction to Integrated Production Surveillance Dashboards:
Risks in Middleware Migration- Demystifying the Journey
Risks in Middleware Migration- Demystifying the Journey www.wipro.com Sankara Subramanian Palanisamy Middleware Migration Solutions, Enterprise Business Integration Table of contents 03... Risks in Middleware
KEEPING ENERGY M&As ON TRACK WITH EARLY IT ENGAGEMENT
www.wipro.com KEEPING ENERGY M&As ON TRACK WITH EARLY IT ENGAGEMENT Ramakrishna Avasarala Consultant, SAP- O&G COE Table of Contents 03 Abstract 03 Introduction: Role of IT in M&As 04 06 Key focus areas
www.wipro.com Addressing Need-Based Consumerism for Cloud Services Robert Bates SMAC Architecture Group Head, Advanced Technologies & Solutions
www.wipro.com Addressing Need-Based Consumerism for Cloud Services Robert Bates SMAC Architecture Group Head, Advanced Technologies & Solutions Table of contents 03... Abstract 03... Introduction 04...
Enterprise Architecture for Communication Service Providers: Aligning Business Goals to IT
WIPRO CONSULTING SERVICES Enterprise Architecture for Communication Service Providers: Aligning Business Goals to IT www.wipro.com/consulting Enterprise Architecture for Communication Service Providers:
COMBATING CYBER THREATS: A HOW TO FOR THE CISO.
www.wipro.com COMBATING CYBER THREATS: A HOW TO FOR THE CISO. Gopinathan. K, Practice Head - Managed Security and Network Services, Global Infrastructure Services (GIS), Wipro Infotech Contents 02 -------------------------------------
Agile Change: The Key to Successful Cloud/SaaS Deployment
WIPRO CONSULTING SERVICES Agile Change: The Key to Successful Cloud/SaaS Deployment www.wipro.com/consulting Agile Change: The Key to Successful Cloud/SaaS Deployment By Robert Staeheli and Gregor Marshall
VIRGINIE O'SHEA Senior Analyst, Securities and Investments, Aite Group
www.wipro.com IN CONVERSATION WITH VIRGINIE O'SHEA Senior Analyst, Securities and Investments, Aite Group Budget constraints had pushed data management to the backburner, but financial institutions are
SaaS Maturity Evolution for Transforming ISVs business
SaaS Maturity Evolution for Transforming ISVs business www.wipro.com www.wipro.com Hemanth Kumar A. (Solution Architect) Rajesh Gupta Hemanth Kumar Amitoj Singh Amitoj Practice Singh Head (Product Solution
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Freight aggregation in order fulfilment lifecycle to achieve better freight planning
Freight aggregation in order fulfilment lifecycle to achieve better freight planning www.wipro.com Agathian Sannasi Email: [email protected] Table of contents 1. ABSTRACT...02 2. THE SALES ORDER
The Mobile Enterprise: Employee Self Service. Deepali Majumder, Senior Consultant, Wipro Mobility Solutions
The Mobile Enterprise: Employee Self Service Deepali Majumder, Senior Consultant, Wipro Mobility Solutions Table of contents 03... Technology is shaping demand 03... The Mobile Employee 04... Why is a
Software vendors evolution in the new industry paradigm
Software vendors evolution in the new industry paradigm Future of independent software vendors www.wipro.com Rajesh Gupta Rajesh Gupta Practice head- ISV vertical Practice head- ISV vertical Manufacturing
APPLICATION REPLATFORMING : MIGRATION AND MODERNIZATION
WWW.WIPRO.COM APPLICATION REPLATFORMING : MIGRATION AND MODERNIZATION DO BUSINESS BETTER Wipro's Application Replatforming Services help transform legacy applications, add value and decrease risks. These
