Download ppt - Replete Corporate Profile

Transcript
Page 1: Replete Corporate Profile

INFORMATIONTECHNOLOGY

Replete Corporate Profile

Page 2: Replete Corporate Profile

INFORMATIONTECHNOLOGY

About Us

As an independent group of companies, professionals of Replete provide

integrated IT solutions and creative consulting to its clients through

innovative solutions.

simplifying eIT These two words represent our philosophy and the secret to our success. This

strategy has served our clients well for more than 2 years. With expertise in a

wide range of industries, Replete consultants provide the experience and

specialization to create intelligent solutions with quantifiable added-value to

its clients. Our solutions respond to client needs now and help them remain

competitive and profitable in the future.

Replete is fastest IT consulting and systems-integration company in India.

INFORMATION SECURITY

VEHICEL / ASSET TRACKING

IT PROJECT MANAGEMENT

IT OUTSOURCING

SYSTEM SERVICES

DATACENTER

MIGRATION

HRMS

NETWORKS

IT LEASING

Page 3: Replete Corporate Profile

INFORMATIONTECHNOLOGY

SYSTEM SERVICES

IT INFRASTRUCTURE

Efficient IT infrastructures are crucial to the smooth running of corporate business processes. We provide objective, comprehensive advice on how to achieve optimum alignment of your systems and applications. Solutions are based on our best-practice procedure model and represent the most suitable solution for your specific requirements – no matter whether this be the development of a new infrastructure or the re-centralization and/or standardization of an existing one.

We can also support you in areas where large manufacturers are unable to provide standard solutions. To do this we work together with selected partners who offer proven detailed solutions for individual application landscapes. In addition to our large partners Citrix, Microsoft this also includes Thin Print. The result is intelligent solutions guaranteeing the efficient use and security of your IT infrastructure.

Page 4: Replete Corporate Profile

INFORMATIONTECHNOLOGY

SYSTEM SERVICES

VIRTUALIZATION

Virtual networks, services, servers or desktops means that IT resources can be better utilized; quality improved and systems administration simplified. We advise on the options for virtualization within your company – for more efficiency, increased flexibility and dependability of your IT.

Page 5: Replete Corporate Profile

INFORMATIONTECHNOLOGY

SYSTEM SERVICES

PRINT MANAGMENT

A professional print management system is an ideal addition to any IT environment. It not only increases the performance of printing applications and thus also user satisfaction, but also results in cost savings and less work for your IT department. As a Thin print partner we can work together with you to find the optimum solution for your system..One solution for all devices: The cloud printing solution can be used on a cross-platform basis with iPad, iPhone, iPod touch, BlackBerry, Android and Symbian devices. Once registered, a user can use the cloud directory and Cortado functions with all devices. Support for Java and other platforms will follow.Use any printer: Printers that are specifically recommended for cloud printing can be recognized by the ‘Cloud Printing Ready’ logo. However, virtually any printer can be used for mobile printing with Cortado Workplace. Several thousand printers from over 90 manufacturers are already supported. Close cooperation with leading manufacturers and feedback from over 100,000 customers ensures that the number of supported printers and new devices is constantly increasing and that new printers can be used directly from their launch.

Page 6: Replete Corporate Profile

INFORMATIONTECHNOLOGY

SYSTEM SERVICES

PRINT MANAGMENT

Direct printing without turning on a PC: Printing takes place directly on a printer connected to the mobile device. This can be either a printer within the same Wi-Fi network as the device is currently located or via Bluetooth printer or to a network printer in the organization.

Supports all major file types: Whether Excel spreadsheets, PDF contracts, PowerPoint presentations, HTML messages or pictures in different formats – Cortado’s cloud printing solution prints all mainstream file types. The relevant file app does not need to be installed on your mobile device to print.

Your complete mobile workplace: The Cortado solution is not limited to printing. Additional features like free online storage, document access, fax, PDF creation and more transform your mobile device into a complete mobile workstation.

Available as a private cloud solution: With Cortado Corporate Server, the enterprise solution, all Cortado services are available for your protected corporate network. In addition to full cloud printing support, smartphone and tablet users enjoy access to the corporate drives and the solution provides all the classic desktop functions required.

Page 7: Replete Corporate Profile

INFORMATIONTECHNOLOGY

SYSTEM SERVICES

PRINT MANAGMENT

Cancer CouncilIndustry: Non-profit organizationCegid GroupIndustry: Information Technology / Cloud-based service providerHelsingborgIndustry: Local GovernmentIT works!Industry: Cloud-based service providerMGI ConsultantsIndustry: Cloud-based service providerRyanairIndustry: Airline IndustrySDV Asia PacificIndustry: Logistics

SKOK ArkaIndustry: Financial ServicesSKOK KujawiakIndustry: Financial ServicesSKOK WesolaIndustry: Financial ServicesSpidergroupIndustry: Cloud-based service providerS&U SoftwareIndustry: Software SupplierSwing GmbHIndustry: Cloud-based service provider (nursing)

CUSTOMERS USING

Page 8: Replete Corporate Profile

INFORMATIONTECHNOLOGY

SYSTEM SERVICESAPPLICATION AND DEVICE CONTROL

The execution of numerous applications as well as connections to external equipment and drives can have a negative effect on the performance and stability of systems. We offer you solutions allowing you to control both effectively – for the smooth operation of your system.

Protect your business from data loss

Maintain control over your confidential data

Enable productivity while ensuring data protection

Centralize and simplify your security management

Prove compliance with less effort

Page 9: Replete Corporate Profile

INFORMATIONTECHNOLOGY

SYSTEM SERVICES

WINDOWS MANAGMENT

The administration of complex Microsoft infrastructures is often a challenge for companies. We can present you with various management and migration solutions to help you simplify, automate and secure your systems as well as to facilitate uniform application and system management.

Migrations & Consolidations Prepare, migrate, coexist & manage

Compliance & IT Governance Assess, audit, alert & remediate

Recovery & Availability Availability, disaster recovery & email discovery

Administration & Automation Prevent, document & control change

Development & Customization Customize SharePoint & create PowerShell scripts

Page 10: Replete Corporate Profile

INFORMATIONTECHNOLOGY

SYSTEM SERVICESEXCHANGE AND SHREPOINT MANAGEMENT

Complex platforms such as Exchange and Share-Point combine collaboration tools with, among other things, business intelligence, form servers and Enterprise search. These fast growing systems bring a number of risks with them. We can show you how to minimize risks and organize management more efficiently using the appropriate tools.

Transform your SharePoint into the business-critical platform your company needs while controlling the chaos. Rajput Technologies offers unrivalled solutions for migration, customization and management.Our solutions enable you to reduce the risk, time, cost and complexity associated with all of your SharePoint-related tasks. We can help transform your SharePoint. Migrations – Reduce the risks as well as minimize the time and

effort required to execute SharePoint 2010 and SharePoint 2013 on-premises and online migrations, consolidations and restructurings.

Customizations – Increase SharePoint’s usability and adoption, meet business demands and streamline development by enabling rapid SharePoint customizations without requiring custom code.

Management – Simplify SharePoint management tasks while encouraging user adoption and ensuring SharePoint governance.

Page 11: Replete Corporate Profile

INFORMATIONTECHNOLOGY

SYSTEM SERVICES

LICENSE MANAGMENT

The client-based licensing models of widely used software solutions often represent a conflict with the user-based models of terminal server environments. This results in cost-intensive licensing. Our team helps targeted steering of software use, thus significantly reducing license costs.

SAM Managed Services End-to-end management of the SAM project with no internal overheads to worry about

License Management ServicesLet us help you with the complexities of license management

SCCM Configuration Ensuring SCCM is set-up to deliver the data you need to manage software effectively

Page 12: Replete Corporate Profile

INFORMATIONTECHNOLOGY

DATACENTER

CLOUD

PUBLIC CLOUD

Hybrid Cloud

Public Cloud

Managed Hosting

Private Cloud

Page 13: Replete Corporate Profile

INFORMATIONTECHNOLOGY

DATACENTER

CLOUD

PUBLIC CLOUD

Cloud Files

Cloud Servers

Block Storage

On-demand servers featuring local SSDs, powerful Intel® Xeon® processors, and 40Gbps of highly available throughput to every host

Fast, reliable storage for I/O-intensive apps. Choose standard or SSD volumes, connected to Cloud Servers via our fast network

Easy-to-use online storage for files and media. Deliver content globally to your users over Akamai's content delivery network (CDN).

File-level backup for your Cloud Servers. Cloud Backup lets you quickly protect and restore important files.

Cloud Backup

Page 14: Replete Corporate Profile

INFORMATIONTECHNOLOGY

PUBLIC CLOUD

Load Balancers

Cloud Database

Big Data Platform

High-performance MySQL databases in the cloud, with built-in redundancy and automated configuration to save you time.

Production-ready, performance-tested big data clusters on our OpenStack-powered cloud, supported by a broad ecosystem of partners

Easy-to-configure, reliable failover for your high-traffic site or application hosted on Cloud Servers or Cloud Databases

Cloud DNS lets you add, modify, and remove domains, subdomains, and records, as well as import and export domains and records.

Cloud DNS

DATACENTER

CLOUD

Page 15: Replete Corporate Profile

INFORMATIONTECHNOLOGY

Cloud Monitoring

Cloud Database

Cloud Queues

Fully isolated, single-tenant cloud networks provide control over network topology, IP addressing (IPv4 or IPv6), and architecture

Our scalable cloud message queue service lets you easily connect distributed applications without installing complex software.

Cloud Monitoring lets you stay on top of your infrastructure by receiving alerts anytime your URLs, ports, or protocols need attention.

DATACENTER

CLOUD

PUBLIC CLOUD

Cloud Networks

Page 16: Replete Corporate Profile

INFORMATIONTECHNOLOGY

Cloud Database

MANAGED COLOCATION

Get the performance of bare metal, a hardware firewall, monitoring, backup, and a Managed Service Level. All starting at only $499/month.Dedicated bare metal servers start at $499/monthFirewall, monitoring, and backup included Access our Dedicated Support TeamGet customized configurations tailored to meet your needsBenefit from our industry-leading SLAs

Put down the hardware. Get out of the data center. And take a step up from traditional colo — so you can focus on your OS and application.Let us deploy your hardware and minimize your CapEx investmentWe manage your hardware lifecycleHost in our highly secure data centersAccess our Dedicated Support Team

DATACENTER

CLOUD

MANAGED HOSTING

MANAGED DEDICATED HOSTING

Page 17: Replete Corporate Profile

INFORMATIONTECHNOLOGY

Cloud Database

MANAGED STORAGE

Get the benefits of the cloud — like flexible compute, easy scaling, and availability — combined with the reliability, easy management, and advanced features of enterprise-class VMware® virtualization technology.Reduce costs — maximize resource utilization and TCOHost on a redundant infrastructureReplication and resiliency solutions availableGet the latest version of VMware vSphere® and ESXi

Get the right storage now — and the right alternatives for your future storage needs.Get up to 1920TB of storageChoose high-performance storage optionsPay as you growGet high availability

DATACENTER

CLOUD

MANAGED HOSTING

MANAGED VIRTUALIZATION

Page 18: Replete Corporate Profile

INFORMATIONTECHNOLOGY

Cloud Database

MANAGED SECURITY

Trust our deep expertise in database administration for:MySQL databasesMicrosoft® SQL Server® databasesOracle databases

We work to help guard against service interruptions. Choose from:Dedicated firewallsSSL certificatesDDoS mitigationThreat and log management

DATACENTER

CLOUD

MANAGED HOSTING

MANAGED DATABASES

Page 19: Replete Corporate Profile

INFORMATIONTECHNOLOGY

Cloud Database

DATACENTER

CLOUD

CRM

Sales Force Automation

Productivity Tools

Social

Mobile

Sales Tracking

Beyond CRM

Page 20: Replete Corporate Profile

INFORMATIONTECHNOLOGY

DATACENTER

CLOUD

CRM

SUPPORT

MAIL

CRM

BOOKS

REPORTS

PROJECTS

CAMPAIGN

Page 21: Replete Corporate Profile

INFORMATIONTECHNOLOGY

Close more deals in less time Balance between Automation & Productivity Access your CRM Anywhere, Anytime Enterprise-grade Security & Customization No long term contracts, Pay-as-you-go Integration with Google Apps The Perfect balance Automation

Web to Lead Form Workflow Rules Lead & Contact Management Account Management

Productivity

Business Card View CRM with Email Spreadsheet View Plug-in for MS Outlook Mail merge

The right tools to automate your sales activities, thus making you productive.

CLOUD

CRM

Page 22: Replete Corporate Profile

INFORMATIONTECHNOLOGY

MIGRATIONCOMPITENT SUPPORT FOR MOVING DATA & APPLICATION

DATACENTER MIGRATION / RELOCATION

CLOUD MIGRATION

INFRASTRUCTURE MIGRATION

DATABASE MIGRATION

OS MIGRATION

APPLICATION MIGRATION

Excellent track record for completing Data Center and Infrastructure Projects on-time and within budget.  We’ve moved and relocated data centers.  We can RESCUE your existing project or start from the beginning.  We can start with an ROI analysis and then do all the planning and execution.  Check the testimonials to see our 100% success rate!

STRATERGY & ROAD MAPPROCIDURE $ METHODOLOGY

TOOLS AND PROCEDURES

Page 23: Replete Corporate Profile

INFORMATIONTECHNOLOGY

MIGRATION

STRATERGY & ROAD MAP

Complexity of the tasks, a clear, sound strategy and a detailed roadmap are indispensable for swift, loss-free migration. Migration processes can be divided into various different types, depending on the level of changes: strategy and management of the modernization process, data migration, porting, upgrades, reengineering or change management each demand a tailor-made approach, special methods and tools, as well as specific know-how. Information systems consist of many different components, it is important to initially consider the relevant migration fields. 1. IT infrastructure and componentsa) Process hardware and communications networkb) System-related applications such as operating systems and databases (including data)2. IT applications to support the operational business processesa) Industry-neutral applications, such as SAP-CO/FIb) Industry-specific applications (individual developments or standard software)3. Development environment – if necessary for both developing and maintaining applications4. Transition planning (e.g. big bang, step-by-step, continuous, coexistence of old and new)  

Page 24: Replete Corporate Profile

INFORMATIONTECHNOLOGY

MIGRATION

PROCIDURE $ METHODOLOGY

The data saved in company information systems are among the most important and sensitive resources of a company. Our Competence Center Migration distinguishes between operative, declarative, dispositive and archived data, for which specific migration procedures are used in each case. We work according to a proven 10-phase model (see diagram) with clearly defined procedures which is subject to strict project management from initial analysis through to completing the data migration process. Replete offers verified branch and consulting expertise particularly for the automotive and financial industries, health care and insurance as well as for industry-neutral SAP applications. Here we have developed specific procedures for each case, based on the general 10-phase model. In this way, our expertise and specific methodical approach warrant efficient implementation of your migration project. Furthermore, migration processes are also frequently used for data cleansing or product streamlining. Particularly in the insurance and banking environment, this demands specific industry expertise in terms of product portfolio or profitability analysis of insurance tariffs or bank products. Our experts for "Actuarial Services" in the Competence Center Migration will support you with delta analysis as well as during data migration.  

Page 25: Replete Corporate Profile

INFORMATIONTECHNOLOGY

MIGRATION

TOOLS AND PROCEDURES

1. Repository: This database contains all migration-relevant objects (for example all attributes in the database tables for the source and also the target systems) to obtain a complete detailed overview and to automate as many procedures as possible (e.g. generation of load jobs, impact analyses).

2. Data profiling tools: Practically at the touch of a button, these data analysis tools permit the analysis and visualization of value ranges, data types and other parameters in the source and target systems, thus saving great programming and analysis workload.

3. Transformation tool: This tool formulates the visualization rules for the transfer of source to target attributes, transforming them to executable migration programs. For very complex target systems it may be necessary to produce so-called "business loaders" – loading programs that use the automated business processes already present in the target system – in order to import the data.

4. Data comparison tools: An important aid for systematic comparison of source and target data in the simplest possible manner during the migration process, with the results shown both in detail and compacted in the form of "indices". This is a prerequisite for generating sound information in order to proceed with migration.

5. Generic browsers: These tools are used for viewing and manipulating data in any data storage systems, for example for later access to data from source applications stored in staging areas when the source applications are to be shut down after the migration. 

Page 26: Replete Corporate Profile

INFORMATIONTECHNOLOGY

MIGRATION

DATACENTER MIGRATION

Reduce Risks. Minimize Disruptions .Focus On Your Data Center Trans formation.The decision to transform your data center environment is critical. Regardless of the size and complexity of your business’s IT environment, the driving forces for data center transformation are constant: changing business dynamics, new technology capabilities, the need to leverage managed hosting, achieving greater agility, adding flexibility and the aggressive pursuit of cost efficiencies. Data Center Migration Program (DCMP) offers a complete solution — from assessment and planning through migration and handover to steady state. Our proven, best practice- based program is designed to manage risks, control disruptions to your business during transition and take you from planning to “going live” on time and on budget.  Data Center Migration Program:

Designed to Deliver End-to-End SolutionsPerforms an exhaustive discovery of your environment

Led by a dedicated team of subject matter experts Supported by discovery tools to document assets, map application

interdependencies and capture workloads And personal interviews with application owners fill in gaps that automated

tools can’t see

Page 27: Replete Corporate Profile

INFORMATIONTECHNOLOGY

MIGRATION

DATACENTER MIGRATION

Establishes the right target state architecture

By analyzing your apps portfolio to determine suitability for cloud, managed hosting and collocation.

And balancing the capabilities of your environment with the realities of DR and your applications’ technical requirements

Eliminates or minimizes service disruptions By deploying the right migration technologies

And establishing your new environment while managing your needs during the transition

Provides management control throughgovernance and financial discipline

Through effective program management

And a robust business case model

Page 28: Replete Corporate Profile

INFORMATIONTECHNOLOGY

MIGRATION

DATACENTER MIGRATIONA Modular Offering to Meet Your Specific Needs:

Your migration requirements are unique. That’s why DCMP is a modular offering designed to be tailored to your precise needs — no matter where you are in your data center transformation journey. If you don’t require our full suite of services.

Begin with: Migration Assessment, which defines the appropriate migration strategy and establishes the financial base to justify your transformation.

Migration Consulting servicesprovide subject matter experts to assist with your data center transition in focused areas such as governance, solution architecture, migration orchestration and engineering support. In order to benchmark your own plans against , world-class migration planning models to understandpotential risks and gaps, our Migration Gap Analysis quicklycompares your plans against our time-tested and bullet proofed reference planning models. Whatever your unique migration requirements, has the right offering to meet your needs — from full serviceto specific subject matter expert advice

Page 29: Replete Corporate Profile

INFORMATIONTECHNOLOGY

MIGRATION

DATACENTER MIGRATION

What Differentiates Rajput Technologies DC Migration Plan?Application oriented migration approach

• Focus on the entire infrastructure stack needed per application• Aligns infrastructure and business/application stakeholders• Prioritizes and integrates your policies, compliance and regulatory requirements, SLAs, and DR considerations

Robust process and governance frameworks:

• Factory process approach to application migration — single location or complete synchronization across multiple migration locations• Established PMO and governance frameworks manage complex migrations• Continuous management of business case and financials throughout the migration

Rigorous analytics and architecturebest practices• Gets to “one version of the truth” through fact-based analysis of your technology portfolio, utilization levels, architecture, inter-dependencies and costs• Best-in-class architecture around servers, storage, networking, virtualization and applications• Proven methods and tools neutralize the impact risk of migration

Page 30: Replete Corporate Profile

INFORMATIONTECHNOLOGY

MIGRATION

DATACENTER MIGRATION

OUTPUT CONTAINS VALUE

Target StateArchitecture

Target State technology architecture that meetsthe business needs of the organization• Specifications around compute, storage andnetwork platforms

Management guide to Target State• Complete view and basis for programprogress and measurement

MigrationPlaybook

Migration factory process framework• Migration rules — prioritization, segmentation &grouping rules• Migration constraints — applicationbusiness rules

Playbooks for attaining target state• Provides organization-specificrules that impacts the definition ofmigration plan

Page 31: Replete Corporate Profile

INFORMATIONTECHNOLOGY

Business Case &Financial Model

• Cost elements & drivers• Business case model & assumptions• Current state cost baseline & target statecost projections• Business case, including net savings, cost toachieve, breakeven point and ROI

Comprehensive assessment of ITcosts in facilities, labour, compute,storage & network• Basis for program and budget• Input to continuous financialmonitoring and savings

Wave Plan • Analysis of interdependencies andtransformational efforts• Application groupings and order for migration

• Defines the inclusion for eachmigration wave to focus order andpriority of activities

DetailedMigration Plans

• Requisite information for migrations• Step-by-step migration activities for applications• Specific schedule for migration and validation

• Documented plans and procedures tomitigate the risks of migration• Integrated governance for managingmigration activities

MIGRATION

DATACENTER MIGRATION

OUTPUT CONTAINS VALUE

Page 32: Replete Corporate Profile

INFORMATIONTECHNOLOGY

MIGRATION

APPLICATION MIGRATION

Application Migration & ModernizationWell defined methodology for Application Modernization. This is called “AMM” or “Assess-Modernize-Maintain” and is based on Application Consulting and Maintenance Led modernization approaches.Depicted below is a snap shot of the Application Modernization service offering

ModernizeHerein we will create the readiness plan for Modernization and/or Migration of the applications and their related databases. Based on analysis previously done we will create the necessary blueprints for the future design of the applications and databases. We will also create the plan for modernization/migration in consultation with you and need of the hour from your business. We will also create a “sunset plan” for the old system and this is via our plan for “Decommissioning” of the old system.

AssessIn this phase we will understand the Business Drivers and Objectives through an in-depth study of your Application Landscape. We will also assess the level of documentation and perform a current state analysis of your portfolio of applications. During the analysis we’ll Reverse Engineer the applications if not already done. We will help you in developing a blueprint for developing your future roadmap for the applications through our “4R”, namely; Re-Engineer, Replace, Retain and Retire, methodology for recommendation

Page 33: Replete Corporate Profile

INFORMATIONTECHNOLOGY

MIGRATION

APPLICATION MIGRATION

MaintainWe will make use of the robust and mature “Transition-to-Transformation” framework for support and maintenance. This framework will bring in standardization in the overall engagement and will being the best practices in stabilization of the modern/migrated applications via Training and Continuous Service Improvements.

Support Led ModernizationThe engagement is initiated through a Support and Maintenance model utilizing our Transition to Transformation approach. The applications are modernized based on the needs of the business

Key Capabilities

Consulting Led ModernizationOur customer organizations like yours have seen a lot of benefit when we approach modernization/migration engagements by performing a quick Due Diligence. This will help you in evaluating the various approaches and also assess whether modernization is right or not. It will also help in phasing your strategy such as – only front end modernization, or reengineer the complete application along with the database and the business logic as well, or perform an application migration, or perform just a technology upgrade.

Page 34: Replete Corporate Profile

INFORMATIONTECHNOLOGY

MIGRATION

APPLICATION MIGRATION

Business ValueOur modernization methodology brings the following value to you.Tool Based Analysis• 15-20% overall reduction in the effort for analysis• All outputs are delivered in a standard format and appearance• Analysts will focus their energies on providing quality blueprints and roadmaps• Reduce the rework and improve maintainability of future system• Platform agnostic blueprint for modernization

OverallReduced impact and risks of the investments already made on the aged systemsIncreased ROI of legacy system by bringing more value of the modernized systemsApplication Intelligence: Effective traceability of functional and technical artifacts of the legacy and modernized applications

Modernize“Grow As You Go”: Modernize at your own paceStandardization of the platform across the enterpriseModernized applications are aligned to the business roadmap defined by youIncreased reusability of the applications as they are also abstracted to create more services into them.

Page 35: Replete Corporate Profile

INFORMATIONTECHNOLOGY

IT PROJECT MANAGMENTAPPLICATION MIGRATION

Modern IT systems have to cover a large variety of technical and professional requirements because the ever-increasing interconnection of IT systems leads to a high degree of complexity in development and operation. At the same time, the professional and technical demands placed upon the quality of IT systems are growing as well. For this reason, various specialized divisions and experts are integrated into development projects. As a result, the organizational structure of IT projects is larger and more complex – with increasing demands upon IT project management.A decisive factor in the success of IT projects, beyond professional know-how und technological competence, is above all the capacity for efficient planning and steering. This calls for professional processes and methods in IT project management – the reason why we have established IT project management as an independent area of expertise in our organization. On this basis, we can offer you the complete range of services in the field of project management:

Management of IT projects and programs

Audit and Quality Management

Project Management Offices

Page 36: Replete Corporate Profile

INFORMATIONTECHNOLOGY

IT PROJECT MANAGMENTMANAGEMENT OF IT PROJECTS AND PROGRAMS

In steering your IT projects and programs we support you with comprehensive services and ensure highest quality. Our experienced project managers consult with and coach your staff and take responsibility for the results.

In client projects as well as in our own, our IT project management follows a clearly defined methodology, our PROcess Framework for IT Projects (PROFI). This methodology covers all the requirements of IT project management, risk management and quality management through all phases – from initialization to operation.

Our range of services in the context of IT project- and program management cover

Management of IT projects and programs Definition und classification of the project scope Establishment and support of Project Offices Planning and supervision of target dates and resources Cost management during the course of the project Stakeholder management Risk management (in the start-up phase and during the project) Quality management

Page 37: Replete Corporate Profile

INFORMATIONTECHNOLOGY

IT PROJECT MANAGMENTAUDIT AND QUALITY MANAGMENT

IT projects are not without risks, especially those that are extensive and critical in terms of time or business. There are many reasons to carry out a project audit – for example, if you want to change your service provider or want to know:

whether your project management is professionally organized whether you can expect high-quality results whether the project is efficient and meeting the targeted schedule Beyond analyses and project audits, we ensure that in the handling of your

projects all requirements of quality management are fulfilled from the beginning. In addition, we offer a comprehensive range of services for quality assurance:

Project auditing Identification and analysis of project risks Evaluation of process quality, for example according to the reference

models of Capability Maturity Model Integration (CMMI) Monitoring of ongoing process improvement Review of development outcomes Establishment of professional IT project management

Page 38: Replete Corporate Profile

INFORMATIONTECHNOLOGY

IT PROJECT MANAGMENTPROJECT MANAGMENT OFFICES

At a certain level of complexity, implementing, establishing and enforcing all concepts and methods in the context of IT project management cannot be performed by the project manager alone. Particularly for large projects and extensive programs, it is advisable and practical to establish a professional Project Management Office (PMO). A PMO ensures process consistency and enables the project manager to concentrate on the steering of the project or program.

The set-up of a Project Management Office enables the establishment of continuous processes, methods and tools at the cross-organizational level. By systematic training, coaching and regular exchange of experience, staff members are prepared for managing IT projects.

Our range of services in the Project Management Office area:

PMO for multi-project-, program-, or portfolio management Introduction of consistent policies and guidelines for project execution Establishment of standards for project management, e.g. GPM/IPMA, PMI/PMBoK, Prince2, V-Modell XT, Scrum Systematic identification and analysis of risks within a project portfolio or within a multi-project-/multi-program context Integration of the PMO into the organizational structure of the company Training and coaching for project managers

Page 39: Replete Corporate Profile

INFORMATIONTECHNOLOGY

INFORMATION SECURITYINFORMATION SECURITY

In the age of increasing globalization, networking, mobility and cybercrime, information security and IT security are essential. It is not only major international companies that are targeted by hackers, small and medium-sized companies are also increasingly becoming victims of industrial espionage by internal and external parties. Although laws and regulations (e.g. SOX [Sarbanes-Oxley Act] or data protection laws like EU Directive 95/46/EC) increasingly demand the implementation and verification of IT security measures, risks are often identified too late or inadequately addressed. The loss of trust amongst clients and customers resulting from security incidents can cause damage in the millions and lasting harm to the company's reputation.

In addition to this, the complexity of implementing the interdisciplinary subject of information security is often underestimated. In our Center of Competence Information Security we therefore offer individual and independent consultancy on all aspects of corporate and application security. Our experts have amassed comprehensive experience in the field of information security in numerous projects in different sectors. They are certified as Lead Auditors or Certified Information Systems Security Professionals (CISSP) in accordance with ISO 27001; their expertise is always up to date. Our customers include well-known companies. Their trust is the best evidence of our expertise.

Page 40: Replete Corporate Profile

INFORMATIONTECHNOLOGY

INFORMATION SECURITYINFORMATION SECURITY

CORPORATE SECURITY

APPLICATION SECURITY

SECURITY AUDITS

TRAINING

PENETRATION TESTS

PROTECTION REQUIREMENTS AND IT RISK ANALYSES

CLOUD SECURITY

MOBILE SECURITY

Page 41: Replete Corporate Profile

INFORMATIONTECHNOLOGY

INFORMATION SECURITYCORPORATE SECURITY

When implementing information security in international as well as small and medium-sized companies, challenges can be found both in the organizational and process environment, as well as in the sensible and appropriate use of technologies.

In order to meet these requirements in the best possible way, we provide you with integrated support for the establishment and optimization of your security organization, IT risk management, as well as the implementation of compliance requirements and security guidelines.

In addition to this, our Information Security Center of Competenceis available to you, offering comprehensive expertise in the setting up of an information security management system (ISMS) and preparation for certification inspections, for example ISO 27001. If required, we can also provide external security or data protection officers to help you establish the perfect security culture for your company.

Page 42: Replete Corporate Profile

INFORMATIONTECHNOLOGY

INFORMATION SECURITYAPPLICATION SECURITY

In addition to the "classic" approach of checking application and system security through Penetration tests and security source code reviews, our Center of Competence Information Security also supports you during the software development process, for example with Security by Design and Privacy by Design. In addition, we offer you expert security advice throughout the complete software lifecycle.

With protection requirements analyses, security concepts, consideration of infrastructure security, secure coding and application of the security development lifecycle (SDL), we optimize IT security in an effective and efficient manner. Our experts not only possess comprehensive expertise in the field of web application security, but are also well versed in mobile applications and complex IT systems in company environments.

Page 43: Replete Corporate Profile

INFORMATIONTECHNOLOGY

INFORMATION SECURITYSECURITY AUDITS

We inspect information security and technical data protection in your company in accordance with your individual requirements, current standards such as ISO 27001, IDW PS 330, the Payment Card Industry Data Security Standard (PCI-DSS) and of course legislation such as the German or EU data protection laws. Various other "de facto standards" and best-practice approaches, such as Open Web Application Security Project (OWASP), Open Source Security Testing Methodology Manual (OSSTMM) and Information Technology Infrastructure Library (ITIL) form the basis for our work.

The many years of experience and comprehensive expertise of the consultants in our Center of Competence Information Security ensure efficient audits and impartial results. No matter whether it is one application, a complete computer center or the entire security organization that is to be inspected – together with you we will identify the most appropriate inspection standard and, in addition to the inspection findings, also indicate sensible improvement options

Page 44: Replete Corporate Profile

INFORMATIONTECHNOLOGY

INFORMATION SECURITYTRAINING

We offer customized training on central issues relating to information security and data protection, for Chief Information Security Officers (CISO) and Security Officers as well as for other employees. Our range of services includes training for Application security and for security in software development (Security & Privacy by Design)  in addition to security awareness trainings and live hacking talks for specific target groups or the entire staff.

Page 45: Replete Corporate Profile

INFORMATIONTECHNOLOGY

INFORMATION SECURITYPENITRATION TEST

We support you in assessing the security of your software applications and products. As a sub-area of Application security, penetration tests and security source code reviews are part of our core expertise. Well over 100 successfully completed projects on different systems, web applications and IT infrastructures are evidence that our Center of Competence Information Security is well versed in all relevant techniques and methods.

In close cooperation with you, we set the test framework parameters for the security inspections (e.g. depth of testing, aggressiveness, access) and execute the penetration tests professionally, on time and within budget. Meaningful results reports with assessments and practicable recommendations are, of course, included in our work. 

Page 46: Replete Corporate Profile

INFORMATIONTECHNOLOGY

INFORMATION SECURITYPROTECTION REQUIREMENT AND IT RISK ANALYSIS

Information security for Companies and Applications can only be efficiently and effectively implemented when the security measures are perfectly aligned with the specific protection requirements.

As part of our protection requirements analysis, our Center of Competence Information Security determines which measures can provide appropriate protection for your information and your IT. In this process, we consider the damage that could arise in the event of a breach of confidentiality, integrity or availability for each application and the information processed. Our experts support your IT risk management in the assessment of the protection requirements for your data and systems and thereby help implement security in accordance with your requirements.

With our IT risk analysis, we identify the risks that could arise for your business through the use of information technology and help you control risks such as the failure of IT systems, data espionage or corruption of information. In doing so, we consider both the likelihood of occurrence and the extent of the damage.

We perform the IT risk analyses according to established standards such as ISO/IEC 27005 or the German BSI basic protection catalogs as well as according to your individual specifications. Any potentially existing risks are described transparently in the results report. We will provide you with specific proposals for risk avoidance through alternative systems or processes and for risk reduction through security measures or risk transfer through insurance. In some cases, it also sensible for the management to agree to accept the residual risk. We will also consider this option together with you.

Page 47: Replete Corporate Profile

INFORMATIONTECHNOLOGY

INFORMATION SECURITYCLOUD SECURITY

In 2012, the "cloud" claimed the doubtful honor of winning the "Big Brother Award 2012". This unwanted prize is awarded to organizations which compromise people's privacy or make personal data available to third parties. This shows once again that there is a need for improvement in the cloud with regard to matters of security and data protection. The European Union, too, intends to react to the changed requirements with a new EU Data Protection Directive.

The outsourcing of services and data to third-party providers can create security risks and legal problems of which most companies are unaware. The desired efficiency gains from cloud computing can thus quickly turn into a disaster.

We help you identify and avoid pitfalls and potential planning mistakes related to the cloud at an early stage. With the extensive experience of our Competence Center Information Security in solutions for cloud security, we support you in the integrated implementation of measures for IT security and data protection for the cloud.

Page 48: Replete Corporate Profile

INFORMATIONTECHNOLOGY

INFORMATION SECURITYMOBILE SECURITY

The increasingly intensive use of mobile devices and apps in the business environment has brought much greater convenience to everyday business. At the same time this represents one of the severest threats to sensitive company and client data as well as to the privacy of users. For one thing, tablets and smart phones are exposed to additional risks due to their mobility, for example because of connecting to insecure public nets, the risk of loss or theft or the possibility of tracking. Another problem is that many IT developers and decision-makers do not give enough thought to security when they are following new trends in devices or developing smart apps.

Hackers and other attackers know that the security situation regarding many apps is not good, enabling them to have an easy time on it. Many app producers have also recognized the evaluation and distribution of user data for marketing purposes as a business model and exploit user data – sometimes without user permission – or generate detailed motion profiles.

Page 49: Replete Corporate Profile

INFORMATIONTECHNOLOGY

INFORMATION SECURITYMOBILE SECURITY

Finally, the trend ”Bring Your Own Device“ (BYOD) – the use of private devices for company purposes – is posing new challenges for security managers, legal departments and data protection officers.To prevent unpleasant surprises, the experts of our CoC Information Security offer you their support in the areas of mobile device security and apps security with the following services: Penetration tests for mobile apps and devices (iOS, Android) App validation (testing the app for compliance with specified performance, e.g.

no transmission of data to third parties) Secure development of mobile apps Source code review Guidelines and security concepts for mobile devices within the company Compliance check (e.g. data security, GoBS, internal procedures and

specifications) Mobile Device Management (MDM)

Page 50: Replete Corporate Profile

INFORMATIONTECHNOLOGY

INFORMATION SECURITYMOBILE SECURITY

Rajput Technologies Networks’ portfolio of Services can help you get the most from your infrastructure investment. At Rajput Technologies we have been entrusted with planning, building, supporting and enhancing more Microwave networks than any other company. This fact sets Rajput Technologies apart from the rest of the industry.

Our Services portfolio includes state-of-the-art expertise in engineering and design, network deployment and implementation, and integration, testing and commissioning. We continue to support the performance of your unit and network after deployment with equipment support, training, and Network Managed Services.

With our global footprint of full time resources and key partners we have the capability to bring a complete transmission solution to our customers where ever the need arises. Our Global Field Support and Global Support Services organizations have been delivering multi-vendor, multi-protocol network solutions for nearly 50 years, led by our best-in-class global resources and strong local expertise.

Page 51: Replete Corporate Profile

INFORMATIONTECHNOLOGY

NETWORKS

NETWORKS

Rajput Technologies Networks’ portfolio of Services can help you get the most from your infrastructure investment. At Rajput Technologies we have been entrusted with planning, building, supporting and enhancing more Microwave networks than any other company. This fact sets Rajput Technologies apart from the rest of the industry.

Our Services portfolio includes state-of-the-art expertise in engineering and design, network deployment and implementation, and integration, testing and commissioning. We continue to support the performance of your unit and network after deployment with equipment support, training, and Network Managed Services.

With our global footprint of full time resources and key partners we have the capability to bring a complete transmission solution to our customers where ever the need arises. Our Global Field Support and Global Support Services organizations have been delivering multi-vendor, multi-protocol network solutions, led by our best-in-class global resources and strong local expertise.

Page 52: Replete Corporate Profile

INFORMATIONTECHNOLOGY

NETWORKS

NETWORKS

CONNECTIVITY SOLUTIONS

DATACENTER NETWORK SOLUTIONS

END USER CONNECTIVI

TY SOLUTIONS

WAN TRANSFORMATION

S

IP V6 TRANSFORMA

TION

SERVICESCONTACT CENTER SOLUTIONSCOLLABRATIONSO

LUTIONS

IP TELEPHONY / UNIFIED

COMMUNICATIONS

CONTACT CENTER INFRASTRUC

TURE

CONSULTING SERVICES

UNIFIED COMMUNICATIONS AS A

SERVICE

CONTACT CENTER APPLICATION DEVLOPMENT

DEPLOYMENT SERVICES

VIDEO AND TELEPRECE

NCE

CONTACT CENTER INTEGRATI

ONS

MANAGED SERVICES

Page 53: Replete Corporate Profile

INFORMATIONTECHNOLOGY

NETWORKS

NETWORKS

Our offerings are conceptualized, implemented and delivered keeping in mind entire suite of services:

LAN management, WAN management

WLAN management

Unified Communications

IPT

VoIP

IP Contact Center management

Network Operations Center

Network System Integration Services

Network Consulting Services

Network Implementation Services

IP Video Surveillance

Page 54: Replete Corporate Profile

INFORMATIONTECHNOLOGY

HUMAN RESOURCE MANAGEMENT SERVICESWHY RAJPUT TECHNOLOGIES

Rajput Technologies combines a unique understanding of HR and how HR processes can be maximized through any of the major enterprise systems such as SAP and Oracle. Rajput Technologies can help organizations design, implement, measure, monitor and optimize their business processes. Organizations can thus maximize the benefits from their investment in enterprise systems, whether it be standard payroll or talent management solutions. Rajput Technologies aims to release the full potential of this powerful solution for its clients. It can:

Align HR with business strategy: By using sophisticated business analytics Rajput Technologies helps organizations align performance and profitability goals.

Reduce costs and increased performance: By automating manual processes and streamlining others, costs can be reduced while flexibility and performance are increased.

Provide greater strategic focus: Relieving HR employees of routine administration frees them to focus on strategic tasks that help the organization advance toward high performance.

Page 55: Replete Corporate Profile

INFORMATIONTECHNOLOGY

HUMAN RESOURCE MANAGEMENT SERVICESNETWORKS

Rajput Technologies Human Capital Management Solutions has a range of services designed to provide a comprehensive solution by designing, implementing, measuring, monitoring and optimizing HR business processes and the supporting enterprise software:

HR-IT Strategy: By helping our clients align their HR Strategy with their IT needs, Rajput Technologies adds value by envisioning what IT can deliver. We combine insight into the latest technology and technology trends to build a robust, future-orientated IT capability that will support your HR strategies. HR process design and optimization: By re-engineering and automating business processes, managers are freed from routine administrative tasks to proactively shape the organization while reducing costs and improving service quality.

HR technology consulting: Our technology consulting services team specializes in defining the global or local human resources IT architecture, while taking into account the required functionality and the human resources processes that must be supported.

Page 56: Replete Corporate Profile

INFORMATIONTECHNOLOGY

HUMAN RESOURCE MANAGEMENT SERVICESNETWORKS

HR solutions implementation: Recognized as a leader in systems integration, our approach facilitates organizational redesign, risk assessment, training needs analysis and change management, with tools and templates tailored to your business needs.

Upgrade experience: We leverage all our enterprise solutions capabilities to deliver upgrades that generate operational efficiencies and achieve high performance.

Application maintenance: Comprehensive support facilities are designed with a specific focus on enterprise resource planning, combining human resources processes and SAP solution support with problem diagnosis and recovery expertise to offer the maximum advantage from your investment flexibly and cost-effectively.

Page 57: Replete Corporate Profile

INFORMATIONTECHNOLOGY

HUMAN RESOURCE MANAGEMENT SERVICESNETWORKS

Workforce analytics: Rajput Technologies Workforce Analytics combines Rajput Technologies functional knowledge, tools for human resources best practices and workforce metrics with leading enterprise resource planning business intelligence suites that deliver a full range of analysis and reporting capabilities.

Rajput Technologies Human Capital Management Solutions : Rajput Technologies solutions and software suite can be used to tailor solutions based on enterprise systems to meet specific strategic goals.

Business warehouse and business intelligence services: Rajput Technologies helps organizations make the right human resources decisions based on consistent quality of information by transforming data from across the enterprise into usable, timely business information.

Page 58: Replete Corporate Profile

INFORMATIONTECHNOLOGY

IT LEASING

NET

Rajput Technologies Leasing is one of the leading equipment leasing companies in the world for a reason. We build strong relationships with our customers that last for decades. At Rajput Technologies Leasing, we pride ourselves on offering lease solutions that help you maximize budget dollars and increase efficiency throughout the equipment lifecycle.Equipment leasing is much more than a form of financing. It should be an overall strategy for managing your equipment.

Leasing with Rajput Technologies equals:

Unbiased options and the ability to lease any type of equipment you need

Flexible solutions that can change with your business

Unparalleled customer service

Easy ordering process that will save time and trees

Comprehensive disposal plan that includes data security to protect you and your information

Page 59: Replete Corporate Profile

INFORMATIONTECHNOLOGY

IT LEASING

NETWORKS

New Equipment Rental

Rental - the smart alternative

Using rental as the solution for equipment procurement stretches your budget a lot further. In fact on a 36 month contract you can stretch it almost three times as far and with the current economic climate there has never been a better time to lock in your technology costs. Imagine interest rates in single figures fixed for three years; attractive isn’t it?

Rental Payment Plans

Regular Payment Plan

This allows for the development of a planned procurement strategy with the certainty of operating cash flows. Regular Payment Plan allows you to make even quarterly payments in advance with the added flexibility of using the Exchange Plan. A typical Regular Payment Plan means the quarterly instalments are fixed at one amount for the duration of the rental schedule.

Page 60: Replete Corporate Profile

INFORMATIONTECHNOLOGY

IT LEASING

NETWORKS

Sell and Rent Back

Need equipment for something specific?

Sell & Rent Back is designed for corporations that have an existing inventory of IT or other equipment. Is your and other equipment technology old? Do you want to standardise? Perhaps you need to conform to global corporate policy requirements.

Exchange Plan

Choices. Flexibility.

The Exchange Plan allows you to change your equipment without increasing your costs. It’s a flexible acquisition and payment facility that begins with you choosing the equipment you need.

Page 61: Replete Corporate Profile

INFORMATIONTECHNOLOGY

IT LEASING

NETWORKS

Short Term Rental

Need equipment for something specific?

Do you have a specific project, training or conference on the go? Do you need to cater for growth in your business or temporary staff? Have you lost equipment through theft or want to test capability requirements before purchasing?

Equipment We Lease:

PCs Laptops Tablets Servers and Storage Routers Networking Equipment Telecommunications Printers and Multifunction Printers Copiers Smart Phones Multimedia Equipment

Page 62: Replete Corporate Profile

INFORMATIONTECHNOLOGY

IT LEASINGEQUIPMENT DESPOSAL / RECYCLING

Protecting you, protecting the environment.Do you have a plan in place for outdated equipment? Throwing it in the trash is not an option and stockpiling it in storage is expensive and risky. These days, it’s essential to have an equipment disposal plan in place from the beginning. Make sure you consider things like data protection and proper recycling when choosing a disposal company.

When you lease with Rajput Technologies, you automatically have an environmentally-friendly disposal plan in place.

The following services come standard with every lease.

A complete data security plan that wipes hard drives according to the National Institute of Standards and Technology sanitization standards

100% remanufacturing and recycling of hardware, protecting you from future liability

Page 63: Replete Corporate Profile

INFORMATIONTECHNOLOGY

Thank You