With our highly scalable, globally networked secure offshore computing and physical infrastructure facilities, combined
with the unique onsite, offsite, offshore and nearshore delivery models, we deliver the best possible ROI to our clients.
We understand your business and build strong working relationships that deliver measurable business value. Our unique
engagement models, coupled with a competitive pricing structure and best-in-class methodologies, do not just cut costs
but drive value into the enterprise, right from day one. Quality commitments and innovative thinking are inherent to all
our client engagements.
Transition Methodology
Our transition roadmap is focused on key activities and documents that build a strong foundation for a sustained delivery,
which encompasses the transitioning process of “as-is” understanding, process maps, communication plans, thorough
understanding of IT requirements. Knowledge management and business intelligence help in defining the baselines prior
to transitioning a process and drawing comprehensive SLA backed by stringent reporting systems. A robust business
continuity plan is prepared during the transition phase of the project.
Planning :The transition phase commences with the establishment of a Program Management Office (PMO) that helps plan
and execute transition effectively. The PMO is tasked with ensuring the efficient migration of the identified processes.
Execution : We deploys domain, process and technology teams to address each of the transition tracks. These consist of:
|
Knowledge Transfer:Includes the construction of operating procedures, preparation of training documents, and
training executives to execute the process offshore.
Technology Transfer: Identifies the optimal network architecture, procurement of bandwidth and systems, and
installation, testing and deployment of technical infrastructure.
Operating preparedness: Includes recruitment, induction and site preparation
|
Infrastructure
- Multiple locations to offer Disaster Recovery and Business Continuity
- State-of-the-art building management, security and power backup systems
- Robust highly reliable network infrastructure with multiple redundancies
Security of the highest order
We are committed to respecting, protecting and safeguarding the privacy and confidentiality of data entrusted to us by our
customers. To ensure data security, we have developed an information security policy and data privacy policy that also
takes into account the safeguards and controls required to be adhered to by RANSI BPO. In addition, we have implemented
a rigorous set of standard operating procedures designed to provide our clients with the requisite privacy and security
necessary to achieve the trust and confidence of our clients.
Physical security
|
Building Security Systems:round the clock access to the building is restricted to authorized associates only. All
physical entry and exit points are manned by trained security personnel. The presence of security personnel is
mandated at the entry / exit points.
Access Cards:Our delivery area has an additional security layer with swipe-card based restricted entry for
associates. This ensures that unauthorized people have no access to the delivery area.
|
System/Network Level
|
LAN:RANSI BPO’s Local Area Network is designed to provide logical separation for each customer, or even various
projects of the same customer, if required. Need-based access for permissions and authorizations, with
adequate firewall and archival facilities, is ensured.
Passwords and Restricted Access:We feature password-protected network and telecommunications access, with
access to internet and e-mail restricted through a network firewall and use of proxy server
|
Client/Project Level
Data Security between clients is ensured through dedicated /separate areas for different clients, restricted physical as well
as network access and LAN separation for each client. Each client has a secure LAN and access is carefully controlled by
multiple levels of security.
Associate Level
Restricted and need-based access, based on roles which are reviewed periodically. More importantly, the attitude of the
people we recruit are tested through psychometric tests. Confidentiality contracts and non-disclosure agreements are
signed with each Associate and background checks are run on them. Strict norms, for information storage and disposal of
data - both electronic and physical - are mandatory.
Our Information Security Policy covers ten areas of information security controls:
|
Security Policy
Security Organization
Asset Classification and Control
Personnel Security
Physical and Environmental Security
IT Operations Management
Access Control
Systems Development and Maintenance
Business Continuity Management
Compliance
|
Business Continuity & Disaster Recovery
Disasters can strike without a warning and the results are often, unpredictable. It can take weeks or months, even years for
an organization to recover from the outages or service disruptions caused by adverse events such as natural or man-made
disasters. Our BCP is geared to meet all possible contingencies, be it operational, infrastructural or unforeseen natural
calamities. Business Continuity Planning begins right from the requirements gathering phase. This is reinforced during the
transition phase. Business Impact Analysis (BIA), Recovery Time Objective (RTO) Analysis, Recovery Point Objective (RPO)
analysis and Disaster Threat Analysis are the various steps carried out while implementing the BCP Strategy.
Drill
Our business continuity management process includes periodic fire evacuation drills , awareness testing, paper
walkthroughs and simulations.
Key Features
|
Emergency response teams are formed, and trained on recovery procedures
Highly reliable network infrastructure with multiple redundancies
Multiple facilities well-connected with high bandwidth links
Robust backup practices for critical data
Power redundancy through generator sets and high-performance UPS systems
State-of-the-art building management and security systems.
|
Risk Management
- A value scorecard outlining key performance indicators that identify and monitor risk, and client service levels
- Facilitates the measurement of progress of critical success factors during integration (client satisfaction, personnel
satisfaction, operational & technology efficiency, financial performance, etc.)
Program Management Office ( PMO )
- A central program management entity that coordinates the activities of key stakeholders
- Facilitates project tracking and reporting, issues management, knowledge management, and program communication
support.
- An approach that maximizes speed, focus and accountability
|