Home

Delivery Model:

With our highly scalable, globally networked secure offshore computing and physical infrastructure facilities, combined with the unique onsite, offsite, offshore and nearshore delivery models, we deliver the best possible ROI to our clients.

We understand your business and build strong working relationships that deliver measurable business value. Our unique engagement models, coupled with a competitive pricing structure and best-in-class methodologies, do not just cut costs but drive value into the enterprise, right from day one. Quality commitments and innovative thinking are inherent to all our client engagements.

Transition Methodology

Our transition roadmap is focused on key activities and documents that build a strong foundation for a sustained delivery, which encompasses the transitioning process of “as-is” understanding, process maps, communication plans, thorough understanding of IT requirements. Knowledge management and business intelligence help in defining the baselines prior to transitioning a process and drawing comprehensive SLA backed by stringent reporting systems. A robust business continuity plan is prepared during the transition phase of the project.

Planning :
The transition phase commences with the establishment of a Program Management Office (PMO) that helps plan and execute transition effectively. The PMO is tasked with ensuring the efficient migration of the identified processes.
Execution :
We deploys domain, process and technology teams to address each of the transition tracks. These consist of:

Knowledge Transfer:
Includes the construction of operating procedures, preparation of training documents, and training executives to execute the process offshore.
Technology Transfer:
Identifies the optimal network architecture, procurement of bandwidth and systems, and installation, testing and deployment of technical infrastructure.
Operating preparedness:
Includes recruitment, induction and site preparation
Infrastructure
  • Multiple locations to offer Disaster Recovery and Business Continuity
  • State-of-the-art building management, security and power backup systems
  • Robust highly reliable network infrastructure with multiple redundancies
Security of the highest order

We are committed to respecting, protecting and safeguarding the privacy and confidentiality of data entrusted to us by our customers. To ensure data security, we have developed an information security policy and data privacy policy that also takes into account the safeguards and controls required to be adhered to by RANSI BPO. In addition, we have implemented a rigorous set of standard operating procedures designed to provide our clients with the requisite privacy and security necessary to achieve the trust and confidence of our clients.

Physical security

Building Security Systems:
round the clock access to the building is restricted to authorized associates only. All physical entry and exit points are manned by trained security personnel. The presence of security personnel is mandated at the entry / exit points.
Access Cards:
Our delivery area has an additional security layer with swipe-card based restricted entry for associates. This ensures that unauthorized people have no access to the delivery area.

System/Network Level

LAN:
RANSI BPO’s Local Area Network is designed to provide logical separation for each customer, or even various projects of the same customer, if required. Need-based access for permissions and authorizations, with adequate firewall and archival facilities, is ensured.
Passwords and Restricted Access:
We feature password-protected network and telecommunications access, with access to internet and e-mail restricted through a network firewall and use of proxy server
Client/Project Level

Data Security between clients is ensured through dedicated /separate areas for different clients, restricted physical as well as network access and LAN separation for each client. Each client has a secure LAN and access is carefully controlled by multiple levels of security.

Associate Level

Restricted and need-based access, based on roles which are reviewed periodically. More importantly, the attitude of the people we recruit are tested through psychometric tests. Confidentiality contracts and non-disclosure agreements are signed with each Associate and background checks are run on them. Strict norms, for information storage and disposal of data - both electronic and physical - are mandatory.

Our Information Security Policy covers ten areas of information security controls:

Security Policy
Security Organization
Asset Classification and Control
Personnel Security
Physical and Environmental Security
IT Operations Management
Access Control
Systems Development and Maintenance
Business Continuity Management
Compliance
Business Continuity & Disaster Recovery

Disasters can strike without a warning and the results are often, unpredictable. It can take weeks or months, even years for an organization to recover from the outages or service disruptions caused by adverse events such as natural or man-made disasters. Our BCP is geared to meet all possible contingencies, be it operational, infrastructural or unforeseen natural calamities. Business Continuity Planning begins right from the requirements gathering phase. This is reinforced during the transition phase. Business Impact Analysis (BIA), Recovery Time Objective (RTO) Analysis, Recovery Point Objective (RPO) analysis and Disaster Threat Analysis are the various steps carried out while implementing the BCP Strategy.

Drill

Our business continuity management process includes periodic fire evacuation drills , awareness testing, paper walkthroughs and simulations.

Key Features

Emergency response teams are formed, and trained on recovery procedures
Highly reliable network infrastructure with multiple redundancies
Multiple facilities well-connected with high bandwidth links
Robust backup practices for critical data
Power redundancy through generator sets and high-performance UPS systems
State-of-the-art building management and security systems.
Risk Management
  • A value scorecard outlining key performance indicators that identify and monitor risk, and client service levels
  • Facilitates the measurement of progress of critical success factors during integration (client satisfaction, personnel satisfaction, operational & technology efficiency, financial performance, etc.)
Program Management Office ( PMO )
  • A central program management entity that coordinates the activities of key stakeholders
  • Facilitates project tracking and reporting, issues management, knowledge management, and program communication support.
  • An approach that maximizes speed, focus and accountability