iifl-logo

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Karvy Customer: For activating your account click here.

B2B Software Technologies Ltd Peer Comparison - Competitive Analysis

Add as a Preferred Source on Google
27.43
(-0.83%)
May 4, 2026|05:30:00 AM

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Karvy Customer: For activating your account click here.

B2B SOFTWARE TECHNOLOGIES LTD PEER COMPARISON

Company Name
LTP
(₹)
P/E
(%)
Mkt.Cap
(₹Cr.)
NP Qtr
(₹Cr.)
Div.Yield
(%)
Sales Qtr
(₹.Cr)
Book Value
(₹)

Tata Consultancy Services Ltd

TCS

2,430.75

16.848,79,466.6214,5264.5358,052234.07

Infosys Ltd

INFY

1,168.4

15.84,73,859.047,9754.1138,641199.41

HCL Technologies Ltd

HCLTECH

1,200.45

26.13,25,761.93-9004.512,89095.43

Wipro Ltd

WIPRO

200.8

17.372,10,617.013,037.15.4818,362.860.71

Tech Mahindra Ltd

TECHM

1,470.8

35.71,44,131.66541.33.4712,956.5221.66

B2B Soft.Tech.: RELATED NEWS

No Record Found

Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2026, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248, DP SEBI Reg. No. IN-DP-185-2016, BSE Enlistment Number (RA): 5016
ARN NO : 47791 (AMFI Registered Mutual Fund & Specialized Investment Fund Distributor), PFRDA Reg. No. PoP 20092018

ISO certification icon
We are ISO/IEC 27001:2022 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.