iifl-logo

Sonata Software Ltd Futures Share Price

401
(6.65%)
Apr 30, 2025|11:39:58 AM

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Sonata Software: Related NEWS

Sonata Software inks multi-million dollar APAC modernisation deal
28 Nov 2024|03:24 PM

The modernisation will include moving data from outdated systems, building a data platform with over 260 Power BI reports.

Read More
Sonata Software Q2 net profit sees marginal increase
7 Nov 2024|10:25 AM

The company aspires to generate $1.5 billion in revenue by fiscal year 2025, with international EBITDA in the low 20s.

Read More
Top 10 stocks for today – 10th October 2024
10 Oct 2024|08:57 AM

Here are some of the stocks the stocks that may see significant price movement today: Britannia Industries, PNC Infratech, etc.

Read More
Sonata Software secures multi-million dollar IT deal
29 Aug 2024|02:16 PM

Sonata Software will help the client optimise IT budgets and cost efficiencies through systemic improvements and engineering levers.

Read More

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2025, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248
ARN NO : 47791 (AMFI Registered Mutual Fund Distributor)

ISO certification icon
We are ISO 27001:2013 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.