19 Mar 2024 , 10:34 AM
Exicom Tele-Systems Limited is set to launch its Initial Public Offering (IPO) as a book built issue valued at ₹429.00 Crores. The IPO comprises a combination of a fresh issue of 2.32 Crore shares totaling ₹329.00 Crores and an offer for sale of 0.7 Crore shares totaling ₹100.00 Crores.
Established in 1994, Exicom Tele-Systems Limited specializes in power systems, electric vehicle (EV) charging, and related solutions. The company’s manufacturing facility adheres to ISO 14001:2015, ISO 45001:2018, and ISO 9001:2015 standards.
As of September 2023, the company has supplied EV chargers to over 70 customers, including 15 automotive OEMs, 32 national and regional CPOs, and four fleet aggregators. Employing 1,190 individuals in India as of September 30, 2023, with 443 contractual employees and 732 technically qualified employees, including 438 with diplomas and 294 with engineering degrees. Additionally, the company has 50 employees at its subsidiaries.
Monarch Networth Capital Ltd, Unistone Capital Pvt Ltd, and Systematix Corporate Services Limited serve as the book running lead managers for the Exicom Tele-Systems IPO, with Link Intime India Private Ltd acting as the registrar for the issue.
Related Tags
IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000
IIFL Securities Support WhatsApp Number
+91 9892691696
www.indiainfoline.com is part of the IIFL Group, a leading financial services player and a diversified NBFC. The site provides comprehensive and real time information on Indian corporates, sectors, financial markets and economy. On the site we feature industry and political leaders, entrepreneurs, and trend setters. The research, personal finance and market tutorial sections are widely followed by students, academia, corporates and investors among others.
Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248
This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.