iifl-logo

IT Sector

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Download App
image

The expanded strategic partnership between Infosys and Microsoft will greatly benefit enterprises.

image

The app stores verified personal information from certified issuers in the user's identity wallet.

image

TCS will do updation of OSS application of Telefonica.

image

The decline in domestic equities can be attributed to global cues.

image

While most consumer applications prioritize high data rates, industrial networks prioritize low latency and high availability.

image

The share buyback, which began on December 7, was scheduled to end on June 6, 2023.

image

TCS will serve as Keysight's partner for its transformation project.

image

This initiative aims to help the underprivileged by providing quality maternity and childcare.

image

Diligenta, TCS' regulated subsidiary in the UK, will manage customer administration and servicing for ReAssure's 3 million policies on behalf of Phoenix Group.

Download App
Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2025, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248, DP SEBI Reg. No. IN-DP-185-2016, BSE Enlistment Number (RA): 5016
ARN NO : 47791 (AMFI Registered Mutual Fund Distributor), PFRDA Reg. No. PoP 20092018

ISO certification icon
We are ISO/IEC 27001:2022 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.