Tata Consultancy Services announced that it has expanded its collaboration with Keysight Technologies to help it reinvent its IT operating model for increased agility and user experience.
However, size and tenure of the deal were not disclosed by the IT giant.
According to a filing with the bourses, TCS will serve as Keysight’s partner for its transformation project, providing industry expertise and contextual knowledge to create a secure environment. TCS will also work to develop an integrated IT services strategy that covers applications, IT infrastructure services, and workplace services to help Keysight achieve its business objectives in driving customer innovation.
‘TCS’ expertise and contextual understanding enable the creation of a reliable and secure framework, empowering Keysight to reach its business objectives in driving customer innovation,’ stated V Rajanna, TCS’s global head of communications, media, and technology.
TCS will collaborate with Keysight to design an automation-driven operating model that will improve operational resilience, transform the user experience, and increase business agility, allowing Keysight to capitalise on synergies across the value chain.
For feedback and suggestions, write to us at editorial@iifl.com
Related Tags

IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000
IIFL Capital Services Support WhatsApp Number
+91 9892691696
IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132 (Member ID - NSE: 10975 BSE: 179 MCX: 55995 NCDEX: 01249), DP SEBI Reg. No. IN-DP-185-2016, PMS SEBI Regn. No: INP000002213, IA SEBI Regn. No: INA000000623, Merchant Banker SEBI Regn. No. INM000010940, RA SEBI Regn. No: INH000000248, BSE Enlistment Number (RA): 5016, AMFI-Registered Mutual Fund Distributor & SIF Distributor
ARN NO : 47791 (Date of initial registration – 17/02/2007; Current validity of ARN – 08/02/2027), PFRDA Reg. No. PoP 20092018, IRDAI Corporate Agent (Composite) : CA1099

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.