Wipro acquired ion in 2021 and in integrating its two businesses – Shelde and Revolution IT – into Wipro, it gained access to specialist Australian cybersecurity, DevOps and engineering capabilities. The specialist Australian cybersecurity services provided by Shelde will now be promoted under the new offering, the IT major said in a statement. This offering will provide clients access to local next-generation cybersecurity services through a pool of national security cleared consultants, experienced with the PGPA Act, Privacy Act, Protective Security Policy Framework, Essential 8, The Information Security Manual and Commonwealth Risk Management Policy. It will bolster Wipros comprehensive global cybersecurity and risk services to help clients meet critical business imperatives. Wipro is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. The IT majors consolidated net profit dropped 16.96% to Rs 2,563.6 crore on 3.21% rise in revenue from operations to Rs 21,528.6 crore in Q1 FY23 over Q4 FY22. Shares of Wipro fell 1.34% to Rs 430.10 on Wednesday, 10 August 2022. Powered by Capital Market – Live News
Related Tags
IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000
IIFL Securities Support WhatsApp Number
+91 9892691696
www.indiainfoline.com is part of the IIFL Group, a leading financial services player and a diversified NBFC. The site provides comprehensive and real time information on Indian corporates, sectors, financial markets and economy. On the site we feature industry and political leaders, entrepreneurs, and trend setters. The research, personal finance and market tutorial sections are widely followed by students, academia, corporates and investors among others.
Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248
This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.