-
2020 Lessons & Future Success Factors: Q&A with Wipro’s Nagendra P Bandaru
Jan 22, 2021, by John WillmottThe following is a discussion between Nagendra (Nag) P Bandaru, President, Wipro Limited – Global Business Lines-iCore, and John Willmott, NelsonHall CEO, covering lessons learned in 2020 and success factors for 2021. Nag is responsible for Infrastructure and Cloud Services, Digital Operations and Platforms, and Risk Services and Enterprise Cybersecurity – three key [...]
-
Infosys Showcases Resiliency of Nearshore Outsourcing Services in Face of Natural Disasters
Jan 23, 2020, by NelsonHall AnalystA magnitude-6.4 earthquake struck Puerto Rico on January 6, killing one person, toppling homes and buildings, and triggering a blackout on the island that is still recovering two years after Hurricane Maria. Governor Wanda Vázquez declared a state of emergency and activated the Puerto Rico National Guard to help with recovery efforts. How might this earthquake disaster have[...]
-
Accenture’s Zoran Tackles Digital Identity Failings
May 09, 2019, by Mike SmartNelsonHall recently visited Accenture at its Cyber Fusion Center in Washington D.C. to discuss innovations in its cyber resiliency offerings and the recent launch of its new digital identity tool, Zoran. Failings of existing role-based access (RBA) Typical identity and access management (IAM) systems control users’ access to data based on their role, i.e. position, compe[...]
-
Atos Makes €4.3bn Unsolicited Offer for Gemalto; Another Bold but Challenging Move
Dec 13, 2017, by Dominique RaviartAtos has made an unsolicited offer for security, SIM cards, and payment cards technology vendor Gemalto. The offer is sizeable at €4.3bn (plus Gemalto’s net debt of €938m at end of H1 2017) financed in cash. It runs until December 15. Gemalto is another major acquisition for Atos: in its fiscal year ended June 30, 2017, Gemalto generated revenues of ~€3bn, with an EBITD[...]
-
Quick Takeaways from IBM European Analyst & Advisory Exchange (vlog)
Nov 23, 2017, by Mike SmartMike Smart reports directly from IBM’s European Analyst & Advisory Exchange 2017 with some quick take-aways regarding IBM’s transition from systems integrator to services integrator and its business resiliency services.[...]
-
How IT Services Vendors Can Help Organizations Meet GDPR
Nov 09, 2017, by Mike SmartIn this, the second of two articles on GDPR, I look at how IT services vendors can help companies meet GDPR compliance in several areas. You can read the first article, ‘The Impact & Benefits of GDPR for Organizations’, here. Application services Application services can help organizations in ensuring that new and legacy applications meet the GDPR articles perta[...]
-
The Impact & Benefits of GDPR for Organizations
Oct 12, 2017, by Mike SmartIn this, the first of two articles on GDPR, I look at how the regulation is set to impact companies, and at the benefits of compliance beyond simply avoiding penalties. The EU's General Data Protection Regulation (GDPR) was adopted in April 2016 and will be put into force on 25 May 2018. The unified and enforceable laws contained in the regulation replace the o[...]
-
Atos’ Use of Machine Learning for the Prescriptive SOC
Aug 01, 2017, by Mike SmartWhen NelsonHall spoke to Atos earlier in the year about its managed security services, there was a clear push to move clients away from reactive security to a predictive and prescriptive security environment, so not only monitoring the end-to-end security of a client but also performing analytics on how the business and its customers would be affected by threats. Atos’ “S[...]
-
IBM and the Road to Cognitive Security
Jul 18, 2017, by Mike SmartEvery day the sheer amount and complexity of cybersecurity information that security analysts are required to sift through increases. Analysts arrive at the start of each day, catch-up on recent attacks and research cybersecurity news, and are thrown into analyzing security incidents: going down the rabbit hole of reviewing data flows, finding outliers, investigating IPs, searching through both in[...]
-
WannaCry and the Need for IT Spend on Cyber
May 16, 2017, by Mike SmartLast Friday morning, the largest ransomware cyber attack infected an unprecedented number of machines across organizations worldwide. The ransomware named WannaCry demanded $300 in Bitcoins to be paid in three days, otherwise the ransom would double. If no payment was made after seven days, data would be deleted forever. WannaCry ransom message Each time this ran[...]
-
Unisys Puts Security at the Heart of its Corporate Transformation
Nov 17, 2016, by NelsonHall AnalystUnisys recently held an analyst and advisor day in New York, entitled UnisysNOW. However, with a relatively new leadership team in place and a broad corporate transformation underway, the focus of the event was not so much on the current shape of Unisys’ business but on the company’s aspirations and plans for achieving them, encapsulated in a new tagline: Securing Your To[...]
-
Tech Mahindra’s Application Security Business Expands Offering, Targets Multi-Year Deals
Jul 22, 2016, by Dominique RaviartIn an earlier blog, we described how Tech Mahindra had expanded its performance engineering testing to embrace the Internet of Things (IoT), and here we take a look at how the company is handling another area of non-functional testing: software security testing. Tech Mahindra provides security services through its Cyber Security practice, a horizontal line of business. The practice has a headco[...]
-
Rio 2016: How Atos is Helping the IOC Redeploy its Budget from Run to Digital
Jul 08, 2016, by Dominique RaviartFour years ago, at the time of the London 2012 Olympics and Paralympic Games, NelsonHall reported on the work Atos does for the International Olympic Committee (IOC) though its Major Events unit. See our previous commentary here. This week we visited its center in Barcelona to get an update on the work it is doing for the Rio Games starting next month, The Olympic Games remain a fantastic o[...]
-
The New CSC Targeting Topline Growth Within 3 Years: Is Organic Growth Possible?
Nov 17, 2015, by Dominique RaviartCSC has just laid out the financial targets of the standalone business which will retain the CSC moniker when the U.S federal company, CRSA, breaks off. As well as CSC’s global commercial business, it includes non-U.S. public sector businesses (~$700m revenues in FY15). In its FY15 (ending March 31, 2015) this part of CSC achieved revenues of $8.1bn, and an adjusted operating margin[...]
-
The Rise of Managed Security Services: A $15bn Market by 2019
Oct 20, 2015, by Mike SmartIT security has never been more important, with levels of cybercrime continuing to climb and the adoption of cloud, mobile and IoT technologies increasing organizations’ ‘attack surface area’. With organizations gathering more data than ever via digitization and big data, and attackers finding ever more sophisticated ways of targeting them, both the depth and breadth of att[...]
- NelsonHall Blog
We publish lots of information and analyst insights on our blogs. Here you can find the aggregated posts across all NelsonHall program blogs and much more.
explore - Events & Webinars
Keep up to date regarding some of the many upcoming events that NelsonHall participates in and also runs.
Take the opportunity to join/attend in order to meet and discover live what makes NelsonHall a leading analyst firm in the industry.
explore
Subscribe to blogs & alerts:
manage email alerts using the form below, in order to be notified via email whenever we publish new content:
Search research content:
Access our analyst expertise:
Only NelsonHall clients who are logged in have access to our analysts and advisors for their expert advice and opinion.
To find out more about how NelsonHall's analysts and sourcing advisors can assist you with your strategy and engagements, please contact our sales department here.