1. Veeras Infotek Private Limited provides information technology system integration and infrastructure management services to improve client productivity and optimize utilization.
2. They manage hundreds of security devices, thousands of virtual desktops and hosts, and petabytes of storage and data for over 25,000 cloud users.
3. Veeras helps clients improve organization productivity by 20% and optimize utilization by over 30% to reduce IT budgets and increase spending on innovation.
RSA Presentation - 5 Steps to Improving PCI ComplianceEMC
Did you know that if a company fails a PCI assessment they are subject to penalty fees and need to re-do the assessment at an average cost of $225,000 for a tier/level 1 merchant or retailer? And that 71% of companies that fail PCI audits do so because they cannot adequately meet the PCI DSS requirement 10, “Track and monitor all access to network resources and cardholder data.”With a little upfront planning and careful scoping, organizations can prepare themselves for the assessment and pre-check their own systems against the testing procedures as defined in v2.0 of the PCI DSS. Implementing the 5 steps of information- and people-centric approaches outlined by Diana Kelley, Principal Analyst at SecurityCurve, in her latest paper “Practical Guide to Improving PCI Compliance Posture” will help ease the compliance burden.
It is a fact of life that the IT department is a necessary yet costly part of today’s small and midsize businesses (SMBs). Many SMBs have reduced the size of the IT department to the point where costs cannot seemingly be cut any further. The result of these cuts is that service has been severely degraded, customer satisfaction is down, and the real value of IT to the business is being questioned. And still SMB IT leaders are being asked to do much more with much less. How does an IT department cope with these ever increasing demands and diminishing budgets?
Smart SMB CIOs are leveraging the Expertise-as-a-Service® (EaaS™) model to transform their organizations. Legal and finance departments have leveraged outside counsel and accounting firms for decades, with the IT department being one of the last of the major departments within the business to move to this low-fixed-cost model. Taking a page from the legal and finance departments’ “playbooks,” EaaS is used as an extension of the IT department. EaaS brings cost savings by enabling IT to reduce and reallocate in-house resources more effectively, while retaining on-demand access to scalable high quality expertise, information, and performance measurement. EaaS gives IT the ability to quickly adjust to changing business goals and drivers, encourage innovation, and increase productivity while reducing fixed costs.
Enterprise Digital Assistants: How they can support you in your Credit, Colle...emagia
What are Enterprise Digital Assistants. Digital Assistants For Credit Operations. Digital Assistants For Collections Operations. Digital Assistants For Cash Application. Planning for Your OTC Operations.
https://www.emagia.com/resources/ebooks/enterprise-digital-assistants-can-support-credit-collections-cash-application-operations/
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
Vast amounts of your organization's sensitive data are accessible, stored, and used by authorized employees and partners on a host of devices and servers. Protecting that data where ever it is stored or travels is a top priority.
RSA Presentation - 5 Steps to Improving PCI ComplianceEMC
Did you know that if a company fails a PCI assessment they are subject to penalty fees and need to re-do the assessment at an average cost of $225,000 for a tier/level 1 merchant or retailer? And that 71% of companies that fail PCI audits do so because they cannot adequately meet the PCI DSS requirement 10, “Track and monitor all access to network resources and cardholder data.”With a little upfront planning and careful scoping, organizations can prepare themselves for the assessment and pre-check their own systems against the testing procedures as defined in v2.0 of the PCI DSS. Implementing the 5 steps of information- and people-centric approaches outlined by Diana Kelley, Principal Analyst at SecurityCurve, in her latest paper “Practical Guide to Improving PCI Compliance Posture” will help ease the compliance burden.
It is a fact of life that the IT department is a necessary yet costly part of today’s small and midsize businesses (SMBs). Many SMBs have reduced the size of the IT department to the point where costs cannot seemingly be cut any further. The result of these cuts is that service has been severely degraded, customer satisfaction is down, and the real value of IT to the business is being questioned. And still SMB IT leaders are being asked to do much more with much less. How does an IT department cope with these ever increasing demands and diminishing budgets?
Smart SMB CIOs are leveraging the Expertise-as-a-Service® (EaaS™) model to transform their organizations. Legal and finance departments have leveraged outside counsel and accounting firms for decades, with the IT department being one of the last of the major departments within the business to move to this low-fixed-cost model. Taking a page from the legal and finance departments’ “playbooks,” EaaS is used as an extension of the IT department. EaaS brings cost savings by enabling IT to reduce and reallocate in-house resources more effectively, while retaining on-demand access to scalable high quality expertise, information, and performance measurement. EaaS gives IT the ability to quickly adjust to changing business goals and drivers, encourage innovation, and increase productivity while reducing fixed costs.
Enterprise Digital Assistants: How they can support you in your Credit, Colle...emagia
What are Enterprise Digital Assistants. Digital Assistants For Credit Operations. Digital Assistants For Collections Operations. Digital Assistants For Cash Application. Planning for Your OTC Operations.
https://www.emagia.com/resources/ebooks/enterprise-digital-assistants-can-support-credit-collections-cash-application-operations/
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
Vast amounts of your organization's sensitive data are accessible, stored, and used by authorized employees and partners on a host of devices and servers. Protecting that data where ever it is stored or travels is a top priority.
We've all seen the SD-WAN 101 - combatting jitter, latency and packet loss. But here's what your customers are REALLY up against today. These are the use cases they want you to talk to them about.
Preparing Your Customer's Network for the Work from Home TransitionQOS Networks
With the mass transition to at-home workers, customers are forced to quickly adjust or even overhaul their network policies and technology to prepare. With many remote staff that will likely continue to stay working at home, how do you talk about the short and long term network strategy?
UCloud Asia Pte Ltd was founded Nov 2016 and will bring over Venture Domain Hosting with over 15 years in business as the hosting division providing Managed Hosting services, cloud hosting, VPS hosting, Microsoft Office365, domain name registration.
Vision: To build a company with sustainable growth, providing exceptional customer service and satisfaction via happy and motivated international team.
Mission: We strive to continually simplify scalable technology in order to solve business problems.
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Pte Ltd
SME faced massive attack from hacker and phishing attack in the year 2007, many well-known establishments was attacked and paid a high price to recover both monetary and reputation.
Do not be the next target, armed yourself with the knowledge to prevent.
How can Enterprise Email Security and Enterprise File Security protect compan...UCloud Asia Pte Ltd
A STUDY has found that one in three small and medium-sized enterprises (SMEs) in Singapore have experienced a ransomware attack in the last year.
About 21 per cent of those who had been hit by ransomware had to cease all business operations immediately, while 11 per cent lost revenue as a direct result of the attack.
How can Enterprise Email Security and Enterprise File Security protect your company from Ransomware attack?
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
When organisations today connect digitally and the concept of a network is found to be fast disappearing. Mobile and Cloud solutions are being enabled across the enterprise to aid digital agendas. Calls for agility by the business are driving CIOs and CISOs to look for effective trust-based service enablement models that can help cater to business demand.
Read "Asset intelligence: What it is and why it is critical now" and read how innovative organisations are maximising return on assets and extending their competitive edge.
Please note this is an extract only. To download the complete article go to:
http://www.assetdna.com/content/industry-whitepaper
Le slide riassumono i risultati rilevati con diversi strumenti di valutazione automatica dell'accessibilità del sito web del Comune di Monteriggioni (SI), riportando per ciascuna pagina i problemi riscontrati nel rispetto delle guidelines WCAG 2, livello conformità AA.
La presentazione è stata creata ai fini dell'esercitazione per il Corso di Progettazione di Interfacce e Valutazione dell'Usabilità, Prof. Fabio Paternò, Università di Pisa.
We've all seen the SD-WAN 101 - combatting jitter, latency and packet loss. But here's what your customers are REALLY up against today. These are the use cases they want you to talk to them about.
Preparing Your Customer's Network for the Work from Home TransitionQOS Networks
With the mass transition to at-home workers, customers are forced to quickly adjust or even overhaul their network policies and technology to prepare. With many remote staff that will likely continue to stay working at home, how do you talk about the short and long term network strategy?
UCloud Asia Pte Ltd was founded Nov 2016 and will bring over Venture Domain Hosting with over 15 years in business as the hosting division providing Managed Hosting services, cloud hosting, VPS hosting, Microsoft Office365, domain name registration.
Vision: To build a company with sustainable growth, providing exceptional customer service and satisfaction via happy and motivated international team.
Mission: We strive to continually simplify scalable technology in order to solve business problems.
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Pte Ltd
SME faced massive attack from hacker and phishing attack in the year 2007, many well-known establishments was attacked and paid a high price to recover both monetary and reputation.
Do not be the next target, armed yourself with the knowledge to prevent.
How can Enterprise Email Security and Enterprise File Security protect compan...UCloud Asia Pte Ltd
A STUDY has found that one in three small and medium-sized enterprises (SMEs) in Singapore have experienced a ransomware attack in the last year.
About 21 per cent of those who had been hit by ransomware had to cease all business operations immediately, while 11 per cent lost revenue as a direct result of the attack.
How can Enterprise Email Security and Enterprise File Security protect your company from Ransomware attack?
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
When organisations today connect digitally and the concept of a network is found to be fast disappearing. Mobile and Cloud solutions are being enabled across the enterprise to aid digital agendas. Calls for agility by the business are driving CIOs and CISOs to look for effective trust-based service enablement models that can help cater to business demand.
Read "Asset intelligence: What it is and why it is critical now" and read how innovative organisations are maximising return on assets and extending their competitive edge.
Please note this is an extract only. To download the complete article go to:
http://www.assetdna.com/content/industry-whitepaper
Le slide riassumono i risultati rilevati con diversi strumenti di valutazione automatica dell'accessibilità del sito web del Comune di Monteriggioni (SI), riportando per ciascuna pagina i problemi riscontrati nel rispetto delle guidelines WCAG 2, livello conformità AA.
La presentazione è stata creata ai fini dell'esercitazione per il Corso di Progettazione di Interfacce e Valutazione dell'Usabilità, Prof. Fabio Paternò, Università di Pisa.
Enhanced Morphological Contour Representation and Reconstruction using Line S...CSCJournals
The paper proposes an enhanced morphological contour/edge representation algorithm for the representation of 2D binary shapes of digital images. The concise representation algorithm uses representative lines of different sizes and types to cover all the significant features of the binary contour/edge image. These well characterized representative line segments, which may overlap among different types, take minimum representative points than that of most other prominent shape representation algorithms including MST and MSD. The new algorithm is computationally efficient than most other algorithms in the literature and is also capable of approximating edge images. The approximated outputs produced by the proposed algorithm by using minimal number of representative points are more natural to the original shapes than that of MST and MSD.
Una presentación fotográfica de " El Correo.com" si quieres verlas directamente de la web accede a:
http://www.elcorreo.com/fotos/sociedad/201601/18/nomadas-sobre-nieve-30122831653617-mm.html
Cygnet Infotech is a Microsoft and Oracle Gold Certified Partner with CMMi Level 3, ISO 9001 and ISO 27001 accreditation. We are providing Custom Software Development and IT solution services since last 14+ years and we have clients across 25+ countries worldwide.
Vmoksha technologies corporate overview. This will give insight about our core services offerings, people, culture, vision, mission, client, contacts etc.
Call or Text: (800) 340-8115
Experience Sourcing-as-a-Service
The current state of U.S. businesses is faced with challenges and responses that our providers have seen among customers. Work with one of our technology advisors to ensure you know what options exist to develop a framework for adapting to uncertainty. Learn what Technology Source and its providers are offering to help businesses adapt to these challenging times.
Our commitment to relationships, state-of-the-art tools, breakthrough strategies and ongoing training helps us to deliver solutions that will meet or exceed all of your business requirements. We focus on helping our business and enterprise customers find the best solutions at the best prices available from our portfolio of 200 providers worldwide.
Google Workspace can access your organization's exact needs. From creating an email domain that corresponds to the name of your organization, to setting up specific applications and access security gap to ensure the right people can access your information.
Microsoft Azure is a cloud computing service developed by Microsoft for developing, testing, deploying, and managing applications and services through Microsoft-managed data centres. It offers software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS), and it supports a wide range of programming languages, tools, and frameworks, including Microsoft-developed and third-party software. Azure uses large-scale virtualization in Microsoft data centres across the world and provides over 600 services.
https://www.cloudfence.ai/azure
Google Cloud Platform (GCP) is part of Google Cloud, which also includes Google Workspace (G Suite), enterprise versions of Android and Chrome OS, and application programming interfaces (APIs) for machine learning and enterprise mapping services.
https://www.cloudfence.ai/gcp
Microsoft Azure is a cloud computing service developed by Microsoft for developing, testing, deploying, and managing applications and services through Microsoft-managed data centres. It offers software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS), and it supports a wide range of programming languages, tools, and frameworks, including Microsoft-developed and third-party software. Azure uses large-scale virtualization in Microsoft data centres across the world and provides over 600 services.
https://www.cloudfence.ai/azure
We offer the flexibility to migrate, build, & optimize apps across hybrid & multi-cloud environments. We are best Cloud, SaaS, CloudSec & Cyber service provider.
CloudFence has been working with Amazon Web Services in Delhi NCR to help customers take full advantage of Cloud technology. AWS Services and solutions.
Microsoft office 365 is a suite of apps that help you stay connected and get things done. It always been the go-to solution to assist you in pursuing your passion while also running your business. It offers cloud computing solutions that enable business functions to be remotely accessed and collaborated on in real time
1. S O L U T I O N S & S E R V I C E S
Veeras Infotek Private Limited
Accelerating Business Value
2. We are in the business of Information Technology (IT)
System Integration,
improving IT response to business.
Accelerating Business Value
3. Veeras….?
We Manage
o Hundreds of Perimeter Security Devices
o Over 15000 Virtual Desktops
o Over 10000 Virtual Hosts
o Over 12500 Endpoints on our Infrastructure
management Services
o Over 25000 users on the cloud
o 100’s of TB’s on backup and high availability
o Over 2 Petabyte of Storage
o Over half million endpoints on Security
We help improve IT related organization productivity by 20%, and optimize
utilization by over 30%, thereby reducing IT maintenance budgets & increasing
spend on innovation.
4. Uniqueness…
We focus on effective IT rather than just efficient IT – an approach driven
by innovation, expertise and best practices to achieve a minimum of 20%
ROI
Business Value based Engagement
o Your Profitability our Success
Right Sized Technology | Licensing | Investment |
o Optimization our DNA
Condensed Experience of 21 years
o Expertise Delivered
Stable, Genuine and Honest people to work with
o Your Trust, Our Wealth
5. We deliver .…You get….
We deliver measurable outcomes that have a direct bearing on the
profitability of organizations specializing in increasing productivity by
36% and a definitive ROI within 3 years.
Reduce IT CAPEX by 50% and OPEX by 36% through efficiency in
delivery that provide advantages in releasing critical resources for
other highly productive tasks.
With consistent delivery of IT services, we can transform your
information technology investments into a competitive advantage, we
help you achieve highest return of investments (ROI) and the lowest total
cost of ownership (TCO) of any similar engagements.
7. Team @ Veeras
120 certified skilled engineers on-board across various technologies
Won the award for the Best Partner on Business Competency for
Asia pacific Japan from VMware in 2013
Won the award for the Best Solution Provider Partner for Asia Pacific
Japan from Vmware in 2015
Won the award for the Best Solution Provider Partner in Asia Pacific
Japan from VMware in 2015.
Only partner in India with virtualization specialization from NetApp
Over 100 man years of experience across the top management of
the company
Accelerating Business Value
8. Veeras Consulting
solutions combine
powerful technology,
expert consulting
services and training
to meet your
business challenges
and goals.• Build the
Solution
Architecture
that will
indicate
whether
business
objectives
will be met
•Develop and
implement cost
effective
procedures
powered by
Analytics to
evaluate the
persuasive
factors
• Business
Impact
Prioritization
, timelines,
Evaluation
Plan
documentati
on
• Understand &
Evaluate
Business
Objectives and
related IT
objectives.
1. Identify
Business / IT
Imperatives
2. Qualify and
Prioritize
3. Build ROI,
Architecture,
Solution
4. Implement
and Manage
Our Approach
10. “Solutions & Services Overview”
Business Assurance
Storage, DR & Backup
Enterprise Security
Virtualization & Private Cloud
IT Infrastructure Management
IT Maintenance Services
Communication & Collaboration
Accelerating Business Value
11. “Solutions & Services Overview”
Business Assurance
Storage, DR & Backup
Enterprise Security
Virtualization & Private Cloud
IT Infrastructure Management
IT Maintenance Services
Communication & Collaboration
Accelerating Business Value
Internal Audit through Data Analysis
Periodical Reviews of 100 % Transactional data
Internal Control and Self-Assessment of Process
Fraud Detection and Prevention
Enterprise Risk Management Process , Analysis , and Mitigation
Manage and Automate Continuous Auditing, Monitoring and Assurance
Corporate Assurance and Governance
12. “Solutions & Services Overview”
Business Assurance
Storage, DR & Backup
Enterprise Security
Virtualization & Private Cloud
IT Infrastructure Management
IT Maintenance Services
Communication & Collaboration
Accelerating Business Value
Policy Design – Setting up the procedure and guidelines by defining policies.
Availability Implementation
Failover
Cluster
Backup Primary / Secondary
Near Site, Remote DR
DtoT, DtoD
13. “Solutions & Services Overview”
Business Assurance
Storage, DR & Backup
Enterprise Security
Virtualization & Private Cloud
IT Infrastructure Management
IT Maintenance Services
Communication & Collaboration
Accelerating Business Value
14. “Enterprise Security”…360° approach
End Point
Layer
Patch Management
Anti Virus
Desktop Firewall
Disk Encryption
Host DLP
Known Security vulnerability in Popular Apps and OS
Known malware signature
Block untrusted ports and application.
Data theft, lost laptop, USB device etc.
Prevent accidental / intentional confidential file leakage
15. “Enterprise Security”…360° approach
End Point
Layer
Patch Management, Antivirus, Host DLP, Disk Encryption, Desktop
Firewall
Network
Layer NAC
IPS/IDS
Allow and control only authorized devices to corporate network, BYOD risk mitigation
Detect , Prevent unwanted, malicious network attack ( Zero day attack)
16. “Enterprise Security”…360° approach
End Point
Layer
Patch Management, Antivirus, Host DLP, Disk Encryption, Desktop
Firewall
Gateway
IPSEC VPN
Messaging security
G/W IAM
Web Security
N/W DLP
Site2Site VPN and Client 2 Site VPN
Antispam, Email based viruses, Phishing and spoofing attack, inbound and
outbound prevention
Two factor authentication , Tokens
Employee/ Device internet usage policy and malware site access control
To Identify, classify and prevent confidential data leakage in devices that are
not covered by Host DLP agent, e.g andriod, Ipad,Linux , NON-MS O/S etc
UTM
NXT GEN Firewall
SPI Firewall , G/W Antivirus, IPS, CFS, Multiple ISP , Antispam
Firewall, G/W antivirus, CFS, APT , Web Application content Policy inspection
and prevention
Network
Layer
NAC / IDS
17. “Enterprise Security”…360° approach
End Point
Layer
Patch Management, Antivirus, Host DLP, Disk Encryption, Desktop
Firewall
Gateway
UTM, NXT GEN Firewall, IPSEC VPN, Messaging security, G/W IAM, Web Security,
N/W DLP
Application
SSL-VPN
WAF
IAM
Data Base Security
Database Auditing
To establish SSL connection to internally hosted
webservers
To protect internal webserver against , Remote Code
execution , zero day , injection, de-phasing attacks.
Identity and Access management Access control ,
password management auditing , recording and SoD
policy enforcement.
Database monitoring , Access control enforcement ,
logging, SoD , Behaviour, signature, anomaly detection
Database data anomaly detection and audit trial.
Network
Layer
NAC / IDS
18. “Enterprise Security”…360° approach
End Point
Layer
Patch Management, Antivirus, Host DLP, Disk Encryption, Desktop
Firewall
Network
Layer
NAC / IDS
Gateway
UTM, NXT GEN Firewall, IPSEC VPN, Messaging security, G/W IAM, Web Security,
N/W DLP
Application SSL-VPN, WAF, IAM, Data Base Security, Database Auditing
Compliance
Data disposal
Event Logging
SIEM and Correlation
Regulatory
Degauzzer and safe data erasers
Consolidate Log from all I.T Equipments
Security Incident and event management and correlation engines.
PCI-DSS, HIPAA standardized out of the box reporting and ongoing
compliance alerting.
19. “Enterprise Security”…360° approach
End Point
Layer
Patch Management, Antivirus, Host DLP, Disk Encryption, Desktop
Firewall
Network
Layer
NAC / IDS
Gateway
UTM, NXT GEN Firewall, IPSEC VPN, Messaging security, G/W IAM, Web Security,
N/W DLP
Application SSL-VPN, WAF, IAM, Data Base Security, Database Auditing
Compliance Data disposal, Event Logging, SIEM and Correlation, Regulatory
Risk
Analysis
Security
Audits
Security
Policy
Web appli’n
Security
Managed
SecurityIT Infra
Audit
VA/PT
Security Architecture
Design &
Implementation
20. “Solutions & Services Overview”
Business Assurance
Storage, DR & Backup
Enterprise Security
Virtualization & Private Cloud
IT Infrastructure Management
IT Maintenance Services
Communication & Collaboration
Accelerating Business Value
Architecting, Consulting on virtualization & consolidation
• Capacity planning Consulting
• Architect the virtualization solutions
• DR/ BCP/ Backup & recovery
• Storage Management
Automation of virtual environments
• Cloud Management Platform
• Provisioning and Orchestration
Audit, analyze, advise & Fine-tune existing Virtualized infrastructure
Agreed Periodical Health-check on the current virtual infrastructure
Hybrid Cloud Management & Integration
21. “Solutions & Services Overview”
Business Assurance
Storage, DR & Backup
Enterprise Security
Virtualization & Private Cloud
IT Infrastructure Management
IT Maintenance Services
Communication & Collaboration
Accelerating Business Value
End User Computing
Help Desk Support
Centralized Desktop Management
Desktop Applications Support
Datacenter Services
Systems Management
Database Management
Storage & Backup
Managed messaging services
Network Services
Network Monitoring
Network Management
Network Engineering
22. “Solutions & Services Overview”
Business Assurance
Storage, DR & Backup
Enterprise Security
Virtualization & Private Cloud
IT Infrastructure Management
IT Maintenance Services
Communication & Collaboration
Accelerating Business Value
Maintenance management
Vendor coordination, maintenance transition and delivery
management for vendors
Repair coordination
Multiple service provider management in a single contract,
with a single point of accountability
Asset management
Inventory, compliance
Administration
Help desk interface for problem reporting, tracking and
measurement
23. “Solutions & Services Overview”
Business Assurance
Storage, DR & Backup
Enterprise Security
Virtualization & Private Cloud
IT Infrastructure Management
IT Maintenance Services
Communication & Collaboration
Accelerating Business Value
Core Infrastructure Services
Desktop
Identity and Authentication
Management
Server Platform
Business productivity Services
Communications
Content Management
Messaging
Portals and Collaboration
Project and Portfolio Management
Search
Cross Platform Services
Software Asset Management
Volume Licensing
Mobility
24. Transforming
analytics leading to
business processes
re-engineering
through effective
monitoring system.
Astute domain
knowledge across
many industries
Trusted IT Solution
provider for more
than two decades
Veeras Consulting team helps deliver business value though our data analytics services.
Our team carries the depth of expertise across multiple domains to identify, qualify, report and mitigate exceptions,
anomalies and fraud directly impacting your company’s credibility, corporate governance and profitability.
Our strengths
25. What do our customer talk about us?
Reliable partner who maintains the relationship and who has helped us to lower our CAPEX
by 50%.
Helped us to redesign our technology infrastructure so that it is more responsive to the
business than ever before
Reachable, reliable, responsible, and retain the trust.
Experienced an ROI of 20% to 1000% impacting between 200,000 USD to 12,000,000 USD
Our customers consider us as their trusted partner who can give them definite value in
achieving their business goals.
o Customer A: Saved 12,000,000 USD on a 83,000 USD investment through business
analytics and fraud detection solution
o Customer B: Saved 60,000 USD on a 200,000 USD investment through storage
consolidation solution
o Customer C: Brought down the OPEX by 50% over a period of last 3 years through server
consolidation solution.