SlideShare a Scribd company logo
CON2 EE - THIS COMMUNICATION IS CONFIDENTIAL TO MBNL, EE & NAMED SUPPLIERS ONLY
Solutions include:
o Outcome based management services
o Robotic Process Automation
o Oracle
o Digital workplace
o Experience services
o Managed Commerce services
o Advanced Data Warehousing
Zensar
CON2 EE - THIS COMMUNICATION IS CONFIDENTIAL TO MBNL, EE & NAMED SUPPLIERS ONLY
.com and .consulting domains
oEnables clients to quickly locate firms
with consulting practices
oCan differentiate consulting from
service operations within global firms
o.consulting domain name is popular
with prestige firms
Consulting differentiation
CON2 EE - THIS COMMUNICATION IS CONFIDENTIAL TO MBNL, EE & NAMED SUPPLIERS ONLY
o Accenture.consulting
o Bain.consulting
o Bearingpoint.consulting
o Capgemini.consulting
o Cognizant.consulting
o Deloitte.consulting
o Gartner.consulting
Firms with .consulting domans
o HCL.consulting
o Kearney.consulting
o KPMG.com
o IBM.consulting
o Infosys.consulting
o Mckinsey.consulting
o PWC.consulting
CON2 EE - THIS COMMUNICATION IS CONFIDENTIAL TO MBNL, EE & NAMED SUPPLIERS ONLY
Offering
ozensar.consulting domain name is for sale
ocontact Martin Boyle
omboyle@it-per.com
zensar.consulting

More Related Content

Similar to Zensar Consulting

ISG-ONE Consulting
ISG-ONE ConsultingISG-ONE Consulting
ISG-ONE Consulting
mboyle
 
Genpact Consulting
Genpact ConsultingGenpact Consulting
Genpact Consulting
mboyle
 
Mastek Consulting
Mastek ConsultingMastek Consulting
Mastek Consulting
mboyle
 
Unisys Consulting
Unisys ConsultingUnisys Consulting
Unisys Consulting
mboyle
 
Alixpartners Consulting
Alixpartners ConsultingAlixpartners Consulting
Alixpartners Consulting
mboyle
 
Nttdata Consulting
Nttdata ConsultingNttdata Consulting
Nttdata Consulting
mboyle
 
Perficient Consulting
Perficient ConsultingPerficient Consulting
Perficient Consulting
mboyle
 
Getronics Consulting
Getronics ConsultingGetronics Consulting
Getronics Consulting
mboyle
 
Lntinfotech Consulting
Lntinfotech ConsultingLntinfotech Consulting
Lntinfotech Consulting
mboyle
 
Simon Kucher Consulting
Simon Kucher ConsultingSimon Kucher Consulting
Simon Kucher Consulting
mboyle
 
Horvath Partners Consulting
Horvath Partners ConsultingHorvath Partners Consulting
Horvath Partners Consulting
mboyle
 
Strategyand Consulting
Strategyand ConsultingStrategyand Consulting
Strategyand Consulting
mboyle
 
Technology Source Cybersecurity Focus
Technology Source Cybersecurity FocusTechnology Source Cybersecurity Focus
Technology Source Cybersecurity Focus
TechnologySource
 
K2 Partnering Solutions Presentation
K2 Partnering Solutions   PresentationK2 Partnering Solutions   Presentation
K2 Partnering Solutions PresentationBrookeL
 
K2 Partnering Solutions Presentation
K2 Partnering Solutions PresentationK2 Partnering Solutions Presentation
K2 Partnering Solutions Presentationo_miquel
 
Crosstar Presentation1
Crosstar Presentation1Crosstar Presentation1
Crosstar Presentation1yanksman1
 
About Management Consulting
About Management ConsultingAbout Management Consulting
About Management Consulting
Deepak Pareek
 
Melbourne IT - iStrategy Atlanta
Melbourne IT - iStrategy AtlantaMelbourne IT - iStrategy Atlanta
Melbourne IT - iStrategy AtlantaiStrategy
 
Cleared Job Fair Job Seeker Handbook May 10, 2012, Crystal City, VA
Cleared Job Fair Job Seeker Handbook May 10, 2012, Crystal City, VACleared Job Fair Job Seeker Handbook May 10, 2012, Crystal City, VA
Cleared Job Fair Job Seeker Handbook May 10, 2012, Crystal City, VA
ClearedJobs.Net
 

Similar to Zensar Consulting (20)

ISG-ONE Consulting
ISG-ONE ConsultingISG-ONE Consulting
ISG-ONE Consulting
 
Genpact Consulting
Genpact ConsultingGenpact Consulting
Genpact Consulting
 
Mastek Consulting
Mastek ConsultingMastek Consulting
Mastek Consulting
 
Unisys Consulting
Unisys ConsultingUnisys Consulting
Unisys Consulting
 
Alixpartners Consulting
Alixpartners ConsultingAlixpartners Consulting
Alixpartners Consulting
 
Nttdata Consulting
Nttdata ConsultingNttdata Consulting
Nttdata Consulting
 
Perficient Consulting
Perficient ConsultingPerficient Consulting
Perficient Consulting
 
Getronics Consulting
Getronics ConsultingGetronics Consulting
Getronics Consulting
 
Lntinfotech Consulting
Lntinfotech ConsultingLntinfotech Consulting
Lntinfotech Consulting
 
Simon Kucher Consulting
Simon Kucher ConsultingSimon Kucher Consulting
Simon Kucher Consulting
 
Horvath Partners Consulting
Horvath Partners ConsultingHorvath Partners Consulting
Horvath Partners Consulting
 
Strategyand Consulting
Strategyand ConsultingStrategyand Consulting
Strategyand Consulting
 
Technology Source Cybersecurity Focus
Technology Source Cybersecurity FocusTechnology Source Cybersecurity Focus
Technology Source Cybersecurity Focus
 
Denovo Company Intro 4.27.16-4
Denovo Company Intro 4.27.16-4Denovo Company Intro 4.27.16-4
Denovo Company Intro 4.27.16-4
 
K2 Partnering Solutions Presentation
K2 Partnering Solutions   PresentationK2 Partnering Solutions   Presentation
K2 Partnering Solutions Presentation
 
K2 Partnering Solutions Presentation
K2 Partnering Solutions PresentationK2 Partnering Solutions Presentation
K2 Partnering Solutions Presentation
 
Crosstar Presentation1
Crosstar Presentation1Crosstar Presentation1
Crosstar Presentation1
 
About Management Consulting
About Management ConsultingAbout Management Consulting
About Management Consulting
 
Melbourne IT - iStrategy Atlanta
Melbourne IT - iStrategy AtlantaMelbourne IT - iStrategy Atlanta
Melbourne IT - iStrategy Atlanta
 
Cleared Job Fair Job Seeker Handbook May 10, 2012, Crystal City, VA
Cleared Job Fair Job Seeker Handbook May 10, 2012, Crystal City, VACleared Job Fair Job Seeker Handbook May 10, 2012, Crystal City, VA
Cleared Job Fair Job Seeker Handbook May 10, 2012, Crystal City, VA
 

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

Zensar Consulting

  • 1. CON2 EE - THIS COMMUNICATION IS CONFIDENTIAL TO MBNL, EE & NAMED SUPPLIERS ONLY Solutions include: o Outcome based management services o Robotic Process Automation o Oracle o Digital workplace o Experience services o Managed Commerce services o Advanced Data Warehousing Zensar
  • 2. CON2 EE - THIS COMMUNICATION IS CONFIDENTIAL TO MBNL, EE & NAMED SUPPLIERS ONLY .com and .consulting domains oEnables clients to quickly locate firms with consulting practices oCan differentiate consulting from service operations within global firms o.consulting domain name is popular with prestige firms Consulting differentiation
  • 3. CON2 EE - THIS COMMUNICATION IS CONFIDENTIAL TO MBNL, EE & NAMED SUPPLIERS ONLY o Accenture.consulting o Bain.consulting o Bearingpoint.consulting o Capgemini.consulting o Cognizant.consulting o Deloitte.consulting o Gartner.consulting Firms with .consulting domans o HCL.consulting o Kearney.consulting o KPMG.com o IBM.consulting o Infosys.consulting o Mckinsey.consulting o PWC.consulting
  • 4. CON2 EE - THIS COMMUNICATION IS CONFIDENTIAL TO MBNL, EE & NAMED SUPPLIERS ONLY Offering ozensar.consulting domain name is for sale ocontact Martin Boyle omboyle@it-per.com zensar.consulting