Oracle ERP Cloud EPM
Wipro will support the customers in implementing the following Oracle EPM Cloud Services by adopting Zoom to Cloud & Business First Methodologies:
• Enterprise Planning
• Profitability and Cost Management
• Narrative Reporting
• Financial Consolidation and Close
• Account Reconciliation
• Tax Reporting
• Enterprise Data Management
Features
- End to End EPM Cloud solution
- End to End business and system integration
- Advanced automation solutions
- Analytics & Business Intelligence Reports & Dashboards
- Data Visualization Services
- End to End Integration
- Fixed Price and T&M Models of pricing
- Application Implementation and maintenance support
- Wipro IP EPM solutions
- Flex and Hybrid support model offering 24/7 support
Benefits
- Optimize Standard Business process and reduced Investment and operational Cost
- Hybrid integration support to leverage existing investments towards on-premise/cloud applications
- Configurable advance automation process using next generation technology
- Jumpstart out-of-the-box reports usage and configurable reporting solution
- Advance value added service to transform data to support decisions
- Cloud support hybrid integration which supports Cloud-to-Cloud or Cloud-on-Onpremise
- Our services are highly customizable to client requirement
- proven hybrid team support implementation and support maintenance activities
- Reduce implementation time and efforts and increase user adaptability
- Global Foot print and seamless support on business critical applications
Pricing
£120 to £1,300 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
2 6 4 3 1 3 7 0 4 0 2 5 3 9 6
Contact
WIPRO HOLDINGS (UK) LIMITED
Wipro-Public Sector UK
Telephone: 44-7773194424
Email: publicsector-uki@wipro.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
Our services are extended for platforms like Oracle, SAP, JDE and other services.
Our services are an extension of other services as we take up the entire implementation, customization, upgrading and maintenance of software's after the client purchases their license. However, our services can also be used as standalone facility. - Cloud deployment model
- Hybrid cloud
- Service constraints
- Our service does not have any constraints
- System requirements
-
- Web Browser on Device
- Chrome, Firefox, Edge, or Safari
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- As per the client business requirements and Service Level Agreement(SLA) contract signed with the client. Example: For some clients, urgent priority issues (P1/P2) are responded within 30 mins and resolved within 2-4 hours.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- N/A
- Onsite support
- Onsite support
- Support levels
-
Wipro offers L1.5, L2 and L3 Support. Below is a snapshot on these levels.
L1.5 Support: Monitoring and Reporting. Tracking of Incidents.
L2 Support: Incidents and Service Requests. Review and Participate.
L3 Support: Problem Management. Coordinating and preparing SLA’s with Wipro - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Oracle provides elaborate user guides and training on Cloud products and features online.
Wipro offers different types of training and documentation support to help the users as follows:
• Train the Trainer approach
• On-the Job Training through early engagements and app review workshops
• Process and system overview by functional experts
• Building internal training support
• Walkthroughs and dry run of training content
• Wipro also provides Crystal – A client collaboration portal as a value add for our clients
• Wipro will regularly maintain documentation of standards, processes, procedures, inventories, run books, etc. to support the services.
• Develop and maintain documentation on all Operations procedures, services, equipment and software for the applications in scope through System Maintenance Technical Document (SMTD) and the Execution Process Document (EPD).
• Document procedures wherever quality improvements can be made.
• Make all documentation available in paper copies and electronically, and, wherever possible, use documentation that is web-enabled for access by Enbridge and its agents.
• Conduct annual auditing of documentation for completeness and accuracy and verifying that all documentation is present, organized, readable, and updated. - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Word
- Powerpoint
- Excel
- End-of-contract data extraction
- The data will be stored on Oracle servers and the data extraction and removal criteria will be the standard policy followed by Oracle globally. Oracle provides numerous tools and techniques to retrieve data like OBIEE Reports, HCM Extracts, API etc.
- End-of-contract process
- The data will be stored on Oracle servers and the data extraction and removal criteria will be the standard policy followed by Oracle globally. Oracle provides numerous tools and techniques to retrieve data like OBIEE Reports, HCM Extracts, API etc.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No difference in functionality and experience. Limited features will be available in mobile services.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- WCAG 2.1 AA standards and EN 301 549 Accessibility requirements
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- WCAG 2.1 AA standards and EN 301 549 Accessibility requirements
- API
- Yes
- What users can and can't do using the API
-
Oracle REST APIs can be used to view and manage data stored in Oracle Cloud. APIs can be used for Integration, Import & Extract Data.
REST API's are used for Oracle Integration to automate business processes and integrate applications in Oracle Cloud. These REST APIs apply to all Oracle Integration instances irrespective of the edition, what features or who manages cloud environment. We will be able to find all the resources needed in this REST API for Oracle Integration. - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Oracle Cloud SaaS applications can be accessible through web browser and based on user roles the same can be configured, this can further be customizable based on user preference which including, configuration, look and feel, custom navigation flows, work flow process etc.,
Scaling
- Independence of resources
- Data is stored on the Oracle Cloud. Oracle policies ensure users are not affected by the demand other users are placing on our service.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Oracle can provide application metrics - if they are included as part of the implementation contract. These will monitor the transactions getting created, processed and completed. Infrastructure related metrics would be available from Oracle.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Oracle Corporation
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
-
• Oracle Transparent Data Encryption (TDE) enables to encrypt sensitive data that is stored in tables and tablespaces.
• After the data is encrypted, this data is transparently decrypted for authorized users or applications when they access this data.
• TDE helps protect data stored on media (also called data at rest) in the event that the storage media or data file is stolen.
• Transparent Data Encryption (TDE) ensures that sensitive data is encrypted, meets compliance, and provides functionality that streamlines encryption operations. - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Oracle SaaS data can be exported as flat file formats.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- Excel
- Word
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- CSV
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
Oracle Cloud Services maintains a redundant and resilient infrastructure designed to maintain high levels of availability. Commencing at Oracle’s activation of Your production Oracle Cloud Service, Oracle works to meet the Target Service Availability Level, or Target Service Uptime, of 99.5%.
For more detailed information please refer to Oracle Cloud Hosting and Delivery Policies.
https://www.oracle.com/corporate/contracts/cloud-services/hosting-delivery-policies.html#hd - Approach to resilience
-
Please refer to Oracle Cloud Hosting and Delivery Policies.
https://www.oracle.com/corporate/contracts/cloud-services/hosting-delivery-policies.html#hd - Outage reporting
-
Please refer to Oracle Cloud Hosting and Delivery Policies.
https://www.oracle.com/corporate/contracts/cloud-services/hosting-delivery-policies.html#hd
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
- Oracle Cloud supports various authentication mechanisms through which the user gets access to the services.
- Access restrictions in management interfaces and support channels
-
Oracle Cloud follows the Role Based Access Control (RBAC) security standards for user management and this provides capabilities to grant or restrict access to the desired application objects by role. A wide spectrum of enterprise roles is pre-delivered, and any variation of these roles can be adjusted or defined with the security model.
Relying on a high level of granularity, custom-users, roles, groups, and permissions/responsibilities can be created/managed through the administrative tools, as well as what can or cannot be seen in any page or at field level based on the roles being defined for any given business process. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UKAS Management Systems
- ISO/IEC 27001 accreditation date
- 16/09/2020
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- N/A
- PCI DSS accreditation date
- N/A
- What the PCI DSS doesn’t cover
- N/A
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- SO 9001:2015 - Quality Management System Standards
- ISO 14001:2015 - Environmental Management Standards
- ISO/IEC 20000- 1:2018 - IT Service Management System Standards
- CMMI-DEV - Software Process Improvement
- CMMI-SVC - Services with Supplier Agreement Management
- ISO 45001:2018 - Occupational Health and Safety System Standards
- ISO 22301:2019 - Business Continuity Management System Standard
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Wipro is certified for ISO 27001:2013 standard for information security practices inclusive of physical security & employee safety, which is valid till 18-Sep-2023.
The Information security policy ensures that the management establishes an information security management process to address the information security risk requirements. This policy ensures to build trust and resilience into Wipro's cyber ecosystem that enables our business with Confidentiality, Integrity and Availability of information while maintaining privacy and accountability to the information that is entrusted within the organization. Some of the objectives are as follows.
. Set direction in achieving safe and secure environment and security of information
. To maintain high awareness levels of security policies
. Comply with legal, regulatory, compliance and contractual requirements
. Prevention and detection of breaches and violations
. Detect, prevent and manage security incidents
. Protect client and Wipro IP
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Configuration Management Process:
Wipro will implement best practices like Creating standards, Maintain documentation, Configuration integrity checks, Configuration upgrade procedure, Configuration version control system to improve Configuration Management.
Change Management Process:
Wipro will bring in best practices from ITIL Change Management Process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes. Our focus is to minimize the risk to and the impact of changes on the environment and while improving service quality. The ITIL V4 aligned Change Management Process by Wipro will be organized into phases which represent high-level activities in implementing changes. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Wipro works with its Cloud partner Oracle to utilize network vulnerability assessment tools to identify security threats and vulnerabilities. Formal procedures are in place to assess, validate, prioritize, and remediate identified issues. Oracle subscribes to vulnerability notification systems to stay apprised of security incidents, advisories, and other related information. Oracle takes actions on the notification of a threat or risk once confirmed that a valid risk exists, that the recommended changes are applicable to service environments, and the changes will not otherwise adversely affect the services.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Wipro works with its Cloud partner Oracle to utilize protective monitoring tools to identify potential compromises. Formal procedures are in place to assess, validate, prioritize, and remediate identified compromises. Monitoring information is used to continually tune the environment and improve application performance with all system changes made by Oracle in the standard maintenance windows. Monitoring systems and data are accessed only by authorized individuals and teams with the operational responsibility for monitoring.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We have SIEM (Security Incident and Event Monitoring) tool in place which monitors all major network and select compute devices for any suspicious activity matching its comprehensive database of suspicious traffic patterns. Alerts get triggered and our 24x7 SIEM teams investigate into these alerts. They cut out the false positives and focus only on the suspicious cases. They then log a ticket and investigate further based on standard operating procedures. If the system/application owner finds any security related suspicious activities based on the log files reviews, it is immediately reported as per the procedures defined in Security Incident Management procedures.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Our carbon inventory and reduction plans are as per ISO14064. The Net Zero Emissions Coalition is a group of leading companies committed to achieving net zero carbon emissions by 2050. The coalition has a 5-year plan to transition to net zero through business transformation, collective action and enabling systems change. Wipro is a part of this coalition and will engage with a wide set of stakeholders, create deliverables, and prioritize efforts to generate the maximum impact on reducing emission levels. Every asset created by the initiative will be open source and free to use. Wipro commits to contribute to planetary net zero emissions goals by reducing its own emissions to net-zero by 2040. Wipro has partnered with Science Based Targets initiative (SBTi) to identify near term and long-term targets. Wipro campus buildings are designed in alignment with green building standards. More than 40% of the electricity we consume is from renewable energy and the water we consume is recycled. We are focused on key climate change goals, including carbon mitigation, energy efficiency, participative water management, campus biodiversity, and environmental profit and loss valuation, within and outside Wipro’s ecosystem. 575,000 tons of GHG prevented from entering the atmosphere over the past 5 years by increasing energy efficiency and renewable energy procurement. 4.2 million tons of carbon emission reduced through renewable energy made in our facilities. 41% of our electricity comes from renewable energy. 13,000 tons of carbon emission eliminated over the past 3 years through alternate travel options and optimization. 5.4 million kilometers in daily commutes transitioned away from fossil fuel vehicles through the Electric Vehicle 100 Initiative. 171 million gallons of water saved through our water efficiency programs. 41% of our water is recycled. 22.7 million kilometers of employee travel reduced through carpooling initiatives. - Covid-19 recovery
-
Covid-19 recovery
We have committed $155M towards tackling Covid-19 pandemic. We have endeavoured to ensure minimal or zero loss of jobs and livelihoods of our suppliers and vendors who provide a range of contract services like housekeeping, security, etc. We have also enabled Work from Home, provided desktops and reimbursements for computer accessories, provided additional leave to our COVID-positive staff, facilitated isolation centres and organized vaccination camps for employees.
We have collaborated with CSOs and the government to aid frontline workers and support underserved communities. Our comprehensive, on-the-ground response includes immediate humanitarian aid such as providing food and basic hygiene products, augmenting healthcare capacity and supporting livelihood regeneration initiatives in in 27 states and 3 UTs in India.
We have ensured safety and comfort to our employees and their families by providing Financial Cover, Medical Support, Leave Cover and Vaccination support.
We identified vulnerable communities such as daily wage earners, migrant workers, and waste pickers, especially those who do not have access to social security or government schemes/systems. Serving 594 million meals during the nation-wide lockdown — reached millions of people across 27 states and 3 union territories. Loss of livelihood has stranded many migrant workers and returnees. We provided support for the regeneration of livelihood for an additional 8.3 million people. - Equal opportunity
-
Equal opportunity
Wipro is present across 65+ countries represented by over 2,40,000 employees with diverse backgrounds, ethnicities, nationalities, and points of view. Wipro is firmly committed to the policy of providing and promoting equal employment opportunity(EEO) for all of its employees and comply with all state and local laws and regulations that prohibit employment discrimination on the basis of age, race, creed, colour, gender, marital, status, national origin, religion, disability, sexual orientation, gender identity, gender expression, protected veteran status and any other characteristic protected by applicable federal, state or local laws or regulations. Wipro has developed a written Affirmative Action Program, which sets forth the policies, practices, and procedures, which the company is committed to applying in order to ensure that its policy of non-discrimination and affirmative action for minorities, women, qualified individuals with disabilities and qualified protected veterans is accomplished. Wipro has also appointed an EEO officer to ensure dissemination and implementation of equal employment opportunity and affirmative action throughout all levels of the company. We continually strive to provide our employees with competitive and innovative compensation packages. Our benefits program provides a range of options for better financial and social security.
Wipro has been included in 2021 Bloomberg Gender-Equality Index (GEI). Wipro has received a rating of 95 in the Corporate Equality Index 2021, by the Human Rights Campaign Foundation. Wipro has been recognized as ‘Disability Confident Committed Employer’ in the UK. This is a government certification in the UK for making sustained efforts to strengthen disability inclusion. Recognized as one of the Best Places to Work for LGBTQ+ Equality by the Human Rights Campaign Corporate Equality Index 2022. Wipro SEF(Science Education Fellowship) program in the UK improves STEM education by developing strong leadership and instruction skills in teachers serving disadvantages communities, especially in geographies with low social mobility.
Pricing
- Price
- £120 to £1,300 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No