Oracle Cloud Infrastructure (OCI) as a Service
Wipro is a certified MSP for Oracle delivering End-to-End implementation of customers technology stack using OCI-as-a-Service, bringing cost savings to customer.
Wipro offers a wide range of services on Oracle Cloud Infrastructure that primarily include
• Cloud Consulting
• OCI Implementation
• Migration
• Full-scale AMS Support (manage and maintain)
Features
- Wipro is Oracle Cloud Elite Partner/certified CSP of Oracle
- Hybrid Cloud Deployment – OCI + Azure Interconnect
- Bespoke application and non-oracle database implementation
- Engineered Systems – ExaCS, ExaCC
- VMware hypervisor deployment on OCI
- Wipro Product IP TOPS, CROAMIS for Airline Industry
- Modernize with Autonomous Database & Cloud Native Deployment
- 11x Database Performance with engineered systems – ExaCS
- Core to edge security with native controls
Benefits
- Reduced Risk: AsIs Migration, No Re-architecture for Oracle Products
- Potential savings of 50% on DR hosting
- Maximum Availability Architecture helping organizations run mission-critical workloads
- Reduced TCO on licensing, database deployments and other levers
- Leverage Wipro's IP DR as-a-Service
- Autonomous: Transaction Processing for OLTP, Data Warehouse, Data Guard, Linux
- Certified Oracle Cloud Infrastructure and Data Management Specialists
- Multiple “Expertise Badges” awarded by Oracle for achieving service expertise
- Wipro’s OCI Tools/Accelerators reduce human intervention/various unintentional errors
- High Performance due to multiple performance layers for Storage
Pricing
£120 to £1,300 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
7 3 7 3 2 7 4 5 4 8 2 1 9 6 1
Contact
WIPRO HOLDINGS (UK) LIMITED
Wipro-Public Sector UK
Telephone: 44-7773194424
Email: publicsector-uki@wipro.com
Service scope
- Service constraints
-
Configuration and set up on Network, Security and other Security Compliance matters to be worked out in collaboration and agreement with Client
Network and Security configuration issues with other third party providers to be discussed and planned
Maintenance Services and their durations should be mutually agreed and worked out in accordance with all stakeholders. - System requirements
- No specific system requirement to implement OCI services
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Wipro provides L1/L2/L3 support and response times depends on client SLA's.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- With Oracle RightNow Chat Cloud Service (Chat), you can provide access to agents for customer questions and issues that merit human interaction between your supervisors, agents and customers through real-time chat sessions.
- Onsite support
- Yes, at extra cost
- Support levels
-
• Wipro provides L1,L2, L3 and L4 support backed by Wipro Center of Excellence Team.
• Cost of support depends on volume of work involved
• Support includes both Technical Account Manager as well as Cloud Support Engineers. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Wipro performs Training Need Analysis (TNA) and offers different types of user training/workshop and also provides user documentation support to help the users as and when required.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
-
- Word
- Powerpoint
- Excel
- End-of-contract data extraction
- Oracle and non-Oracle DB export using SQL queries, Oracle Data pump, VM Image export, Flat files, Text output etc. based on Organization security and compliance policies
- End-of-contract process
- End of the contract is subject to terms and conditions of the contract with the respective Client.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Service Interface is as per the the standard interface provided by Product Vendors.
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- Mostly Accessible by front-end ( UI) interface on web browser.
- API
- Yes
- What users can and can't do using the API
-
• Users can use API to provision, monitor and maintain the cloud services using OCI.
• Wipro has many OCI Accelerators or Enablers that can support the provision and Management of this API.
• Wipro’s Disaster Recovery as-a-Service with other Enablers likeCloud Cost Control and Management Tool(C3MT), Wipro Cloud Freedom Migration, OCI TCO Calculator, AWR Analyzer BOT that offers deep analysis of DB diagnostics reports and finally ISV offerings in OCI are supported.
• Sample List of OCI tools for Apps & Databases are Patch Analyzer and Dependency Checker (PADC), EasyRun, EBS Cloning Bot, Automation Toolkit like Cloud Foundation Setup & Migration Analysis, C3MT.
• Capability to perform schedule based and ad-hoc stop/start and restart of required servers in OCI tenancy. Leverages OCI REST API and CLI to transform manual process. - API automation tools
-
- Ansible
- Terraform
- Other
- Other API automation tools
-
- OCICLI
- Wipro IP - C3MT
- Home grown shell scripts
- API documentation
- Yes
- API documentation formats
-
- HTML
- Other
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- Other
- Using the command line interface
-
• Command line interface works with both Windows and Linux
• Users can use CLI to provision, monitor and maintain the cloud services.
• Users can also leverage OCI REST API and CLI to transform manual process.
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- When the workload increases, the Service scales automatically due to the autoscaling feature of VMs
- Usage notifications
- Yes
- Usage reporting
-
- SMS
- Other
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Other
- Other metrics
-
- Storage threshold
- Database performance
- End User Experience Analytics
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Oracle Corporation
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
- Oracle Transparent Data Encryption (TDE) enables to encrypt sensitive data that is stored in tables and tablespaces. After the data is encrypted, it is transparently decrypted for authorized users or applications when they access this data. TDE helps protect data stored on media (also called data at rest) in the event when storage media or data file is stolen. Transparent Data Encryption (TDE) ensures that sensitive data is encrypted, meets compliance, and provides functionality that streamlines encryption operations. The OCI Block volume service always encrypts all Block Volume, Boot Volume and Volume backups at rest using Advanced Encryption Standard Algorithm.
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Data
- Block Volumes
- Storage
- Buckets
- Instances
- Databases
- Server snapshot
- Filesystems
- Boot Volumes
- Backup controls
- Users control the backups based on the application landscape and environment criticality. Frequency and retention of the backups are also controlled by user/customer policies and SLA's. Backups are primarily scheduled based on Organization and Cloud policies and enterprise requirements. Ad hoc backups are also performed based on requirement by the client or end users.
- Datacentre setup
- Multiple datacentres
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
-
- Users can recover backups themselves, for example through a web interface
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Other
- Other protection between networks
- Network Security groups, Cloud Guard, Web Application Firewall, VPN, Security Lists, Routing table, Bastion, Private IPs, Private Subnets, VCN Hub, Tunneling
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection within supplier network
- Security Lists, Route tables, VCNs, Subnets, Gateways, Bastion, Tunneling, Cloud Guard, Secure Access, MFA
Availability and resilience
- Guaranteed availability
- 99.9% availability SLA for Oracle infrastructure.
- Approach to resilience
- Multiple regions, Availability domains, Fault domains, Disaster Recovery Solution
- Outage reporting
-
• A public dashboard
• Email alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Role based access controls, IAM policies, Using Security Lists, Route tables., VCNs, Subnets, WAF, Routing gateways, Identity and Access Management layer, Bastion.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UKAS Management Systems
- ISO/IEC 27001 accreditation date
- 16/09/2020
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- N/A
- PCI DSS accreditation date
- N/A
- What the PCI DSS doesn’t cover
- N/A
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 9001:2015 - Quality Management System Standards
- ISO 22301:2019 - Business Continuity Management System Standard
- ISO 14001:2015 - Environmental Management Standards
- ISO/IEC 20000- 1:2018 - IT Service Management System Standards
- CMMI-DEV - Software Process Improvement
- CMMI-SVC - Services with Supplier Agreement Management
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- ISO 9001, ISO/IEC 27001, PCI DSS
- Information security policies and processes
-
Wipro is certified for ISO 27001:2013 standard for information security practices inclusive of physical security & employee safety, which is valid till 18-Sep-2023.
The Information security policy ensures that the management establishes an information security management process to address the information security risk requirements. This policy ensures to build trust and resilience into Wipro's cyber ecosystem that enables our business with Confidentiality, Integrity and Availability of information while maintaining privacy and accountability to the information that is entrusted within the organization. Some of the objectives are as follows.
. Set direction in achieving safe and secure environment and security of information
. To maintain high awareness levels of security policies
. Comply with legal, regulatory, compliance and contractual requirements
. Prevention and detection of breaches and violations
. Detect, prevent and manage security incidents
. Protect client and Wipro IP
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Configuration Management Process:
Wipro will implement best practices like Creating standards, Maintain documentation, Configuration integrity checks, Configuration upgrade procedure, Configuration version control system to improve Configuration Management.
Change Management Process:
Wipro will bring in best practices from ITIL Change Management Process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes. Our focus is to minimize the risk to and the impact of changes on the environment and while improving service quality. The ITIL V4 aligned Change Management Process by Wipro will be organized into phases which represent high-level activities in implementing changes. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Wipro works with its Cloud partner Oracle to utilize network vulnerability assessment tools to identify security threats and vulnerabilities. Formal procedures are in place to assess, validate, prioritize, and remediate identified issues. Oracle subscribes to vulnerability notification systems to stay apprised of security incidents, advisories, and other related information. Oracle takes actions on the notification of a threat or risk once confirmed that a valid risk exists, that the recommended changes are applicable to service environments, and the changes will not otherwise adversely affect the services.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- There are multiple Cloud Monitoring Tools available that protect data, end points and Cloud Resources from vulnerabilities. Cloud Guard and Cloud Logging and Analytics are such tools which help to monitor and identify potential security issues and remediate them. OEM is another primary tool to monitor all oracle workloads in cloud landscape. Apart from these, Wipro has a highly skilled team for deploying automated customized scripts or ad hoc scripts. With the mentioned native security and monitoring tools along with Wipro-driven scripts, any potential security breach or vulnerabilities can be addressed and remediated sending alert messages to the respective stakeholders.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We have SIEM (Security Incident and Event Monitoring) tool in place which monitors all major network and select compute devices for any suspicious activity matching its comprehensive database of suspicious traffic patterns. Alerts get triggered and our 24x7 SIEM teams investigate into these alerts. They cut out the false positives and focus only on the suspicious cases. They then log a ticket and investigate further based on standard operating procedures. If the system/application owner finds any security related suspicious activities based on the log files reviews, it is immediately reported as per the procedures defined in Security Incident Management procedures.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Oracle VM
- How shared infrastructure is kept separate
-
Each customer owns a separate tenancy and allocated resources within. The network isolation and tenancy boundary ensures customer are apart. Oracle implements the virtualisation technology for Virtual Machines.
Bare metal servers provide further isolation for different organisations by separating the infrastructure.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Our Energy Efficiency measures include new retrofit technologies to improve Chiller and Air Handling Units (AHUs), integrated design and monitoring platforms. The Global Energy command center aggregates Building Management System inputs on a common platform to optimize operational control and improve energy efficiency. Since 2007, we have been working on a server rationalization and virtualization program, through which we have decommissioned old physical servers and replaced the processing capacity with virtualization technology on fewer numbers of servers. As of March 2021, we have 13133 virtual servers (10155 in March 2020) running on 758 physical servers which contributes to an energy savings of approximately 57.9 million units in the reporting year. The savings showed an increase of 21% over the previous year.
Social Value
- Fighting climate change
-
Fighting climate change
Our carbon inventory and reduction plans are as per ISO14064. The Net Zero Emissions Coalition is a group of leading companies committed to achieving net zero carbon emissions by 2050. The coalition has a 5-year plan to transition to net zero through business transformation, collective action and enabling systems change. Wipro is a part of this coalition and will engage with a wide set of stakeholders, create deliverables, and prioritize efforts to generate the maximum impact on reducing emission levels. Every asset created by the initiative will be open source and free to use. Wipro commits to contribute to planetary net zero emissions goals by reducing its own emissions to net-zero by 2040. Wipro has partnered with Science Based Targets initiative (SBTi) to identify near term and long-term targets. Wipro campus buildings are designed in alignment with green building standards. More than 40% of the electricity we consume is from renewable energy and the water we consume is recycled. We are focused on key climate change goals, including carbon mitigation, energy efficiency, participative water management, campus biodiversity, and environmental profit and loss valuation, within and outside Wipro’s ecosystem. 575,000 tons of GHG prevented from entering the atmosphere over the past 5 years by increasing energy efficiency and renewable energy procurement. 4.2 million tons of carbon emission reduced through renewable energy made in our facilities. 41% of our electricity comes from renewable energy. 13,000 tons of carbon emission eliminated over the past 3 years through alternate travel options and optimization. 5.4 million kilometers in daily commutes transitioned away from fossil fuel vehicles through the Electric Vehicle 100 Initiative. 171 million gallons of water saved through our water efficiency programs. 41% of our water is recycled. 22.7 million kilometers of employee travel reduced through carpooling initiatives. - Covid-19 recovery
-
Covid-19 recovery
We have committed $155M towards tackling Covid-19 pandemic. We have endeavoured to ensure minimal or zero loss of jobs and livelihoods of our suppliers and vendors who provide a range of contract services like housekeeping, security, etc. We have also enabled Work from Home, provided desktops and reimbursements for computer accessories, provided additional leave to our COVID-positive staff, facilitated isolation centres and organized vaccination camps for employees.
We have collaborated with CSOs and the government to aid frontline workers and support underserved communities. Our comprehensive, on-the-ground response includes immediate humanitarian aid such as providing food and basic hygiene products, augmenting healthcare capacity and supporting livelihood regeneration initiatives in in 27 states and 3 UTs in India.
We have ensured safety and comfort to our employees and their families by providing Financial Cover, Medical Support, Leave Cover and Vaccination support.
We identified vulnerable communities such as daily wage earners, migrant workers, and waste pickers, especially those who do not have access to social security or government schemes/systems. Serving 594 million meals during the nation-wide lockdown — reached millions of people across 27 states and 3 union territories. Loss of livelihood has stranded many migrant workers and returnees. We provided support for the regeneration of livelihood for an additional 8.3 million people. - Equal opportunity
-
Equal opportunity
Wipro is present across 65+ countries represented by over 2,40,000 employees with diverse backgrounds, ethnicities, nationalities, and points of view. Wipro is firmly committed to the policy of providing and promoting equal employment opportunity(EEO) for all of its employees and comply with all state and local laws and regulations that prohibit employment discrimination on the basis of age, race, creed, colour, gender, marital, status, national origin, religion, disability, sexual orientation, gender identity, gender expression, protected veteran status and any other characteristic protected by applicable federal, state or local laws or regulations. Wipro has developed a written Affirmative Action Program, which sets forth the policies, practices, and procedures, which the company is committed to applying in order to ensure that its policy of non-discrimination and affirmative action for minorities, women, qualified individuals with disabilities and qualified protected veterans is accomplished. Wipro has also appointed an EEO officer to ensure dissemination and implementation of equal employment opportunity and affirmative action throughout all levels of the company. We continually strive to provide our employees with competitive and innovative compensation packages. Our benefits program provides a range of options for better financial and social security.
Wipro has been included in 2021 Bloomberg Gender-Equality Index (GEI). Wipro has received a rating of 95 in the Corporate Equality Index 2021, by the Human Rights Campaign Foundation. Wipro has been recognized as ‘Disability Confident Committed Employer’ in the UK. This is a government certification in the UK for making sustained efforts to strengthen disability inclusion. Recognized as one of the Best Places to Work for LGBTQ+ Equality by the Human Rights Campaign Corporate Equality Index 2022. Wipro SEF(Science Education Fellowship) program in the UK improves STEM education by developing strong leadership and instruction skills in teachers serving disadvantages communities, especially in geographies with low social mobility.
Pricing
- Price
- £120 to £1,300 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No