Profile image of subramaniyam
@subramaniyam
Flag of India Hyderabad, India
Member since 9 de outubro de 2007
0 Recomendações

subramaniyam

Conectado Desconectado
BECON GLOBAL SOLUTIONS 1. PROLUGUE 1.1 Need For IT/ITES Services Enterprises today are faced with a number of challenges. Ever increasing Customer expectations and Stricter Compliance norms compel them to focus on delivering quality within the ever-increasing constraints of Costs. The trend therefore is towards specialization. Organizations have started focusing on certain core areas while outsourcing other activities to respective specialists in those fields. IT and Process form a vital part of the company. Today companies are spending 20%-40% of Operating Expenses on IT and non-value added processes. Ensuring that IT and enabling costs are controlled is the challenge faced by the companies around the globe. To counter this one of the most explored options is Outsourcing. Outsourcing has become the solution of choice because of cost arbitrage, companies sourcing from USA to India can experience a cost cut down of around 30%-40% on the overheads of the particular process and also leads to creating of focus on the core business activities of the company thereby leveraging higher value. 1.2 Our Understanding of Key Customer Needs Enterprises look at outsourcing operations to a third party vendor in line with their business goals of cost savings, focus on core competencies, versatility of support platforms, performance improvement measures, and lowest possible transition risks. Besides offering a world-class scalable model for outsourced technology operations, outsourcing vendors should also propose a lucrative commercial model that creates Value. 1.3 BECON GLOBAL SOLUTIONS the Service Provider of Choice BECON GLOBAL SOLUTIONS has developed a strategic sourcing model that aims at fulfilling the outsourcing requirements of large and small enterprises looking at outsourcing options. BECON GLOBAL SOLUTIONS presents integrated end-to-end service offerings, with delivery skills and cost structures that are globally competitive. BECON GLOBAL SOLUTIONS . endeavors to stand for excellence in Customer Management through world class service delivery. 1.4 THE STRATEGIC SOURCING MODEL The highlights of the Model are v A Composite model that provides end-to-end solution from requirement analysis to the delivery. Therefore the clients need not approach various parties, one stop shop for all the requirements. v Key focus on the clients and processes which ensure that the processes as per the requirement of the customers and regular steps are taken for risk mitigation and continuous improvements which leads to the creation of value. v The whole model focuses on resources and infrastructure which are best in class and highly flexible so that we can change with the requirements of the clients. v The deployment methodology depends are specific to each engagement. At BECON GLOBAL SOLUTIONS . we appreciate that for each client that outsourcing decision is a strategic one and aimed at leveraging higher value. With our flexible and stable process backed with a learning organization we aim at creating better lifetime value for each of clients and also improvise on the processes in this pursuit. 2. SERVICE OFFERINGS The service offering of BECON GLOBAL SOLUTIONS . Global are listed below: 2.1 Data Processing. The portfolio of services aims at outsourcing of the routine daily work activities related to the data conversion from one form to another, and also converting to customized applications. 2.1.1. ONLINE DATA ENTRY SERVICES BECON GLOBAL SOLUTIONS . Services in India is a known solution provider for highly accurate data entry and data processing services. We are experts in online data entry services for simple data entry work, compilation from web sites, e-books, business card, catalog and form processing, etc. Our approach to online data entry is unique and the technologies we use enable us to deliver the highest levels of data quality, accuracy, and quick turnaround. Our excellence is our accuracy and speed. Data Entry Services India has an extensive work force which includes experienced, professional online data entry operators who are well experienced and reliable in data entry field. ÏOnline Entry of E-books with High Accuracy and Speed ÏOnline Copying, Pasting, Editing, and Indexing data ÏOnline Catalog Data Entry ÏData entry from Image files in any format 2.1.2. E-book Conversion, Scanning and OCR software's We specialize in the conversion of scanned documents into electronic format using various tools and formats and also undertake the job of scanning of documents using OCR scanners. To undertake the work of E-book Conversion we have a dedicated set of DTP professionals which are regularly trained and have a very high skill levels. 2.1.3. Form Processing Information on a paper form is of little use until it is converted into an electronic format and acted upon. We capture data from all types of handwritten and typed forms accurately, rapidly and cost-effectively. We work with a variety of forms including Insurance claims, subscriptions, surveys, warranty registrations. Regardless of the source - paper, faxes, scanned images or electronic data streams forms processing service. We can extract, perfect and export critical information to database, workflow, document and content management systems. Whether your data is highly formatted or completely unstructured, our solutions will capture as much or as little information from the source data as you require, ready for output to any industry-standard or proprietary database system. BECON GLOBAL SOLUTIONS. can provide the data in a variety of ways. An FTP site or e-mail is currently the most popular choice but magnetic media such as CD-ROM or tape are also options. Our outcome is a clean, accurate, uniform digital file, formatted to your specifications. 2.2 IT Off shoring 2.2.1 Application Development BECON GLOBAL SOLUTIONS. has a well-defined and mature application development process which comprises the complete SDLC from business case analysis to support of the application. This process supports a distributed delivery environment wherein work responsibilities can be effectively divided between the delivery teams. The application development methodology can be used for: 1. New application development 2. Existing application enhancement 3. Application Integration 4. Application migration Application development activities can be bound by SLA framework with critical service level (CSL) and quality process and result (QPR) measures. Our unique value proposition lies in our ability to: v Knowledge acquisition and retention v Use our matrix organization structure for using the required expertise 2.2.2 Application Maintenance BECON GLOBAL SOLUTIONS. has a well-defined and mature application maintenance process which allows effective capture, reporting resolution of maintenance requests. This process supports a distributed delivery environment wherein work responsibilities can be effectively divided between the various organizations depending on the criticality of the requests. Each of these activities can be governed and monitored by SLA frame work: v Requests management v Management of incidents v Processing of requests v Work around v Resolution v Root cause analysis Our application maintenance services deliver v Reduction in TCO (Total cost of ownership) v Drive continuous improvements in quality of services v Improve applications stability Reduce support costs thereby enabling more avenues to invest in our client's business strategic IT initiatives CSL and QPR measures v Application maintenance productivity v Schedule compliance v Maintenance scope management v Budget adherence v Project status v Delivered product quality Our unique value proposition lies in our ability to: Use the knowledge acquired in coming up with transformation plan Optimize Innovate Expand Improve the productivity thus reducing the cost of maintenance Provide consultancy on the disposition plans for the applications Transform Retire Consolidate Replace 2.2.3 IT Consultancy The technology management consulting team at BECON GLOBAL SOLUTIONS. improves the alignment of business and technology through improved process efficiency, reduced cost and enhanced business value of IT. Our consultants combine extensive technical experience with strong strategic and business focused leadership. We provide solutions to issues using a proven business-focused approach. Starting with an understanding of the business need, we then work with our clients to design and deliver efficient solutions, striking the right balance between leveraging what they have and delivering what they need. We help our clients in building a high performance IT organization through formalizing the IT strategy, governance, metrics, business processes, technology and organization structure needed to deliver and manage efficient, high quality IT services. We work with our clients in architecture, business value analysis, asset management, product evaluation and selection, data privacy and security of their IT function. v Enterprise Architecture Consulting v Portal Consulting v Product Strategy and Architecture v SOA and Web Services Consulting v 2.3 Finance and Accounting Outsourcing We understand that Finance and Accounting data has to be one of the most reliable and most accurate data. Also the fact that capturing this data is a costly and non - value added activity. We aim at providing cost effective and accurate solutions and coupling it with India's time zone advantage provide ready data in the morning thereby reducing the time to delivery. We receive source documents like scanned invoices, bank statements, checks slips, and intermediate accounting statements depending on the outsourced processes. These documents are then processed by our staff based either by remote accessing client servers, third party servers (like Intuit servers in QuickBooks online processing) or at our office. The final output is then uploaded back on the clients server/emailed to the client. Our staff is trained on QuickBooks (Pro and Premier Versions), Peachtree, Sage Line 50 and Great Plains among other packages. At present we provide the following finance and accounting services: 1. Accounts Payable and Receivable Management 2. General Ledger Accounting 3. Processes Snapshot 3.1. Data Security: Data security is maintained through various initiatives at the physical level and robust policies along with stringent control procedures ensure that the integrity of the data is maintained. The initiatives followed at various levels are as follows: Physical Security v Restricted access to work are and desktop. v Screening of Visitors/Employees by a security guard during entry and exit for data storage media like floppies, cds, usb drives etc. Data Security v Secure network and application access. v Regular security audits are performed. v All data is backed up on a regular basis on servers to enable anytime viewing by clients Network Security v Use of secured line to access and transmit data from servers/ftp. v Segmented LAN with firewall protection. v All ports except DNS and STMP are disabled from the external world. PC Security v Individual domain accounts for each processor ensure that the access to source documents is restricted to authorized employees only. v No fax and printing capabilities at the processing sites. v PCs used by processors do not have floppy/ USB and CD - Rom. v PCs used in processing are denied email and web-access. v Regular updation of Anti - Virus software. v Low Usage of paper on the floor. 3.2 Process Quality Process Mapping and Resource Mapping v Detailed mapping of existing processes to understand current workflow, process requirements and activity times. v Profiling of the resources required in the operations Process Migration and Implementation v Structured approach to process migration using a well defined transition and implementation framework ensures smooth transfer of processes. v Comprehensive process documentation, migration and training planning. v Clear delineation of responsibilities among onshore and offshore staff accelerates resolution of issues and enables effective process implementation. Tracking Input Quality v Complete checking of source documents by processors using a detailed check list. v Clearly defined business rules at the time of process migration ensure quick handling of 'exceptions'. Ensuring Output Quality v Specialized resource for reviewing the quality work. v Close monitoring of the service levels of the process by a dedicated process leader. v Use of quality techniques like random sampling, fishbone analysis, and process charts ensure compliance to high quality standards Extensive training for agents. 3.3 Staffing and Training Staffing v Well defined recruitment process involving evaluation of candidate's functional knowledge, computer literacy and proficiency in spoken and written English. v Evaluation of the softer skills of the resources to ensure that the process are more stable. v Use of contract staffing and manpower repositories to ensure that reliable resources are recruited. Training v Pre-Training Assessment: Pre-Training Assessment is conducted through a capabilities evaluation interview and tests in typing speeds. v Software Training: Rigorous training is provided to the resources on the processes and the software they will work on. v General Training: Knowledge of process basics like folder management and document handling along with training in communications. v Process Trial Data: Very critical aspect of training involving complete evaluation of employee skills in process handling. Processors work on sample data sets to simulate work environment with clear time based targets for completion. v Post-Training Assessment and Feedback: Post training assessment will be based on a test that simulates a live environment. Processors are assessed on parameters such as processing time, accuracy of data, process compliance, documentation and written communication skills. 3.4 Infrastructure v 3300 sqft. Of Office Area in one of the most prime regions of the city with 100% power backup. v 2 MBPS of Network Connectivity. v 50 systems available for utilization. v 24 Hrs Support of Network and Hardware Engineers to ensure uninterrupted workflow. . can provide the data in a variety of ways. An FTP site or e-mail is currently the most popular choice but magnetic media such as CD-ROM or tape are also options. Our outcome is a clean, accurate, uniform digital file, formatted to your specifications. 2.2 IT Off shoring 2.2.1 Application Development BECON GLOBAL SOLUTIONS. has a well-defined and mature application development process which comprises the complete SDLC from business case analysis to support of the application. This process supports a distributed delivery environment wherein work responsibilities can be effectively divided between the delivery teams. The application development methodology can be used for: 1. New application development 2. Existing application enhancement 3. Application Integration 4. Application migration Application development activities can be bound by SLA framework with critical service level (CSL) and quality process and result (QPR) measures. Our unique value proposition lies in our ability to: v Knowledge acquisition and retention v Use our matrix organization structure for using the required expertise 2.2.2 Application Maintenance BECON GLOBAL SOLUTIONS. has a well-defined and mature application maintenance process which allows effective capture, reporting resolution of maintenance requests. This process supports a distributed delivery environment wherein work responsibilities can be effectively divided between the various organizations depending on the criticality of the requests. Each of these activities can be governed and monitored by SLA frame work: v Requests management v Management of incidents v Processing of requests v Work around v Resolution v Root cause analysis Our application maintenance services deliver v Reduction in TCO (Total cost of ownership) v Drive continuous improvements in quality of services v Improve applications stability Reduce support costs thereby enabling more avenues to invest in our client's business strategic IT initiatives CSL and QPR measures v Application maintenance productivity v Schedule compliance v Maintenance scope management v Budget adherence v Project status v Delivered product quality Our unique value proposition lies in our ability to: Use the knowledge acquired in coming up with transformation plan Optimize Innovate Expand Improve the productivity thus reducing the cost of maintenance Provide consultancy on the disposition plans for the applications Transform Retire Consolidate Replace 2.2.3 IT Consultancy The technology management consulting team at BECON GLOBAL SOLUTIONS. improves the alignment of business and technology through improved process efficiency, reduced cost and enhanced business value of IT. Our consultants combine extensive technical experience with strong strategic and business focused leadership. We provide solutions to issues using a proven business-focused approach. Starting with an understanding of the business need, we then work with our clients to design and deliver efficient solutions, striking the right balance between leveraging what they have and delivering what they need. We help our clients in building a high performance IT organization through formalizing the IT strategy, governance, metrics, business processes, technology and organization structure needed to deliver and manage efficient, high quality IT services. We work with our clients in architecture, business value analysis, asset management, product evaluation and selection, data privacy and security of their IT function. v Enterprise Architecture Consulting v Portal Consulting v Product Strategy and Architecture v SOA and Web Services Consulting v 2.3 Finance and Accounting Outsourcing We understand that Finance and Accounting data has to be one of the most reliable and most accurate data. Also the fact that capturing this data is a costly and non - value added activity. We aim at providing cost effective and accurate solutions and coupling it with India's time zone advantage provide ready data in the morning thereby reducing the time to delivery. We receive source documents like scanned invoices, bank statements, checks slips, and intermediate accounting statements depending on the outsourced processes. These documents are then processed by our staff based either by remote accessing client servers, third party servers (like Intuit servers in QuickBooks online processing) or at our office. The final output is then uploaded back on the clients server/emailed to the client. Our staff is trained on QuickBooks (Pro and Premier Versions), Peachtree, Sage Line 50 and Great Plains among other packages. At present we provide the following finance and accounting services: 1. Accounts Payable and Receivable Management 2. General Ledger Accounting 3. Processes Snapshot 3.1. Data Security: Data security is maintained through various initiatives at the physical level and robust policies along with stringent control procedures ensure that the integrity of the data is maintained. The initiatives followed at various levels are as follows: Physical Security v Restricted access to work are and desktop. v Screening of Visitors/Employees by a security guard during entry and exit for data storage media like floppies, cds, usb drives etc. Data Security v Secure network and application access. v Regular security audits are performed. v All data is backed up on a regular basis on servers to enable anytime viewing by clients Network Security v Use of secured line to access and transmit data from servers/ftp. v Segmented LAN with firewall protection. v All ports except DNS and STMP are disabled from the external world. PC Security v Individual domain accounts for each processor ensure that the access to source documents is restricted to authorized employees only. v No fax and printing capabilities at the processing sites. v PCs used by processors do not have floppy/ USB and CD - Rom. v PCs used in processing are denied email and web-access. v Regular updation of Anti - Virus software. v Low Usage of paper on the floor. 3.2 Process Quality Process Mapping and Resource Mapping v Detailed mapping of existing processes to understand current workflow, process requirements and activity times. v Profiling of the resources required in the operations Process Migration and Implementation v Structured approach to process migration using a well defined transition and implementation framework ensures smooth transfer of processes. v Comprehensive process documentation, migration and training planning. v Clear delineation of responsibilities among onshore and offshore staff accelerates resolution of issues and enables effective process implementation. Tracking Input Quality v Complete checking of source documents by processors using a detailed check list. v Clearly defined business rules at the time of process migration ensure quick handling of 'exceptions'. Ensuring Output Quality v Specialized resource for reviewing the quality work. v Close monitoring of the service levels of the process by a dedicated process leader. v Use of quality techniques like random sampling, fishbone analysis, and process charts ensure compliance to high quality standards Extensive training for agents. 3.3 Staffing and Training Staffing v Well defined recruitment process involving evaluation of candidate's functional knowledge, computer literacy and proficiency in spoken and written English. v Evaluation of the softer skills of the resources to ensure that the process are more stable. v Use of contract staffing and manpower repositories to ensure that reliable resources are recruited. Training v Pre-Training Assessment: Pre-Training Assessment is conducted through a capabilities evaluation interview and tests in typing speeds. v Software Training: Rigorous training is provided to the resources on the processes and the software they will work on. v General Training: Knowledge of process basics like folder management and document handling along with training in communications. v Process Trial Data: Very critical aspect of training involving complete evaluation of employee skills in process handling. Processors work on sample data sets to simulate work environment with clear time based targets for completion. v Post-Training Assessment and Feedback: Post training assessment will be based on a test that simulates a live environment. Processors are assessed on parameters such as processing time, accuracy of data, process compliance, documentation and written communication skills. 3.4 Infrastructure v 6300 sqft. Of Office Area in one of the most prime regions of the city with 100% power backup. v 2 MBPS of Network Connectivity. v 75 systems available for utilization. v 24 Hrs Support of Network and Hardware Engineers to ensure uninterrupted workflow. . can provide the data in a variety of ways. An FTP site or e-mail is currently the most popular choice but magnetic media such as CD-ROM or tape are also options. Our outcome is a clean, accurate, uniform digital file, formatted to your specifications. 2.2 IT Off shoring 2.2.1 Application Development BECON GLOBAL SOLUTIONS. has a well-defined and mature application development process which comprises the complete SDLC from business case analysis to support of the application. This process supports a distributed delivery environment wherein work responsibilities can be effectively divided between the delivery teams. The application development methodology can be used for: 1. New application development 2. Existing application enhancement 3. Application Integration 4. Application migration Application development activities can be bound by SLA framework with critical service level (CSL) and quality process and result (QPR) measures. Our unique value proposition lies in our ability to: v Knowledge acquisition and retention v Use our matrix organization structure for using the required expertise 2.2.2 Application Maintenance BECON GLOBAL SOLUTIONS. has a well-defined and mature application maintenance process which allows effective capture, reporting resolution of maintenance requests. This process supports a distributed delivery environment wherein work responsibilities can be effectively divided between the various organizations depending on the criticality of the requests. Each of these activities can be governed and monitored by SLA frame work: v Requests management v Management of incidents v Processing of requests v Work around v Resolution v Root cause analysis Our application maintenance services deliver v Reduction in TCO (Total cost of ownership) v Drive continuous improvements in quality of services v Improve applications stability Reduce support costs thereby enabling more avenues to invest in our client's business strategic IT initiatives CSL and QPR measures v Application maintenance productivity v Schedule compliance v Maintenance scope management v Budget adherence v Project status v Delivered product quality Our unique value proposition lies in our ability to: Use the knowledge acquired in coming up with transformation plan Optimize Innovate Expand Improve the productivity thus reducing the cost of maintenance Provide consultancy on the disposition plans for the applications Transform Retire Consolidate Replace 2.2.3 IT Consultancy The technology management consulting team at BECON GLOBAL SOLUTIONS. improves the alignment of business and technology through improved process efficiency, reduced cost and enhanced business value of IT. Our consultants combine extensive technical experience with strong strategic and business focused leadership. We provide solutions to issues using a proven business-focused approach. Starting with an understanding of the business need, we then work with our clients to design and deliver efficient solutions, striking the right balance between leveraging what they have and delivering what they need. We help our clients in building a high performance IT organization through formalizing the IT strategy, governance, metrics, business processes, technology and organization structure needed to deliver and manage efficient, high quality IT services. We work with our clients in architecture, business value analysis, asset management, product evaluation and selection, data privacy and security of their IT function. v Enterprise Architecture Consulting v Portal Consulting v Product Strategy and Architecture v SOA and Web Services Consulting v 2.3 Finance and Accounting Outsourcing We understand that Finance and Accounting data has to be one of the most reliable and most accurate data. Also the fact that capturing this data is a costly and non - value added activity. We aim at providing cost effective and accurate solutions and coupling it with India's time zone advantage provide ready data in the morning thereby reducing the time to delivery. We receive source documents like scanned invoices, bank statements, checks slips, and intermediate accounting statements depending on the outsourced processes. These documents are then processed by our staff based either by remote accessing client servers, third party servers (like Intuit servers in QuickBooks online processing) or at our office. The final output is then uploaded back on the clients server/emailed to the client. Our staff is trained on QuickBooks (Pro and Premier Versions), Peachtree, Sage Line 50 and Great Plains among other packages. At present we provide the following finance and accounting services: 1. Accounts Payable and Receivable Management 2. General Ledger Accounting 3. Processes Snapshot 3.1. Data Security: Data security is maintained through various initiatives at the physical level and robust policies along with stringent control procedures ensure that the integrity of the data is maintained. The initiatives followed at various levels are as follows: Physical Security v Restricted access to work are and desktop. v Screening of Visitors/Employees by a security guard during entry and exit for data storage media like floppies, cds, usb drives etc. Data Security v Secure network and application access. v Regular security audits are performed. v All data is backed up on a regular basis on servers to enable anytime viewing by clients Network Security v Use of secured line to access and transmit data from servers/ftp. v Segmented LAN with firewall protection. v All ports except DNS and STMP are disabled from the external world. PC Security v Individual domain accounts for each processor ensure that the access to source documents is restricted to authorized employees only. v No fax and printing capabilities at the processing sites. v PCs used by processors do not have floppy/ USB and CD - Rom. v PCs used in processing are denied email and web-access. v Regular updation of Anti - Virus software. v Low Usage of paper on the floor. 3.2 Process Quality Process Mapping and Resource Mapping v Detailed mapping of existing processes to understand current workflow, process requirements and activity times. v Profiling of the resources required in the operations Process Migration and Implementation v Structured approach to process migration using a well defined transition and implementation framework ensures smooth transfer of processes. v Comprehensive process documentation, migration and training planning. v Clear delineation of responsibilities among onshore and offshore staff accelerates resolution of issues and enables effective process implementation. Tracking Input Quality v Complete checking of source documents by processors using a detailed check list. v Clearly defined business rules at the time of process migration ensure quick handling of 'exceptions'. Ensuring Output Quality v Specialized resource for reviewing the quality work. v Close monitoring of the service levels of the process by a dedicated process leader. v Use of quality techniques like random sampling, fishbone analysis, and process charts ensure compliance to high quality standards Extensive training for agents. 3.3 Staffing and Training Staffing v Well defined recruitment process involving evaluation of candidate's functional knowledge, computer literacy and proficiency in spoken and written English. v Evaluation of the softer skills of the resources to ensure that the process are more stable. v Use of contract staffing and manpower repositories to ensure that reliable resources are recruited. Training v Pre-Training Assessment: Pre-Training Assessment is conducted through a capabilities evaluation interview and tests in typing speeds. v Software Training: Rigorous training is provided to the resources on the processes and the software they will work on. v General Training: Knowledge of process basics like folder management and document handling along with training in communications. v Process Trial Data: Very critical aspect of training involving complete evaluation of employee skills in process handling. Processors work on sample data sets to simulate work environment with clear time based targets for completion. v Post-Training Assessment and Feedback: Post training assessment will be based on a test that simulates a live environment. Processors are assessed on parameters such as processing time, accuracy of data, process compliance, documentation and written communication skills. 3.4 Infrastructure v 6300 sqft. Of Office Area in one of the most prime regions of the city with 100% power backup. v 2 MBPS of Network Connectivity. v 75 systems available for utilization. v 24 Hrs Support of Network and Hardware Engineers to ensure uninterrupted workflow. . can provide the data in a variety of ways. An FTP site or e-mail is currently the most popular choice but magnetic media such as CD-ROM or tape are also options. Our outcome is a clean, accurate, uniform digital file, formatted to your specifications. 2.2 IT Off shoring 2.2.1 Application Development BECON GLOBAL SOLUTIONS. has a well-defined and mature application development process which comprises the complete SDLC from business case analysis to support of the application. This process supports a distributed delivery environment wherein work responsibilities can be effectively divided between the delivery teams. The application development methodology can be used for: 1. New application development 2. Existing application enhancement 3. Application Integration 4. Application migration Application development activities can be bound by SLA framework with critical service level (CSL) and quality process and result (QPR) measures. Our unique value proposition lies in our ability to: v Knowledge acquisition and retention v Use our matrix organization structure for using the required expertise 2.2.2 Application Maintenance BECON GLOBAL SOLUTIONS. has a well-defined and mature application maintenance process which allows effective capture, reporting resolution of maintenance requests. This process supports a distributed delivery environment wherein work responsibilities can be effectively divided between the various organizations depending on the criticality of the requests. Each of these activities can be governed and monitored by SLA frame work: v Requests management v Management of incidents v Processing of requests v Work around v Resolution v Root cause analysis Our application maintenance services deliver v Reduction in TCO (Total cost of ownership) v Drive continuous improvements in quality of services v Improve applications stability Reduce support costs thereby enabling more avenues to invest in our client's business strategic IT initiatives CSL and QPR measures v Application maintenance productivity v Schedule compliance v Maintenance scope management v Budget adherence v Project status v Delivered product quality Our unique value proposition lies in our ability to: Use the knowledge acquired in coming up with transformation plan Optimize Innovate Expand Improve the productivity thus reducing the cost of maintenance Provide consultancy on the disposition plans for the applications Transform Retire Consolidate Replace 2.2.3 IT Consultancy The technology management consulting team at BECON GLOBAL SOLUTIONS. improves the alignment of business and technology through improved process efficiency, reduced cost and enhanced business value of IT. Our consultants combine extensive technical experience with strong strategic and business focused leadership. We provide solutions to issues using a proven business-focused approach. Starting with an understanding of the business need, we then work with our clients to design and deliver efficient solutions, striking the right balance between leveraging what they have and delivering what they need. We help our clients in building a high performance IT organization through formalizing the IT strategy, governance, metrics, business processes, technology and organization structure needed to deliver and manage efficient, high quality IT services. We work with our clients in architecture, business value analysis, asset management, product evaluation and selection, data privacy and security of their IT function. v Enterprise Architecture Consulting v Portal Consulting v Product Strategy and Architecture v SOA and Web Services Consulting v 2.3 Finance and Accounting Outsourcing We understand that Finance and Accounting data has to be one of the most reliable and most accurate data. Also the fact that capturing this data is a costly and non - value added activity. We aim at providing cost effective and accurate solutions and coupling it with India's time zone advantage provide ready data in the morning thereby reducing the time to delivery. We receive source documents like scanned invoices, bank statements, checks slips, and intermediate accounting statements depending on the outsourced processes. These documents are then processed by our staff based either by remote accessing client servers, third party servers (like Intuit servers in QuickBooks online processing) or at our office. The final output is then uploaded back on the clients server/emailed to the client. Our staff is trained on QuickBooks (Pro and Premier Versions), Peachtree, Sage Line 50 and Great Plains among other packages. At present we provide the following finance and accounting services: 1. Accounts Payable and Receivable Management 2. General Ledger Accounting 3. Processes Snapshot 3.1. Data Security: Data security is maintained through various initiatives at the physical level and robust policies along with stringent control procedures ensure that the integrity of the data is maintained. The initiatives followed at various levels are as follows: Physical Security v Restricted access to work are and desktop. v Screening of Visitors/Employees by a security guard during entry and exit for data storage media like floppies, cds, usb drives etc. Data Security v Secure network and application access. v Regular security audits are performed. v All data is backed up on a regular basis on servers to enable anytime viewing by clients Network Security v Use of secured line to access and transmit data from servers/ftp. v Segmented LAN with firewall protection. v All ports except DNS and STMP are disabled from the external world. PC Security v Individual domain accounts for each processor ensure that the access to source documents is restricted to authorized employees only. v No fax and printing capabilities at the processing sites. v PCs used by processors do not have floppy/ USB and CD - Rom. v PCs used in processing are denied email and web-access. v Regular updation of Anti - Virus software. v Low Usage of paper on the floor. 3.2 Process Quality Process Mapping and Resource Mapping v Detailed mapping of existing processes to understand current workflow, process requirements and activity times. v Profiling of the resources required in the operations Process Migration and Implementation v Structured approach to process migration using a well defined transition and implementation framework ensures smooth transfer of processes. v Comprehensive process documentation, migration and training planning. v Clear delineation of responsibilities among onshore and offshore staff accelerates resolution of issues and enables effective process implementation. Tracking Input Quality v Complete checking of source documents by processors using a detailed check list. v Clearly defined business rules at the time of process migration ensure quick handling of 'exceptions'. Ensuring Output Quality v Specialized resource for reviewing the quality work. v Close monitoring of the service levels of the process by a dedicated process leader. v Use of quality techniques like random sampling, fishbone analysis, and process charts ensure compliance to high quality standards Extensive training for agents. 3.3 Staffing and Training Staffing v Well defined recruitment process involving evaluation of candidate's functional knowledge, computer literacy and proficiency in spoken and written English. v Evaluation of the softer skills of the resources to ensure that the process are more stable. v Use of contract staffing and manpower repositories to ensure that reliable resources are recruited. Training v Pre-Training Assessment: Pre-Training Assessment is conducted through a capabilities evaluation interview and tests in typing speeds. v Software Training: Rigorous training is provided to the resources on the processes and the software they will work on. v General Training: Knowledge of process basics like folder management and document handling along with training in communications. v Process Trial Data: Very critical aspect of training involving complete evaluation of employee skills in process handling. Processors work on sample data sets to simulate work environment with clear time based targets for completion. v Post-Training Assessment and Feedback: Post training assessment will be based on a test that simulates a live environment. Processors are assessed on parameters such as processing time, accuracy of data, process compliance, documentation and written communication skills. 3.4 Infrastructure v 6300 sqft. Of Office Area in one of the most prime regions of the city with 100% power backup. v 2 MBPS of Network Connectivity. v 75 systems available for utilization. v 24 Hrs Support of Network and Hardware Engineers to ensure uninterrupted workflow.
$5 USD/hr
0 comentários
0.0
  • N/ATrabalhos Concluídos
  • N/ANo orçamento
  • N/ANo Prazo
  • N/ATaxa de Recontratação

Portfólio

Comentários recentes

Não há revisões.

Verificações

  • Conectado com o Facebook
  • Freelancer Preferencial
  • Pagamento Verificado
  • Telefone Verificado
  • Identidade Verificada
  • E-mail Verificado

Pesquisar Freelancers similares