Wipro - Cloud Management Platform (BLDC)

Wipro BoundryLess DataCentre(BLDC) service is the universal marketplace of IT service consumption where customer can consume cloud services for Automation & Orchestration seamlessly between public, private & hybrid cloud/DataCentre from a single portal.

It covers IaaS, PaaS, Containers, DBaaS, Securyty, Compliance, Governance, Monitoring&Management, Optimisation, Chargeback, Discovery, Assessment, Migration


  • Single pane of glass for services aggregation and procurement
  • Simplified management platform to source fulfill operate On_premise_hosted_DC, Public Cloud
  • On demand pay per use utility based consumption model
  • Automated and Orchestrate simple to complex services for provisioning
  • Blueprints that bundle Compute, Storage, Network along with Enterprise policies
  • Analytics and Real-time dashboard for consumption patterns
  • Enterprise class cloud platform to support mission critical workload
  • Built in security and governance to ensure data safety
  • On demand pay per use utility based consumption model
  • Enforcement of security & compliance centrally thereby reducing the risk


  • Aggregation of services across the IT supply chain
  • Create cost and usage transparency from Day 1
  • Quick movements of existing workloads to Hybrid IT delivery model
  • Reporting and Monitoring, billing estimates, actuals, and usage projections
  • Standardized platform ensuring reduced complexity and cost
  • Achieve cost and performance optimization
  • Enhanced end user experience
  • Customer to have complete control on where their data resides
  • Subscription based, pay per use model with multi-target workloads
  • Pre-built and Customizable Blueprints for single click deployment


£45 per instance per month

Service documents


G-Cloud 11

Service ID

9 7 1 4 9 6 2 5 9 0 4 3 6 6 4



Ravindra Vitankar



Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Cloud Assessment, Migration
Cloud deployment model Hybrid cloud
Service constraints Our Boundary Less Datacenter (BLDC) cloud platform is highly scalable platform purpose built for x86 workloads (Windows, Unix, Linux). For any Data Analytics type of requirement, we will work with client for the feasibility of cloud like provision.

There will be planned maintenance period, which will be informed 30 days in advance to client. Since the platform is highly available, we do not anticipate any service outage to client.
System requirements End points with HTML5 Browser

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Request Type Severity Classification Response Time
Incident Management
Priority Level 1 <30 Minutes
Priority Level 2 <60 Minutes
Priority Level 3 <120 Minutes
Service Request
Priority Level 1 <4 hours
Priority Level 2 <10 hours
Priority Level 3 <30 hours
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 AA or EN 301 549
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Yes, at an extra cost
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible We provide support using Lync/ Skype for Business messenger/chat
Web chat accessibility testing None
Onsite support Onsite support
Support levels Our support for the cloud services is provided in onsite offshore combination for effective operational efficiency. Apart from that, depending upon customer requirement, support model can be dedicated or shared.

Support are provided via following mentioned channels:
• Service desk
• Email
• Phone
• Live chat

We provide multiple support options to meet customer requirement. Support window options available are 24/7,8x5, 16x5 and on call. There is atleast 15-25% cost variation in these support models.
We also provide account manager to ensure constant touch point with customer for any escalation, new requirement as well as for overall engagement governance.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We help customers to onboard their workload on to our cloud. As part of transition, we can work with the customer for workload assessment and feasibility study to move them to Wipro BLDC platform.
Post onboarding, we provide training which can be onsite or online depending upon the requirement and scope. Complete transition period is documented apart from routine day-to-day operation which is provided as part of overall user documentation to customer
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction Wipro will provide assistance to remove data and service information from the platform and also help transition
End-of-contract process Wipro contractually commits to specific processes when a customer leaves a cloud service or the contract expires. This includes
- Off-boarding customer service from platform
- Deleting customer data from systems under platform

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service All activities performed from the desktop are available on mobile.
Service interface Yes
Description of service interface -
Accessibility standards None or don’t know
Description of accessibility -
Accessibility testing -
What users can and can't do using the API Users/Admins can consume the APIs for service from BLDC through web interface
Changes to the services will be triggered and tracked by API Service BUS within the platform
API documentation Yes
API documentation formats HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation - Service Offerings and Blueprints can be customized for users
- Need to be communicated to Platform admins
- Platform admins are authorized perform any customization based on the requirements from users without affecting the functionality of original service


Independence of resources Our cloud platform is highly available and scalable. We always have the buffer capacity and also leverage real time analytics to ensure there is no performance impact to end users in case of surge in demand from another customer.


Service usage metrics Yes
Metrics types Compute, Storage, Network, Operating system, Applications, Middleware, Databases, End user experience

Monitoring the
network traffic
Track the events
report and notify stakeholders

Track events that are breaching the thresholds
Correlate the events across the stack and provide visibility into affected components
Run automation workflows to remediation issues
Notify stakeholders on the events
Perform route cause analysis
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Wipro BLDC provides an FTP access to users for data export which will be enabled within the enterprise network
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability A standard set of Service Levels will be applied for the Service.
• Platform availability: 99.95%.
• Single Datacentre 99.9%
• Dual Datacentre 99.95%.

Our SLA’s are as follows

Severity Classification Response Time Resolution Time
Incident Management
Priority Level 1 <30 Minutes 8 hours
Priority Level 2 <60 Minutes 3 Business days
Priority Level 3 <120 Minutes 5 Business days
Service Request
Priority Level 1 <4 hours 1 Business day
Priority Level 2 <10 hours 2 Business days
Priority Level 3 <30 hours 5 Business days
Approach to resilience Our cloud datacenters are Tier-3 equivalent with no single point of failure to ensure no service outage due to physical component failure. All the hardware components within the datacentre such as compute, storage to name few are redundant to ensure resiliency. Platform is virtualised and hence there is no impact in case of host failure. Data is replicated across datacenters to ensure business continuity in case of disaster. Also depending upon workload criticality, databases are clustered and replicated to ensure no data and transaction loss.
More details can be provided on request.
Outage reporting Each customer gets a customised dashboard to know the health of their environment. This dashboard is real time and provides detailed information of customer workloads. If there is an outage, customer will get to know via their dashboard about it. We also configure email alerts to be sent to customers in case of any outage.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels User access to IT infrastructure and applications is granted based on an individual's job responsibilities and business requirements which is described as Role Based Access Controls; on a "need to access" and "need-to-know" basis. Access restriction is role based and the authorization will be obtained as defined in the access control matrix.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for Between 6 months and 12 months
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for Between 6 months and 12 months
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 UKAS Management Systems
ISO/IEC 27001 accreditation date 01/12/2016
What the ISO/IEC 27001 doesn’t cover NA
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification Yes
Who accredited the PCI DSS certification -
PCI DSS accreditation date -
What the PCI DSS doesn’t cover -
Other security certifications Yes
Any other security certifications
  • FIPS 140-2 Compliant
  • Common Criteria Certified
  • ISO/IEC 27001:2013
  • NIST SP 800 Series
  • PCI DSS V3.0

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes Wipro follows Open Web Application Security Project (OWASP) methodology to verify if the service/ platform/ application is exposed to the Top 10 OWASP vulnerabilities. Web Applications are tested for the presence of the OWASP Top 10 vulnerabilities:
 Injection
 Cross-Site Scripting (XSS)
 Broken Authentication and Session Management
 Insecure Direct Object References
 Cross-Site Request Forgery (CSRF)
 Security Misconfiguration
 Insecure Cryptographic Storage
 Failure to restrict URL access
 Insufficient Transport Layer Protection
 Un-validated Redirects and Forwards
Wipro uses a combination of business impact and ease of exploitability in defining the severity of the vulnerabilities. Appropriate mitigation techniques are implemented to fix the vulnerabilities before the applications are promoted to the production environment. Final round of verification is done after the application goes live to ensure the security vulnerabilities do not resurface in production environment.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Wipro’s configuration management process includes building a CMDB with required CI relationships mapped out. The process provides visibility on the interdependencies between the CIs as well as the lifecycle of these CIs. Data feed from a discovery tool is used to populate CMDB and then track CI components through lifetime for data accuracy. Any configuration change in the environment goes through a formal change management process that includes initiating RFC, going through CAB approvals, and executing with rollback plan in place. All changes are assessed for potential security impact. Corresponding CIs are updated post-successful completion of a configuration change.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach • It is mandatory to conduct VA scans for entire Wipro infra devices in a year.All Critical Enterprise infrastructure and devices in DMZ are scanned every month. On a yearly basis a Penetration Testing is performed by third party
• Critical ,Important, Moderate & low patches are updated Within 2,3,5 & 10 days respectively from approval.
• The information related to patches are obtained from authorized and genuine sources such as, but not limited to, Vendor mailing lists and websites, Security Alert announcements or bulletins like SANS & CERT and Virus advisories.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach We have SIEM (Security Incident and Event Monitoring) tool in place which monitors all major network and select compute devices for any suspicious activity matching its comprehensive database of suspicious traffic patterns. Alerts get triggered and our 24x7 SIEM teams investigate into these alerts. They cut out the false positives and focus only on the suspicious cases. They then log a ticket and investigate further based on standard operating procedures.

Wipro’s Information Security Incident Management Policy/Process is published for centralized reporting, managing and escalating logical and physical security incidents/violations by Employees, Contractors, Trainees, and Clients working in Wipro premises.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Wipro’s incident management process includes incident identification, logging, categorisation and prioritisation, diagnosis, major incident review, updates/escalations, tracking, resolution/recovery, closure, and reporting. It uses strong event aggregation, correlation, and suppression to filter noise and treat common events. Users can either report incidents by reaching out to their service desk or through self-service portal made available to them. Alternatively, the common monitoring team will also raise an incident proactively based on qualified alerts received. Wipro uses ServiceNXT™ Smart View for single pane of glass reporting. The tool provides dashboard and pulls out incident feeds from the ITSM to provide incident reports.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • NHS Network (N3)
  • Joint Academic Network (JANET)
  • Scottish Wide Area Network (SWAN)


Price £45 per instance per month
Discount for educational organisations No
Free trial available No

Service documents

Return to top ↑