Biometrics-A Vision for the Future
J a n u a r y 2 0 1 1
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
INSTRUCTIONS
This is an automated template for the technical whitepaper
series Enlighten. The following guidelines will help you work at it
effectively to create a market facing output. Once completed
please send it across to [email protected]. We shall get back to
you with the final copy.
Cover Page: Please update only the Title and the Year – Month.
Once you move onto writing the other sections, the same shall
be automatically updated at the header across all the pages.
Table of Contents: Do not make any changes to this page. Any
change if need be to the heading of a page, should be done at
the page itself (in the heading format as used currently). Once
the paper is complete move to the TOC, right click and “update
fields”. The table shall be update automatically.
Highlight Pad : On the left of each page, you will find a Grey
color box which you will need to use for one key point from the
text on the right/ quotation/ statistic etc.
Addition/ Removal of Pages : Writing can be continued, onto
the pages to write additional content. Table of content should be
updated at the end to account for all such modifications.
Final Page: This is uneditable text carrying information about
HCL and ERS.
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
Abstract ......................................................................................... 4
Abbreviations ................................................................................. 5
Introduction: The Emergence of the Need for Security .................... 6
Choice of sensing techniques ......................................................... 7
Biometrics Technology Types......................................................... 8
How does Biometric Technology Works?...................................... 12
Selection of Biometric System – Parameters ................................ 14
Market Facts and Trends ............................................................. 17
Conclusion ................................................................................... 20
Reference .................................................................................... 21
Authors Info ................................................................................. 21
TABLE OF CONTENTS
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
4
Abstract
Biometrics technologies are base for a plethora of highly secure identification and personal verification solutions. But there arises a need for more robust systems in order to tackle the increasing incidents of security breaches and frauds. So there is always a need for fool proof technology that can provide security and safety to individuals and the transactions that the individuals make. This paper explores the need for biometrics in state and local governments, in the military, in commercial applications, Airports and Aircrafts. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from Biometrics. Also here the various markets and the potential revenue are analyzed.
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
5
Abbreviations
Sl. No. Acronyms
(Page
No.)
Full form
1 IT (6)
Information Technology
2 PIN (6)
Personal Identification Number
3 ATM (8)
Automatic Teller Machine
4 DNA (11) Deoxyribo Nucleic Acid
5 FVC (16) Fingerprint Verification Competition
6 FRVT (16) Face Recognition Vendor Test
7 ICE (16) Iris Challenge Evaluation
8 CAGR (17) Compounded Annual Growth Rate
9 IBG (18)
International Biometrics Group
10 AFIS (18) Automated Fingerprint Identification
System
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
6
Introduction: The Emergence of the Need for Security
Biometric is a methods of recognizing a person based on physiological or behavioral characteristics. Biometric technologies are becoming an additional layer added to existing system. There are bundle of highly secure identification and personal verification solutions but it is much required to have a robust system, encountering the security breaches and transaction frauds. It is one technology that is caught the attention of major IT vendors and it is regarded as an area that no segment of the IT industry can afford to ignore. Biometrics provides a hierarchical structure of data protection, making the data more secure. It is considered to act as a shield to existing system protecting the system from the mischief mongers. E-commerce developers are exploring the use of biometrics and smart cards to more accurately verify a trading party's identity. Banks are bound to use this combination to better authenticate customers and ensure non-repudiation of online banking, trading and purchasing transactions. Biometrics can help to obtain secure services over the telephone through voice authentication. Researchers hope to use biometrics to automatically identify known suspects entering buildings or traversing crowded security areas such as airports. Biometrics is being used to improve employee identity verification and access authorization, passenger identity verification, and flight crew identity verification. Adding biometrics to existing access control systems and security procedures could potentially protect against unauthorized access using lost, stolen, or forged badges; a terrorist on watch list attempting to obtain a credential using an assumed identity; and impersonation of a pilot, other flight crew member, or air traffic controller, by a terrorist. Although there are legal concerns about civil liberties with overly intrusive airport security systems, utilizing biometrics for personal authentication is becoming convenient and considerably more accurate than current methods (such as the utilization of passwords or PINs). The need of the hour is a technology to replace the inefficient current system that relies on manual workers. So Biometrics is the technology that the future will hold, although there are still considerable political and airline resistance, some fingerprint biometric systems are being used at certain airports. Technologists are constantly working visualizing the next generation security systems with multiple levels of biometrics security implemented, i.e., multimodal biometrics, aliveness detection, gait analysis etc. Also researches are in progress to minimize the manual intervention of the user with the system. This paper will explain the biometrics technologies and also the potential market demands projected by the research reports in different modalities of biometrics and application areas.
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
7
Choice of sensing techniques
Multimodal Biometrics Biometric systems relying on a single technology are currently deployed, with various levels of success, in many different application contexts (airports, passports, physical and logical access control, etc.). However, by combining more than one modality, enhanced performance reliability and even increased user acceptance could be achieved. Combining less reliable technologies in sequence could strengthen the overall system performance and combining them in parallel could increase the flexibility of the system by providing alternative modes for the verification/identification process. Aliveness Detection Aliveness detection can be added to fingerprint readers to discourage the use of fake fingers or, as in this case, carjacking and dismemberment. The idea is to detect whether or not the fingerprint is being presented by a living finger. Fingertips have a layered structure. The epidermis is the outermost layer and is not living tissue. Beneath the epidermis is the dermis. These two layers have different physical characteristics. For example the epidermis is harder, dryer, and has less electrical conductivity. The dermis has the same fingerprint as the epidermis and some sensors actually detect the print from this layer rather than the surface. Aliveness detection can be done at both levels but generally the deeper the sensor looks into the finger, the more reliable the aliveness measure can be. There are many techniques for detecting aliveness:
Blood flow Hematocrit Skin exudates Transpiration of gases
Spectran identity of tissue
Blood Oxygenation-Pulse Oximetry
Electrical Plethysmography
Electrical properties of skin
Electrocardiographic signals
Biochemical Assays of tissue
Differential blood volume
Mechanical properties of Skin
Pulse Blood pressure
Moisture and warmth
Papillary lines
Apart from these focus can be on special areas such as Multispectral lines analysis, Color Identification and Bone Structure.
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
8
Biometrics Technology Types
Biometrics is an automated method of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice.
Iris Scan Retinal Recognition
Facial Recognition
Fingerprint Recognition
Odour Hand Geometry
Recognition
Ear Shape Recognition
Thermo gram
Foot Prints Dynamic Grip Recognition
Gait Recognition
Finger Nail bed Identification
Skin Elements Lips Vein Scan Voice Recognition
Signature Recognition
Key Stroke Recognition
DNA Matching
Skull Structure
Comparison of Various Biometrics Types Here a comparison is made taking the most commonly used Biometrics Modalities in the market. Method Advantages Disadvantages Possible
Applications
Fingerprint Verification
High reliability – no two people have ever been found to have identical fingerprints.
Robust.
Highly distinctive.
Proven accuracy – has been used by police forces for more than 100 years to solve crimes.
Advanced technology.
User convenience.
Uniqueness.
Stable over time.
Some users associate it with a “criminal” stigma.
Functional defects are possible if the fingertips are very dirty or worn.
Hygienic considerations as a result of skin contact with the sensor.
Injury can affect.
Dry skin, grease & sweat can cause recognition difficulties.
Poor environmental conditions can adversely affect collection.
Access Control (IT, building, physical)
ATM‟s
Motor Vehicle access
PC/Laptop access
Identification
Forensics
Hand Geometry
Small template
Unaffected by skin
Size of scanner
Hygiene considerations as a result of
Time and attendance
Access Control (IT,
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
9
Method Advantages Disadvantages Possible Applications
condition
skin contact with the sensor
Juvenile growth
Injury can affect
Low distinctiveness
building, physical)
Face Recognition
High precision
Efficient process
High acceptance because no physical contact with the sensor is necessary
The face changes over time.
Can be manipulated by surgery.
Cannot distinguish between twins.
Religious or cultural inhibitions.
Poor environmental conditions can adversely affect collection.
Access Control (IT, building, physical)
Crowd Control
Border Control
Recognition /identification systems
Retinal Scanning
Uniqueness– no two people have identical retina patterns. - Robust
Stable over time.
Highly distinctive.
Not user-friendly.
The procedure is often perceived as unpleasant - fear of “eye scans”.
Slow read time.
High user training requirement.
Poor environmental conditions can adversely affect collection.
Access Control (IT, building, physical).
Iris Scanning
Uniqueness – no two people have ever been found to have the same iris structure.
Robust.
Relatively new technology
Complex procedure
High costs
Protected by patent until 2005, which was
Access Control (IT, building, physical)
ATM
Airline check-in
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
10
Method Advantages Disadvantages Possible Applications
Very precise and efficient method.
High acceptance because no physical contact with the sensor is necessary.
Stable over time.
Highly distinctive.
hindering technological advancement.
Poor environmental conditions can adversely affect collection.
Voice Recognition
High level of user acceptance because the voice is a natural form of communication.
The voice is a characteristic, individual feature.
Simple and cost-effective technological application.
Low training requirement.
Voice and language usage change over time (e.g. as a result of age or illness).
Easy to manipulate, can be surgically altered.
Computerized solutions often have low accuracy.
Poor environmental conditions can adversely affect collection.
Access Control (IT, building, physical).
Mobile phones.
Internet banking.
Signature Recognition
High user acceptance.
Low training requirements.
Unstable over time.
Changes over time.
Lengthy enrollment process.
Low distinctiveness.
Portable devices (e.g. courier delivery).
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
11
Method Advantages Disadvantages Possible Applications
DNA Analysis
DNA is unique.
Even twins do not have the same DNA structure.
Sample taking and analysis are time and cost-consuming processes.
Only feasible on a limited basis.
Problems relating to data protection.
Cloning will mean that DNA is no longer unique.
Criminal forensics.
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
12
How does Biometric Technology Works?
There are many different types of biometric systems, including facial recognition, hand geometry, iris recognition, retina recognition, and speaker recognition. Each of these systems involves similar processes such as Enrollment, Verification, Identification and Screening. Enrollment In the enrollment step the user needs to prove his or her identity, furnishes the identification document. The biometric characteristics of the concerned user are linked to the identity specified in the identification document. This ensures that the reference template is linked to the right identity. This is a key step which determines the integrity of the system. After the enrollment process the user provides any or the required biometric samples (like Fingerprint, Iris Pattern or Hand Geometry) to an acquisition device, usually a biometric sensor. Here the system acts operates in the data acquisition mode, where the device or scanner is used to populate the database. The acquired data is encrypted using any secure algorithm and stored in the central/remote database. The storage can also be made in the memory chips or cards. The user may need to enroll and present the samples multiple times as small changes in positioning, distance, pressure, environment, and other factors influence the generation of a template, and it is expected to be unique. Therefore, a person may need to present biometric data several times in order to enroll. The reference template may then represent an amalgam of the captured data, or several enrollment templates may be stored. In addition, because biometric features can change over time, people may have to reenroll to update their reference template. Verification The verification step objective is to confirm that a person is in fact who he or she claims to be. Here the real time input is compared with the stored template to determine whether or not there is a match. Verification is always considered to be “one-to-one” matching. Out of the millions of reference templates, only one needs to be compared to the sample template. The output of the verification systems is a match /no match decision in less than a second. In case of using multimodal or liveness detection priorities are set and also the system acts as a toll gate. Identification The identification systems are considered to perform “one-to-many” matching, where the sample template is compared against the stored reference templates of all individuals enrolled in the system. There are two types of identification systems – Positive and Negative. Positive identification systems: Determine whether a user seeking access can be identified as having been enrolled in the system. Negative identification systems: Ensures that a user‟s biometric information is not present in a database. For example, a negative
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
13
identification system may be designed to identify people on a watch list. Screening It is a step where the input templates are collected from many users and the process of comparing is done with all the Enrolled reference templates. It is considered to be “many to many” matching. The outcome of this step is a decision where it notifies X people out of the N numbers are identifies.
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
14
Selection of Biometric System – Parameters
Parameters for the selection of Biometrics
Parameter Explanation
Accuracy Is the system accurate in terms of low error rates?
Environment Is the technology fully deployable?
Ergonomics/user friendly
Is the system user friendly?
Stability and Uniqueness
Is the feature being measured unique and stable over time?
Security Is the system secure? Could it be easily tampered with or spoofed?
Safety Is the system safe to use? Does it present any dangers to the user?
Speed of enrolment and recognition
How long does it take to enroll a subject? How long does verification take?
Non-intrusiveness
Is the technology intrusive to use?
Convenience Is the system convenient to use? Is the system convenient to integrate with other systems or processes?
Cost How much does the technology cost?
Size of stored template
How big is the stored template?
Operational limitations
What are the limitations of the technology in the deployed environment? (i.e. how well does the technology cope if the user is wearing protective clothing?)
Requirement What is the system required to do? Can it perform both identification and verification tasks?
Credible scientific research
Is there credible scientific research to support the technology?
Human acceptance
Is the technology acceptable to users?
Parameters to Guide Selection of Facial, Fingerprint and Iris biometrics
Parameter Fingerprint Face Iris
Accuracy Very accurate Accurate, although not as good as iris or fingerprint
Most accurate of all commercially available biometrics (second only to DNA)
Environment Can be used across a range of
Can be used across a range of
Can be used across a range of
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
15
Parameter Fingerprint Face Iris
environments, but contaminated environments may cause issues
environments, but susceptible to poor lighting and different backgrounds
environments
Ergonomics/user friendly
Once user is familiar, easy to use
Easy to use Once user is familiar, easy to use
Stability and Uniqueness
Stability may be affected by injury, environment and age. Probability of two people possessing the same fingerprint is 1
in 1080
Likely to change (e.g. with age, and health status), due to similarity in face shapes, uniqueness is questionable
Stable, probability of two people having the same iris is 1
in 1078
Security Susceptible to spoofing, low probability of success in high security systems.
Susceptible to spoofing, medium probability of success.
Spoofing is possible, but low probability of success in high security systems.
Safety May be some hygiene issues with sensors that require contact, otherwise safe to use
Safe to use Safe to use
Speed of enrolment and recognition
Enrolment < 30 sec, verification < 1 sec, identification proportional to size of database
Enrolment < 35 sec, verification < 1 sec, identification proportional to size of database
Enrolment < 1 minute, verification < 2 sec, identification 1-2 sec based on database of 100,000 irises
Non-intrusiveness
Needs user cooperation
Unobtrusive Needs user cooperation
Convenience Range of different sensor sizes, fixed and free
Range of different camera sizes, fixed and free
Range of different sensor sizes, fixed and free
Cost Low - Medium, varies
Low, varies according to sensor
Low - Medium, varies
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
16
Parameter Fingerprint Face Iris
according to sensor
according to sensor
Size of stored template
Varies according to sensor, approx 250 bytes
Varies according to sensor, approx 1300 bytes
Varies according to sensor, approx 512 bytes
Operational limitations
Unsuitable for use with protective clothing, damaged or soiled hands, but has been shown to work successfully in a variety of environments
Poorly or excessively lit environments may pose problems, backgrounds may also impact on picture quality
Possibly effected by the use of protective eye wear, although some studies have shown it to work through them
Requirement Works well in watch list and verification applications
Works well in surveillance, watch list and verification applications
Does not work well in surveillance or watch list applications as user cooperation is required
Credible scientific research
Plethora of research, Fingerprint Verification Competition (FVC) multi-vendor testing
Plethora of research, Face Recognition Vendor Test (FRVT) multi-vendor testing
Plethora of research, Iris Challenge Evaluation (ICE) multi-vendor testing
Human acceptance
Some issues with acceptance exist due to the association with criminality
Most accepted of all biometrics
Questionable, more research required
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
17
Market Facts and Trends
Morgen Keegan Survey According to US based Morgan Keegan biometrics is being incorporated into numerous governmental programs and security systems. In parallel, Private sector organizations are rapidly ramping-up the use of biometric technology to increase security, productivity, and profitability. Key Forecasts
The total biometrics market will grow at a 25% CAGR,
reaching $4.2 billion in 2011 in industry revenue
Fingerprint technology will remain the dominant biometric
identifier across all applications (in terms of revenue) due to
high familiarity, low overall cost factors, and the existence of
large legacy fingerprint databases
Private sector organizations are rapidly ramping-up the use
of biometric technology to increase security, productivity,
and profitability
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
18
IBG Survey According to International Biometrics Group (IBG) research report, the global market for Biometrics slated for high growth through 2014. In terms of technology, Automatic Finger Identification System (AFIS)/ Live Scan will be the main revenue contributor, which was worth $1.3 billion in 2009; this market is forecasted to grow to $2.9 billion by 2014.
Key Forecasts
The total biometrics market will grow at a 22.3% CAGR for
the next five years, thus reaching $9.37 billion in 2014 in
industry revenue.
International Biometric Group Expects Biometric Market to
Nearly Triple by 2014
Global biometric revenues are projected to grow from
US$3.42billion in 2009 to $9.37 billion in 2014, driven in part
by government identity management and border
management programs.
Fingerprint recognition including AFIS is dominant: 2/3 of
biometric market. Fingerprint is expected to gain 45.9% of
the non-AFIS biometrics market in 2009, followed by face
recognition at 18.5% and iris recognition at 8.3%.
Annual iris recognition revenues are projected to approach
$700 million by 2014
Asia and North America are expected to be the largest
global markets for biometric product and services
Vein recognition is expected to play a larger role in access
control applications, eventually comprising more than 10%of
this market
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
19
Acuity Market Intelligence Survey A more recent long-term forecast from the US-based Acuity Market Intelligence indicates similar expected growth. Key Forecasts
The total biometrics market will grow at a 19.69% CAGR for
the next eight years, thus reaching $10.9 billion in 2017 in
industry revenue.
The Central and South American region will experience the
highest CAGR over the forecast period of 39.46%, the
overall market dominance will shift from Europe (and the
greater EMEA region) and the US (and the greater North
America region) to Asia (and the greater Asia Pacific region).
By 2017, the Asia Pacific Region will generate the greatest
percent of revenues for the biometrics industry with more
than 32% of global revenues.
The dominance of AFIS/Livescan and Fingerprint continues
thorough 2009-14. However, by 2017 iris and face
recognition begin to rival their dominance together
accounting for more than 33% of global revenues.
Commercial deployment revenues match to Public Sector
revenues in 2014 and then surpass Public Sector
representing more than 55% of the total global market for
biometrics core technology by 2017.
The percent of revenue from Identification Services declines
over the period 2009-14 but only from 65% to 47%.
Surveillance and Monitoring posts the strongest percentage
gain growing from less than 1% to nearly 8% of total market
revenue.
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
20
Conclusion
Biometrics systems have found a worldwide use and have penetrated into many markets but still biometric technologies are evolving and emerging towards a large scale of use. Attempts are also being made to standardize common software interfaces to enable sharing of biometric templates and to permit the effective comparison and evaluation of different biometric technologies. Biometric systems still face the major challenge of securing the user's template. The templates represent the user‟s personal characters and hence pose a threat to invading one's privacy if not stored properly. Also storing the template in a centralized database paves for attack and compromise. One of the option that has been looked upon for secure storage are the smart cards, which will enhance the individual privacy and increase the protection from attacks as the individual users control their own templates. Biometrics does have a promising future in the next generation authentication and security systems. It is the right time for the companies to boost their biometric capabilities and also invest in technologies pertaining to Biometrics keeping the demands of the industry in mind. Key Takeaways from the Research Reports
International Biometric Group Expects Biometric Market to
Nearly Triple by 2014
Use of Biometric technologies is going to be common
across the world
Investment on a multimodal biometric solution with
liveliness detection would be a key differentiator and a
game changing solution
Asia and North America are expected to be the largest
global markets for biometric product and services
Security cost is a major concern of Airlines and Airports.
Partial or full automation of passenger operations would
result in a sizeable business opportunity for airports and
airlines
Finger print (AFIS) followed by Face recognition and Iris
recognition are going to be the key modalities around which
the biometrics market will revolve
All the above surveys indicate an increasing trend in the
growth of the Biometrics market
IT IS STILL A RIGHT TIME TO INVEST
/Biometrics-A Vision for the Future | January 2011
© 2010, HCL Technologies. Reproduction Prohibited. This document is protected under Copyright by the Author, all rights reserved.
21
Reference
Biometrics Technology Review 2008, Rebecca Heyer
BIOMETRICS, Chris Roberts, November 2005
Morgan Keegan - Biometrics, Industry Overview for the
Investment Community, October 2006
IBG Survey - Biometrics Market and Industry Report 2009-
2014-
http://www.biometricgroup.com/reports/public/market_report
.php
Future of Biometrics- Published by Acuity Market
Intelligence August 2009
Authors Info
Kumaralingam R is a postgraduate from IIT
Bombay. He has an experience of about 9 years
in the IT industry and is working as a Solution
Evangelist with Indian IT giant HCL
Technologies, Chennai (India).
Rahul G is a graduate from Sastra University.
He has an experience of about 4 years in the IT
industry and is working as a Solution Evangelist
with Indian IT giant HCL Technologies, Chennai
(India).
Hello, I’m from HCL’s Engineering and R&D Services. We enable technology led organizations to go to market with innovative products & solutions. We partner with our customers in building world class products & creating the associated solution delivery ecosystem to help build market leadership. Right now, 13000+ of us are developing engineering products, solutions and platforms across Aerospace and Defense, Automotive, Consumer Electronics, Industrial Manufacturing, Medical Devices, Networking & Telecom, Office Automation, Semiconductor, Servers & Storage for our customers.
For more details contact [email protected]
Follow us on twitter http://twitter.com/hclers and our blog http://ers.hclblogs.com/
Visit our website http://www.hcltech.com/engineering-services/
About HCL
About HCL Technologies HCL Technologies is a leading global IT services company, working with clients in the areas that impact and redefine the core of their businesses. Since its inception into the global landscape after its IPO in 1999, HCL focuses on „transformational outsourcing‟, underlined by innovation and value creation, and offers integrated portfolio of services including software-led IT solutions, remote infrastructure management, engineering and R&D services and BPO. HCL leverages its extensive global offshore infrastructure and network of offices in 26 countries to provide holistic, multi-service delivery in key industry verticals including Financial Services, Manufacturing, Consumer Services, Public Services and Healthcare. HCL takes pride in its philosophy of „Employee First‟ which empowers our 64,557 transformers to create a real value for the customers. HCL Technologies, along with its subsidiaries, had consolidated revenues of US$ 2.7 billion (Rs. 12,565 crores), for the year ended as on 30th June 2010. For more information, please visit www.hcltech.com
About HCL Enterprise
HCL is a $5.3 billion leading global technology and IT enterprise comprising two companies listed in India - HCL Technologies and HCL Infosystems. Founded in 1976, HCL is one of India's original IT garage start-ups. A pioneer of modern computing, HCL is a global transformational enterprise today. Its range of offerings includes product engineering, custom & package applications, BPO, IT infrastructure services, IT hardware, systems integration, and distribution of information and communications technology (ICT) products across a wide range of focused industry verticals. The HCL team consists of over 71,000 professionals of diverse nationalities, who operate from 29 countries including over 500 points of presence in India. HCL has partnerships with several leading Global 1000 firms, including leading IT and technology firms. For more information, please visit www.hcl.com