Contenu connexe
Similaire à IRM_E_13.03.2012
Similaire à IRM_E_13.03.2012 (11)
Plus de Hemant_Kumar_Setya
Plus de Hemant_Kumar_Setya (16)
IRM_E_13.03.2012
- 1. Quick Solution Delivery Offered by Knowledge IT
Industry Wise Solutions
Patent & Intellectual Manufacturing Medical & Health care Beauty & care Education Oil and energy
Property Industry Industry Industry Industry Industry
Electronics Franchising Industry Products Construction
Public Utilities Government
Industry Industry & Services Industry
Knowledge IT Solutions
1. IP Management 2. HR Strategy 3. Incident Response
(IPM) Management (HSM) Management (IRM)
4. Emergency Incidence 5. Corporate Governance
Management (EIM) Management (CGM)
Knowledge IT Products
Object Forensic Administration Project Review
Manager (OM) Manager (FM) Manager (AM) Manager (PM) Manager (RM)
Discovery Workflow Schedule Human Resource Corporate
Manager (DM) Manager (WM) Manager (SM) Manager (HRM) Manager (CM)
2012 © Knowledge IT Corporation. All Rights Reserved
- 2. Pick and Use Functions that you Need
With any application, you effectively use only 10% of the application. But with
Knowledge IT’s SaaS applications, you use only those functions that you need.
The Knowledge IT Products
Object Forensic
Manager (OM) Manager (FM)
Review Workflow
Manager (RM) Manager (WM)
Project Administration
Manager (PM) Manager (AM)
Human Resource Discovery
(RM) Manager (HRM) Manager (DM)
Corporate Schedule
Manager (CM) Manager (SM)
Easy Third Party Software
Integration
2012 © Knowledge IT Corporation. All Rights Reserved
- 3. Knowledge IT’s 4 Types of Application
Based on Needs & User Demand
Knowledge IT offers a variety of SaaS applications which do not require initial
investment and installation effort, by providing easy-to-deploy software services at
competitive pricing. The applications supports small businesses and large
corporations, contributing to increasing effectiveness and reducing expenses.
Professional Business Enterprise Ultimate
Individuals・SOHO Small and Medium Small and Medium For large companies
Personal Offices enterprises or Enterprises or looking for full control
or Small Offices Shop owners Enterprise Subcontractors and autonomy
Best for individual Suitable for system ranging Ideal for organizations and Highly specialized set of
use and smaller from two to multiple users. businesses with large groups. administration tools in an
businesses Data access for packaged Security, access privileges as application is ideal for large groups
predetermined privilege based. well as functions can be of people in an organization. This
Typical Usage Secure user access. determined by the customer and Ultimate set comes with the freedom
Size: 1-5 Users Typical Usage set/added per category of users to build a solution view and dig-
Size: 30 and above from Packaged Solution. down feature according to each
Typical Usage customer’s need. Role based as well
Size: 50 and above as privilege based access control can
be set by the Business and above.
Typical Usage
Size: 100 and above
2012 © Knowledge IT Corporation. All Rights Reserved
- 4. Incident Search of Different Types
User Login
Incident Search Result
2012 © Knowledge IT Corporation. All Rights Reserved.
- 6. Incident Registration Notification
Help Desk Manager Login
He may also reply along
Help Desk manager receive the with any feedback or
incident registration alert mail suggestion.
and will assign it to the
concerned analyst.
2012 © Knowledge IT Corporation. All Rights Reserved.
- 7. Incident List
Analyst Login
Analyst finds an
incident assigned to him
2012 © Knowledge IT Corporation. All Rights Reserved.
- 8. Add Follow Up
Analyst Login
Analyst can add follow up if
required to convey his message
to user regarding an incident.
Different Index
Description Form
2012 © Knowledge IT Corporation. All Rights Reserved.
- 9. User Incident List
User Login
Icon of follow up
added by analyst.
User finds follow up
attached by analyst.
2012 © Knowledge IT Corporation. All Rights Reserved.
- 10. Follow Up Notification
User Login
Analyst Login
User may report or give his
acknowledgement on incident
being resolved or follow up
added by analyst.
Analyst will find notification
of user feedback on follow up
via mail.
2012 © Knowledge IT Corporation. All Rights Reserved.
- 11. Incident Modify
Analyst Login
Lock will appear so that no
one else will access it.
2012 © Knowledge IT Corporation. All Rights Reserved.
- 12. Incident Copy
Analyst Login
If the problem occurs again
analyst may copy selected
incident to required folder.
2012 © Knowledge IT Corporation. All Rights Reserved.
- 13. Pull Mail Escalation
Multiple forms with various
KPI’s can be set for mail
escalation by any user.
Mail escalated when
escalation form values
matches.
2012 © Knowledge IT Corporation. All Rights Reserved.