SlideShare una empresa de Scribd logo
1 de 13
Quick Solution Delivery Offered by Knowledge IT
                                                            Industry Wise Solutions

  Patent & Intellectual          Manufacturing        Medical & Health care        Beauty & care     Education              Oil and energy
       Property                    Industry                 Industry                 Industry         Industry                 Industry


                             Electronics              Franchising             Industry Products        Construction
 Public Utilities                                                                                                              Government
                              Industry                  Industry                 & Services              Industry




                                                           Knowledge IT Solutions


                1. IP Management                              2. HR Strategy                               3. Incident Response
                       (IPM)                                 Management (HSM)                                Management (IRM)


                                   4. Emergency Incidence                           5. Corporate Governance
                                      Management (EIM)                                 Management (CGM)




                                                             Knowledge IT Products

                 Object                      Forensic           Administration                Project                Review
              Manager (OM)                 Manager (FM)         Manager (AM)                Manager (PM)           Manager (RM)


               Discovery                 Workflow                    Schedule              Human Resource              Corporate
              Manager (DM)             Manager (WM)                 Manager (SM)            Manager (HRM)             Manager (CM)


                                   2012 © Knowledge IT Corporation. All Rights Reserved
Pick and Use Functions that you Need
  With any application, you effectively use only 10% of the application. But with
  Knowledge IT’s SaaS applications, you use only those functions that you need.

                                                   The Knowledge IT Products


                                                     Object             Forensic
                                                  Manager (OM)        Manager (FM)


                                                    Review              Workflow
                                                  Manager (RM)        Manager (WM)



                                                    Project          Administration
                                                  Manager (PM)       Manager (AM)


                                                 Human Resource        Discovery
               (RM)                               Manager (HRM)       Manager (DM)



                                                    Corporate          Schedule
                                                   Manager (CM)       Manager (SM)




                                                       Easy Third Party Software
                                                              Integration


         2012 © Knowledge IT Corporation. All Rights Reserved
Knowledge IT’s 4 Types of Application
                            Based on Needs & User Demand
                      Knowledge IT offers a variety of SaaS applications which do not require initial
                      investment and installation effort, by providing easy-to-deploy software services at
                      competitive pricing. The applications supports small businesses and large
                      corporations, contributing to increasing effectiveness and reducing expenses.



 Professional                        Business                        Enterprise                          Ultimate


Individuals・SOHO                  Small and Medium               Small and Medium                   For large companies
 Personal Offices                 enterprises or                 Enterprises or                     looking for full control
  or Small Offices                Shop owners                    Enterprise Subcontractors           and autonomy

Best for individual           Suitable for system ranging      Ideal for organizations and       Highly specialized set of
use and smaller               from two to multiple users.      businesses with large groups.     administration tools in an
businesses                    Data access for packaged         Security, access privileges as    application is ideal for large groups
                              predetermined privilege based.   well as functions can be          of people in an organization. This
Users: 1-5                    Secure user access.              determined by the customer and    Ultimate set comes with the freedom
Size: 1-5 Users               Users: 2-1000                    set/added per category of users   to build a solution view and dig-
                              Size: 30 and above               from Packaged Solution.           down feature according to each
                                                               Users: 100-1000                   customer’s need. Role based as well
                                                               Size: 50 and above                as privilege based access control can
                                                                                                 be set by the Business and above.
                                                                                                 Users: 100 and above
                                                                                                 Size: 100 and above


                              2012 © Knowledge IT Corporation. All Rights Reserved
Incident Search of Different Types
                                       Analyst Login




        User Login




                                                       Incident Search Result




   2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Registration
       User Login




2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Occurrence Notification
                           Help Desk Manager Login




Help Desk manager receive the
incident registration alert mail
                                                                                 He may also reply along
and will assign it to the
                                                                                 with any feedback or
concerned analyst.
                                                                                 suggestion.




                                     2012 © Knowledge IT Corporation. All Rights Reserved.
Incident List
                                  Analyst Login




Analyst finds an
incident assigned to him




                  2012 © Knowledge IT Corporation. All Rights Reserved.
Add Follow Up
                              Analyst Login




                                                            Analyst can add follow up if
                                                            required, to convey his message,
                                                            to user regarding an incident.
Different Index
Description Form




                   2012 © Knowledge IT Corporation. All Rights Reserved.
User Incident List
                                             User Login



                 Icon of follow up
                 added by analyst.




User finds follow up
which was added by
analyst.




                         2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Closure & Notification
            User Login




                                              Analyst Login
    User may report or give his
    acknowledgement on incident
    being resolved or follow up
    added by analyst.
                                                 Analyst will find notification
                                                 of user feedback on follow up
                                                 via mail.




   2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Modify
                                       Analyst Login




Lock during modify by
any user or analyst.




                        2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Copy
                          User Login




                       If the problem occurs again
                       user may copy selected
                       incident to required folder.




2012 © Knowledge IT Corporation. All Rights Reserved.
On Demand Escalation
    Multiple escalations with
    various KPI’s can be set for
    multiple user.




                                                 Mail escalated when
                                                 pre-defined criteria
                                                 meets.




2012 © Knowledge IT Corporation. All Rights Reserved.

Más contenido relacionado

La actualidad más candente (20)

IRM_E_13.03.2012
IRM_E_13.03.2012IRM_E_13.03.2012
IRM_E_13.03.2012
 
HSM_E_19.3.12
HSM_E_19.3.12HSM_E_19.3.12
HSM_E_19.3.12
 
IRM_E_25.2.12
IRM_E_25.2.12IRM_E_25.2.12
IRM_E_25.2.12
 
IRM_E_24.2.12
IRM_E_24.2.12IRM_E_24.2.12
IRM_E_24.2.12
 
HSM_E_7.4.12
HSM_E_7.4.12HSM_E_7.4.12
HSM_E_7.4.12
 
IPM_E_10.2.12
IPM_E_10.2.12IPM_E_10.2.12
IPM_E_10.2.12
 
HSM_E_17.3.12
HSM_E_17.3.12HSM_E_17.3.12
HSM_E_17.3.12
 
IEM_E_13.2.12
IEM_E_13.2.12IEM_E_13.2.12
IEM_E_13.2.12
 
IPM_E_3.2.12
IPM_E_3.2.12IPM_E_3.2.12
IPM_E_3.2.12
 
CIM_E_24.2.12
CIM_E_24.2.12CIM_E_24.2.12
CIM_E_24.2.12
 
HSM_E_23.2.12
HSM_E_23.2.12HSM_E_23.2.12
HSM_E_23.2.12
 
IPM_E_17.3.12
IPM_E_17.3.12IPM_E_17.3.12
IPM_E_17.3.12
 
HSM_E_17.3.12
HSM_E_17.3.12HSM_E_17.3.12
HSM_E_17.3.12
 
IPM_E_17.3.12
IPM_E_17.3.12IPM_E_17.3.12
IPM_E_17.3.12
 
HSM_E_21.4.12
HSM_E_21.4.12HSM_E_21.4.12
HSM_E_21.4.12
 
IPM
IPMIPM
IPM
 
HRCM_E_2FEB2012
HRCM_E_2FEB2012HRCM_E_2FEB2012
HRCM_E_2FEB2012
 
IPM_E_17.3.12
IPM_E_17.3.12IPM_E_17.3.12
IPM_E_17.3.12
 
IPM_E_23.4.12
IPM_E_23.4.12IPM_E_23.4.12
IPM_E_23.4.12
 
IPM_E_7.4.12
IPM_E_7.4.12IPM_E_7.4.12
IPM_E_7.4.12
 

Destacado (14)

HSM_J_19.3.12
HSM_J_19.3.12HSM_J_19.3.12
HSM_J_19.3.12
 
IRM_J_9.3.12
IRM_J_9.3.12IRM_J_9.3.12
IRM_J_9.3.12
 
IRM_J_28.2.12
IRM_J_28.2.12IRM_J_28.2.12
IRM_J_28.2.12
 
HRCM_3FEB2012_J
HRCM_3FEB2012_JHRCM_3FEB2012_J
HRCM_3FEB2012_J
 
CIM_J_24.2.12
CIM_J_24.2.12CIM_J_24.2.12
CIM_J_24.2.12
 
CGS_J_19.3.12
CGS_J_19.3.12CGS_J_19.3.12
CGS_J_19.3.12
 
IRM_J_14.3.12
IRM_J_14.3.12IRM_J_14.3.12
IRM_J_14.3.12
 
CGS_J_29.2.12
CGS_J_29.2.12CGS_J_29.2.12
CGS_J_29.2.12
 
IRM_J_19.3.12
IRM_J_19.3.12IRM_J_19.3.12
IRM_J_19.3.12
 
CGM-CMS_3FEB2012_J
CGM-CMS_3FEB2012_JCGM-CMS_3FEB2012_J
CGM-CMS_3FEB2012_J
 
CGS_E_23.4.12
CGS_E_23.4.12CGS_E_23.4.12
CGS_E_23.4.12
 
CGM-CRM_J_3FEB2012
CGM-CRM_J_3FEB2012CGM-CRM_J_3FEB2012
CGM-CRM_J_3FEB2012
 
IRM_E_12.03.12
IRM_E_12.03.12IRM_E_12.03.12
IRM_E_12.03.12
 
CIM_J_24.2.12
CIM_J_24.2.12CIM_J_24.2.12
CIM_J_24.2.12
 

Similar a IRM_E_14.3.12 (10)

CMS_01.03.12
CMS_01.03.12CMS_01.03.12
CMS_01.03.12
 
IPM_E_8.2.2012
IPM_E_8.2.2012IPM_E_8.2.2012
IPM_E_8.2.2012
 
IPM_E_8.2.2012
IPM_E_8.2.2012IPM_E_8.2.2012
IPM_E_8.2.2012
 
IPM_E_8.2.2012
IPM_E_8.2.2012IPM_E_8.2.2012
IPM_E_8.2.2012
 
CGM_E_8.2.2012
CGM_E_8.2.2012CGM_E_8.2.2012
CGM_E_8.2.2012
 
CGS_E_1.3.12
CGS_E_1.3.12CGS_E_1.3.12
CGS_E_1.3.12
 
CGS_E_1.4.12
CGS_E_1.4.12CGS_E_1.4.12
CGS_E_1.4.12
 
CGS_E_7.4.12
CGS_E_7.4.12CGS_E_7.4.12
CGS_E_7.4.12
 
IPM_E_19.3.12
IPM_E_19.3.12IPM_E_19.3.12
IPM_E_19.3.12
 
HSM_E_1.4.12
HSM_E_1.4.12HSM_E_1.4.12
HSM_E_1.4.12
 

Más de Hemant_Kumar_Setya (17)

HSM_J_14.6.2012
HSM_J_14.6.2012HSM_J_14.6.2012
HSM_J_14.6.2012
 
Ipm j 7april2012
Ipm j 7april2012Ipm j 7april2012
Ipm j 7april2012
 
HSM_J_7.4.12
HSM_J_7.4.12HSM_J_7.4.12
HSM_J_7.4.12
 
IRM_J_7.4.12
IRM_J_7.4.12IRM_J_7.4.12
IRM_J_7.4.12
 
IPM_J_7.4.12
IPM_J_7.4.12IPM_J_7.4.12
IPM_J_7.4.12
 
HSM_J_7.4.12
HSM_J_7.4.12HSM_J_7.4.12
HSM_J_7.4.12
 
CGS_J_7.4.12
CGS_J_7.4.12CGS_J_7.4.12
CGS_J_7.4.12
 
IRM_J_1.4.12
IRM_J_1.4.12IRM_J_1.4.12
IRM_J_1.4.12
 
IPM_J_1.4.12
IPM_J_1.4.12IPM_J_1.4.12
IPM_J_1.4.12
 
HSM_J_1.4.12
HSM_J_1.4.12HSM_J_1.4.12
HSM_J_1.4.12
 
CGS_J_1.4.12
CGS_J_1.4.12CGS_J_1.4.12
CGS_J_1.4.12
 
CGS_J_20.3.12
CGS_J_20.3.12CGS_J_20.3.12
CGS_J_20.3.12
 
IRM_J_20.3.12
IRM_J_20.3.12IRM_J_20.3.12
IRM_J_20.3.12
 
IPM_J_20.3.12
IPM_J_20.3.12IPM_J_20.3.12
IPM_J_20.3.12
 
HSM_J_20.3.12
HSM_J_20.3.12HSM_J_20.3.12
HSM_J_20.3.12
 
IPM_J_19.3.12
IPM_J_19.3.12IPM_J_19.3.12
IPM_J_19.3.12
 
IRM_J_19.3.12
IRM_J_19.3.12IRM_J_19.3.12
IRM_J_19.3.12
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

IRM_E_14.3.12

  • 1. Quick Solution Delivery Offered by Knowledge IT Industry Wise Solutions Patent & Intellectual Manufacturing Medical & Health care Beauty & care Education Oil and energy Property Industry Industry Industry Industry Industry Electronics Franchising Industry Products Construction Public Utilities Government Industry Industry & Services Industry Knowledge IT Solutions 1. IP Management 2. HR Strategy 3. Incident Response (IPM) Management (HSM) Management (IRM) 4. Emergency Incidence 5. Corporate Governance Management (EIM) Management (CGM) Knowledge IT Products Object Forensic Administration Project Review Manager (OM) Manager (FM) Manager (AM) Manager (PM) Manager (RM) Discovery Workflow Schedule Human Resource Corporate Manager (DM) Manager (WM) Manager (SM) Manager (HRM) Manager (CM) 2012 © Knowledge IT Corporation. All Rights Reserved
  • 2. Pick and Use Functions that you Need With any application, you effectively use only 10% of the application. But with Knowledge IT’s SaaS applications, you use only those functions that you need. The Knowledge IT Products Object Forensic Manager (OM) Manager (FM) Review Workflow Manager (RM) Manager (WM) Project Administration Manager (PM) Manager (AM) Human Resource Discovery (RM) Manager (HRM) Manager (DM) Corporate Schedule Manager (CM) Manager (SM) Easy Third Party Software Integration 2012 © Knowledge IT Corporation. All Rights Reserved
  • 3. Knowledge IT’s 4 Types of Application Based on Needs & User Demand Knowledge IT offers a variety of SaaS applications which do not require initial investment and installation effort, by providing easy-to-deploy software services at competitive pricing. The applications supports small businesses and large corporations, contributing to increasing effectiveness and reducing expenses. Professional Business Enterprise Ultimate Individuals・SOHO Small and Medium Small and Medium For large companies Personal Offices enterprises or Enterprises or looking for full control or Small Offices Shop owners Enterprise Subcontractors and autonomy Best for individual Suitable for system ranging Ideal for organizations and Highly specialized set of use and smaller from two to multiple users. businesses with large groups. administration tools in an businesses Data access for packaged Security, access privileges as application is ideal for large groups predetermined privilege based. well as functions can be of people in an organization. This Users: 1-5 Secure user access. determined by the customer and Ultimate set comes with the freedom Size: 1-5 Users Users: 2-1000 set/added per category of users to build a solution view and dig- Size: 30 and above from Packaged Solution. down feature according to each Users: 100-1000 customer’s need. Role based as well Size: 50 and above as privilege based access control can be set by the Business and above. Users: 100 and above Size: 100 and above 2012 © Knowledge IT Corporation. All Rights Reserved
  • 4. Incident Search of Different Types Analyst Login User Login Incident Search Result 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 5. Incident Registration User Login 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 6. Incident Occurrence Notification Help Desk Manager Login Help Desk manager receive the incident registration alert mail He may also reply along and will assign it to the with any feedback or concerned analyst. suggestion. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 7. Incident List Analyst Login Analyst finds an incident assigned to him 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 8. Add Follow Up Analyst Login Analyst can add follow up if required, to convey his message, to user regarding an incident. Different Index Description Form 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 9. User Incident List User Login Icon of follow up added by analyst. User finds follow up which was added by analyst. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 10. Incident Closure & Notification User Login Analyst Login User may report or give his acknowledgement on incident being resolved or follow up added by analyst. Analyst will find notification of user feedback on follow up via mail. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 11. Incident Modify Analyst Login Lock during modify by any user or analyst. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 12. Incident Copy User Login If the problem occurs again user may copy selected incident to required folder. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 13. On Demand Escalation Multiple escalations with various KPI’s can be set for multiple user. Mail escalated when pre-defined criteria meets. 2012 © Knowledge IT Corporation. All Rights Reserved.