SlideShare una empresa de Scribd logo
1 de 14
Quick Solution Delivery Offered by Knowledge IT
                                                          Industry Wise Solutions
  Patent & Intellectual          Manufacturing          Medical & Health care         Beauty & care     Education              Oil and energy
       Property                    Industry                   Industry                  Industry         Industry                 Industry


                             Electronics                Franchising              Industry Products        Construction
 Public Utilities                                                                                                                 Government
                              Industry                    Industry                  & Services              Industry




                                                          Knowledge IT Solutions


        1. HR Strategy                      2. Intellectual Property            3. Incident Response           4. Corporate Governance
        Management (HSM)                      Management (IPM)                  Management (IRM)               Management (CGM)




                                                           Knowledge IT Products
                 Object                      Forensic             Administration                 Project               Review
              Manager (OM)                 Manager (FM)           Manager (AM)                 Manager (PM)          Manager (RM)


               Discovery                 Workflow                       Schedule              Human Resource              Corporate
              Manager (DM)             Manager (WM)                    Manager (SM)            Manager (HRM)             Manager (CM)



                                     2012 © Knowledge IT Corporation. All Rights Reserved
Pick and Use Functions that you Need
  With any application, you effectively use only 10% of the application. But with
  Knowledge IT’s SaaS applications, you use only those functions that you need.

                                                   The Knowledge IT Products


                                                     Object             Forensic
                                                  Manager (OM)        Manager (FM)


                                                    Review              Workflow
                                                  Manager (RM)        Manager (WM)



                                                    Project          Administration
                                                  Manager (PM)       Manager (AM)


                                                 Human Resource        Discovery
               (RM)                               Manager (HRM)       Manager (DM)



                                                    Corporate          Schedule
                                                   Manager (CM)       Manager (SM)




                                                       Easy Third Party Software
                                                              Integration


         2012 © Knowledge IT Corporation. All Rights Reserved
Knowledge IT’s 4 Types of Application
                            Based on Needs & User Demand
                      Knowledge IT offers a variety of SaaS applications which do not require initial
                      investment and installation effort, by providing easy-to-deploy software services at
                      competitive pricing. The applications supports small businesses and large
                      corporations, contributing to increasing effectiveness and reducing expenses.



 Professional                        Business                        Enterprise                          Ultimate


Individuals・SOHO                  Small and Medium                Small and Medium                  For large companies
 Personal Offices                 enterprises or                  Enterprises or                    looking for full control
  or Small Offices                Shop owners                     Enterprise Subcontractors          and autonomy

Best for individual           Suitable for system ranging      Ideal for organizations and       Highly specialized set of
use and smaller               from two to multiple users.      businesses with large groups.     administration tools in an
businesses                    Data access for packaged         Security, access privileges as    application is ideal for large groups
                              predetermined privilege based.   well as functions can be          of people in an organization. This
Size: 1-5 Persons             Secure user access.              determined by the customer and    Ultimate set comes with the freedom
User: 1 Person                                                 set/added per category of users   to build a solution view and dig-
                              Size: 2-1000 Persons             from Packaged Solution.           down feature according to each
                              User: 30 and above                                                 customer’s need. Role based as well
                                                               Size: 100-1000 Persons            as privilege based access control can
                                                               User: 50 and above                be set by the Business and above.

                                                                                                 Size: 100 Persons and above
                                                                                                 User: 100 and above

                              2012 © Knowledge IT Corporation. All Rights Reserved
Folder Management




2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Search of Different Types
                                       Analyst Login




        User Login




                                                       Incident Search Result




   2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Registration
       User Login




2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Occurrence Notification
                           Help Desk Manager Login




Help Desk manager receive the
incident registration alert mail
                                                                                 He may also reply along
and will assign it to the
                                                                                 with any feedback or
concerned analyst.
                                                                                 suggestion.




                                     2012 © Knowledge IT Corporation. All Rights Reserved.
Incident List
                                  Analyst Login




Analyst finds an
incident assigned to him




                  2012 © Knowledge IT Corporation. All Rights Reserved.
Add Follow Up
                              Analyst Login




                                                            Analyst can add follow up if
                                                            required, to convey his message,
                                                            to user regarding an incident.
Different Index
Description Form




                   2012 © Knowledge IT Corporation. All Rights Reserved.
User Incident List
                                             User Login



                 Icon of follow up
                 added by analyst.




User finds follow up
attached by analyst.




                         2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Closure & Notification
            User Login




                                              Analyst Login
    User may report or give his
    acknowledgement on incident
    being resolved or follow up
    added by analyst.
                                                 Analyst will find notification
                                                 of user feedback on follow up
                                                 via mail.




   2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Modify
                                       Analyst Login




Lock during modify by
any user or analyst.




                        2012 © Knowledge IT Corporation. All Rights Reserved.
Incident Copy
                          User Login




                       If the problem occurs again
                       user may copy selected
                       incident to required folder.




2012 © Knowledge IT Corporation. All Rights Reserved.
On Demand Escalation
    Multiple escalations with
    various KPI’s can be set for
    multiple user.




                                                  Mail escalated when
                                                  defined criteria meets.




2012 © Knowledge IT Corporation. All Rights Reserved.

Más contenido relacionado

La actualidad más candente (20)

HSM_E_17.3.12
HSM_E_17.3.12HSM_E_17.3.12
HSM_E_17.3.12
 
HSM_E_7.4.12
HSM_E_7.4.12HSM_E_7.4.12
HSM_E_7.4.12
 
IPM
IPMIPM
IPM
 
IPM_E_17.3.12
IPM_E_17.3.12IPM_E_17.3.12
IPM_E_17.3.12
 
HSM_E_17.3.12
HSM_E_17.3.12HSM_E_17.3.12
HSM_E_17.3.12
 
IPM_E_17.3.12
IPM_E_17.3.12IPM_E_17.3.12
IPM_E_17.3.12
 
IPM_E_17.3.12
IPM_E_17.3.12IPM_E_17.3.12
IPM_E_17.3.12
 
IPM_E_7.4.12
IPM_E_7.4.12IPM_E_7.4.12
IPM_E_7.4.12
 
IPM_E_23.4.12
IPM_E_23.4.12IPM_E_23.4.12
IPM_E_23.4.12
 
IPM_E_19.3.12
IPM_E_19.3.12IPM_E_19.3.12
IPM_E_19.3.12
 
HSM_E_21.4.12
HSM_E_21.4.12HSM_E_21.4.12
HSM_E_21.4.12
 
IRM_E_12.03.12
IRM_E_12.03.12IRM_E_12.03.12
IRM_E_12.03.12
 
HSM_E_23.2.12
HSM_E_23.2.12HSM_E_23.2.12
HSM_E_23.2.12
 
CGS_E_1.4.12
CGS_E_1.4.12CGS_E_1.4.12
CGS_E_1.4.12
 
IRM_E_24.2.12
IRM_E_24.2.12IRM_E_24.2.12
IRM_E_24.2.12
 
IPM_E_3.2.12
IPM_E_3.2.12IPM_E_3.2.12
IPM_E_3.2.12
 
IEM_E_13.2.12
IEM_E_13.2.12IEM_E_13.2.12
IEM_E_13.2.12
 
IPM_E_10.2.12
IPM_E_10.2.12IPM_E_10.2.12
IPM_E_10.2.12
 
IRM_E_25.2.12
IRM_E_25.2.12IRM_E_25.2.12
IRM_E_25.2.12
 
IRM_E_13.03.2012
IRM_E_13.03.2012IRM_E_13.03.2012
IRM_E_13.03.2012
 

Destacado (7)

IPM_J_28.2.12
IPM_J_28.2.12IPM_J_28.2.12
IPM_J_28.2.12
 
HSM_E_24.2.12
HSM_E_24.2.12HSM_E_24.2.12
HSM_E_24.2.12
 
IPM_J_11.02.2012
IPM_J_11.02.2012IPM_J_11.02.2012
IPM_J_11.02.2012
 
IRM_J_20.3.12
IRM_J_20.3.12IRM_J_20.3.12
IRM_J_20.3.12
 
CIM_J_6.3.12
CIM_J_6.3.12CIM_J_6.3.12
CIM_J_6.3.12
 
IPM_J_28.2.12
IPM_J_28.2.12IPM_J_28.2.12
IPM_J_28.2.12
 
HRCM_J_3.2.12
HRCM_J_3.2.12HRCM_J_3.2.12
HRCM_J_3.2.12
 

Similar a IRM_E_19.3.12 (10)

CIM_E_24.2.12
CIM_E_24.2.12CIM_E_24.2.12
CIM_E_24.2.12
 
CGS_E_19.3.12
CGS_E_19.3.12CGS_E_19.3.12
CGS_E_19.3.12
 
CGS_E_23.4.12
CGS_E_23.4.12CGS_E_23.4.12
CGS_E_23.4.12
 
CGS_E_7.4.12
CGS_E_7.4.12CGS_E_7.4.12
CGS_E_7.4.12
 
HRCM_E_2FEB2012
HRCM_E_2FEB2012HRCM_E_2FEB2012
HRCM_E_2FEB2012
 
CGS_E_17.3.12
CGS_E_17.3.12CGS_E_17.3.12
CGS_E_17.3.12
 
CGS_E_1.3.12
CGS_E_1.3.12CGS_E_1.3.12
CGS_E_1.3.12
 
CMS_01.03.12
CMS_01.03.12CMS_01.03.12
CMS_01.03.12
 
CGM_E_8.2.2012
CGM_E_8.2.2012CGM_E_8.2.2012
CGM_E_8.2.2012
 
HSM_E_1.4.12
HSM_E_1.4.12HSM_E_1.4.12
HSM_E_1.4.12
 

Más de Hemant_Kumar_Setya (18)

HSM_J_14.6.2012
HSM_J_14.6.2012HSM_J_14.6.2012
HSM_J_14.6.2012
 
Ipm j 7april2012
Ipm j 7april2012Ipm j 7april2012
Ipm j 7april2012
 
HSM_J_7.4.12
HSM_J_7.4.12HSM_J_7.4.12
HSM_J_7.4.12
 
IRM_J_7.4.12
IRM_J_7.4.12IRM_J_7.4.12
IRM_J_7.4.12
 
IPM_J_7.4.12
IPM_J_7.4.12IPM_J_7.4.12
IPM_J_7.4.12
 
HSM_J_7.4.12
HSM_J_7.4.12HSM_J_7.4.12
HSM_J_7.4.12
 
CGS_J_7.4.12
CGS_J_7.4.12CGS_J_7.4.12
CGS_J_7.4.12
 
IRM_J_1.4.12
IRM_J_1.4.12IRM_J_1.4.12
IRM_J_1.4.12
 
IPM_J_1.4.12
IPM_J_1.4.12IPM_J_1.4.12
IPM_J_1.4.12
 
HSM_J_1.4.12
HSM_J_1.4.12HSM_J_1.4.12
HSM_J_1.4.12
 
CGS_J_1.4.12
CGS_J_1.4.12CGS_J_1.4.12
CGS_J_1.4.12
 
CGS_J_20.3.12
CGS_J_20.3.12CGS_J_20.3.12
CGS_J_20.3.12
 
IPM_J_20.3.12
IPM_J_20.3.12IPM_J_20.3.12
IPM_J_20.3.12
 
HSM_J_20.3.12
HSM_J_20.3.12HSM_J_20.3.12
HSM_J_20.3.12
 
IPM_J_19.3.12
IPM_J_19.3.12IPM_J_19.3.12
IPM_J_19.3.12
 
IRM_J_19.3.12
IRM_J_19.3.12IRM_J_19.3.12
IRM_J_19.3.12
 
CGS_J_19.3.12
CGS_J_19.3.12CGS_J_19.3.12
CGS_J_19.3.12
 
IRM_J_19.3.12
IRM_J_19.3.12IRM_J_19.3.12
IRM_J_19.3.12
 

Último

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Último (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

IRM_E_19.3.12

  • 1. Quick Solution Delivery Offered by Knowledge IT Industry Wise Solutions Patent & Intellectual Manufacturing Medical & Health care Beauty & care Education Oil and energy Property Industry Industry Industry Industry Industry Electronics Franchising Industry Products Construction Public Utilities Government Industry Industry & Services Industry Knowledge IT Solutions 1. HR Strategy 2. Intellectual Property 3. Incident Response 4. Corporate Governance Management (HSM) Management (IPM) Management (IRM) Management (CGM) Knowledge IT Products Object Forensic Administration Project Review Manager (OM) Manager (FM) Manager (AM) Manager (PM) Manager (RM) Discovery Workflow Schedule Human Resource Corporate Manager (DM) Manager (WM) Manager (SM) Manager (HRM) Manager (CM) 2012 © Knowledge IT Corporation. All Rights Reserved
  • 2. Pick and Use Functions that you Need With any application, you effectively use only 10% of the application. But with Knowledge IT’s SaaS applications, you use only those functions that you need. The Knowledge IT Products Object Forensic Manager (OM) Manager (FM) Review Workflow Manager (RM) Manager (WM) Project Administration Manager (PM) Manager (AM) Human Resource Discovery (RM) Manager (HRM) Manager (DM) Corporate Schedule Manager (CM) Manager (SM) Easy Third Party Software Integration 2012 © Knowledge IT Corporation. All Rights Reserved
  • 3. Knowledge IT’s 4 Types of Application Based on Needs & User Demand Knowledge IT offers a variety of SaaS applications which do not require initial investment and installation effort, by providing easy-to-deploy software services at competitive pricing. The applications supports small businesses and large corporations, contributing to increasing effectiveness and reducing expenses. Professional Business Enterprise Ultimate Individuals・SOHO Small and Medium Small and Medium For large companies Personal Offices enterprises or Enterprises or looking for full control or Small Offices Shop owners Enterprise Subcontractors and autonomy Best for individual Suitable for system ranging Ideal for organizations and Highly specialized set of use and smaller from two to multiple users. businesses with large groups. administration tools in an businesses Data access for packaged Security, access privileges as application is ideal for large groups predetermined privilege based. well as functions can be of people in an organization. This Size: 1-5 Persons Secure user access. determined by the customer and Ultimate set comes with the freedom User: 1 Person set/added per category of users to build a solution view and dig- Size: 2-1000 Persons from Packaged Solution. down feature according to each User: 30 and above customer’s need. Role based as well Size: 100-1000 Persons as privilege based access control can User: 50 and above be set by the Business and above. Size: 100 Persons and above User: 100 and above 2012 © Knowledge IT Corporation. All Rights Reserved
  • 4. Folder Management 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 5. Incident Search of Different Types Analyst Login User Login Incident Search Result 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 6. Incident Registration User Login 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 7. Incident Occurrence Notification Help Desk Manager Login Help Desk manager receive the incident registration alert mail He may also reply along and will assign it to the with any feedback or concerned analyst. suggestion. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 8. Incident List Analyst Login Analyst finds an incident assigned to him 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 9. Add Follow Up Analyst Login Analyst can add follow up if required, to convey his message, to user regarding an incident. Different Index Description Form 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 10. User Incident List User Login Icon of follow up added by analyst. User finds follow up attached by analyst. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 11. Incident Closure & Notification User Login Analyst Login User may report or give his acknowledgement on incident being resolved or follow up added by analyst. Analyst will find notification of user feedback on follow up via mail. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 12. Incident Modify Analyst Login Lock during modify by any user or analyst. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 13. Incident Copy User Login If the problem occurs again user may copy selected incident to required folder. 2012 © Knowledge IT Corporation. All Rights Reserved.
  • 14. On Demand Escalation Multiple escalations with various KPI’s can be set for multiple user. Mail escalated when defined criteria meets. 2012 © Knowledge IT Corporation. All Rights Reserved.