IT outsourcing service system developed by IT Support Group
On June 30, 2022, the IT outsourcing service system «ASISTA» became an object of intellectual property included in the state register of objects protected by copyright ©
ITSM system developed for the Kazakhstani business space
Asista was created to provide a comfortable working environment for our clients' users and increase the efficiency of IT Support specialists. Asista automatizes the routine processes of an IT service, and its design makes it possible for a user to get a necessary support in a couple of clicks.
Asista eliminates the need for direct contact with a support specialist: just explain your problem, our IT master will connect to your workstation or send a field specialist to you, while you can track the status of your request in real time.
- Gets applications through the web interface
- Works directly with CRM due to the development of the original API
- Shows the status of requests
- Sends notifications via email to users
- Provides convenient access to the archive of requests of an individual user
- Recognizes the user by ID
How to install Asista
What's new in Asista 1.2
- Three separate modules for requests, archive and notifications
- Improved performance of the request module
- You can activate the previously completed request now
- Access to the archive
- Launch of notification system
- Algorithm for installing the system for new users, authorization and access level was developed
Previously, the request submission software (RSS) was a simple feature to help take the burden off the support line 1. But over time, RSS became one of the main directions for the development of the entire group of companies.
We chose to market RSS as a product for the user and focus on user requests and needs.
After the modernization of the system and the creation of a new concept, we introduced Asista, a caring and competent assistant. It is always in touch and ready to provide any specialist to solve IT problems for your enterprise.
Asista is a new management system for support and creation of IT infrastructures.
This is the foundation of Asista. The process of developing our outsourcing service system began with the creation of the request module.
The request module is an interface where the user can fill out a form. The system will send it to our CRM and assign an executor. This specialist will complete the task in order of priority or transfer it to a more experienced line, that is, request level gets increased.
For example, we got a request for the restoration of the printer. The line 1 staff performed the standard procedures to restore the device but they didn't help. In this case, the request is advanced to the line 2. If this fails to yield results, then the request is transferred even further, to the line 3. The task is to be solved by the efforts of several professional masters until the desired result is obtained.
Asista has an archive module. We managed to safely transfer the data from our clients to the CRM system, so it became possible to give users access to archive materials. Access to the data archive can be full (all company requests for the entire period of cooperation) or partial (users see only their own requests).
The list of requests can be generated using time, username or status filters. In addition, it is possible to re-activate any request from the archive, making it relevant.
The most important thing in any interface is the ability to understand what state the system is in at the moment, how it will behave in the future, and what options users have working with it. Asista follows this very principle.
We have made a system of notifications automatically appearing in the working UI at every stage of working with the system.
Access levels and roles in Asista
Ordinary users who need IT support every day. They are the initiators of the majority of requests in the system. They have access only to their own requests in the archive.
IT masters of three support lines, server, service and field specialists. They have an access to ITSG's internal CRM system.
Most often, these are the heads of companies that are serviced by ITSG. But unlike ordinary users, they have access to the archive of all requests by a particular organization.
Programmers with full access to the system. They can make changes to the business logic and algorithm of the Asista.
What are encoder viruses and how can you protect yourself from them
The more of information there are, the more any business processes are tied to it, and the more painful its loss will affect the life of the company.
How to tell if there are viruses on your computer
Viruses are a type of malicious software used to gain access to the computing power of a computer or the information stored in it.
Cartridges: change or refill
A cartridge is a consumable for a printer or multifunctional printing device that contains mainly a dye.
How to interview an IT specialist. Challenges, questions and pitfalls
The importance of IT professionals is underestimated. Moreover, regardless of the size of the company the share of «tech persons» relative to specialists in other aspects of activities is very small.
How to defend against cyber-attacks?
News of another data breach due to a cyber-attack on large companies appears almost every day.
How to charge a laptop battery
The main advantage of a laptop today, along with high performance, is its autonomy, that is the ability to fully work in the forest, car or bathroom for as long as possible, where there is no access to electricity.
How to choose a server
Why do you need it in your office and what you should pay attention to In every company there is a period of technological growth, especially when it comes to work in the IT field in the era of the Internet.
How to choose a printer
How to choose a printer for your office? Today people print less and less in offices, at least they try. However the need to get several (or several hundred) high-quality inexpensive printed sheets per day fast is still a vital necessity for every company.
Business information security
What is business information security and how to ensure it? Information security is a set of measures that you take to protect your confidential data, developments, ideas, technologies and, eventually corporate money.
General Manager of IT Support Group
Your request has been accepted for processing.
Our manager will contact you soon.