IT outsourcing service system developed by IT Support Group

Asista ITSM system

ITSM system developed for the Kazakhstani business space

Asista was created to provide a comfortable working environment for our clients' users and increase the efficiency of IT Support specialists. Asista automatizes the routine processes of an IT service, and its design makes it possible for a user to get a necessary support in a couple of clicks.

Asista ITSM system

Asista eliminates the need for direct contact with a support specialist: just explain your problem, our IT master will connect to your workstation or send a field specialist to you, while you can track the status of your request in real time.

Main functions

  • Gets applications through the web interface
  • Works directly with CRM due to the development of the original API
  • Shows the status of requests
  • Sends notifications via email to users
  • Provides convenient access to the archive of requests of an individual user
  • Recognizes the user by ID
Main functions of Asista
Daria Romasyova, IT specialist of Support Line 2 IT Support Group

How to install Asista

For each new client, we conduct an inventory count and assign a unique ID to each workstation. Asista is installed by a specialist of our company and configured so that the system recognizes the user and workstation upon activation of each new request.
Daria Romasyova,
IT specialist of Support Line 2

What's new in Asista 1.2

  • Three separate modules for requests, archive and notifications
  • Improved performance of the request module
  • You can activate the previously completed request now
  • Access to the archive
  • Launch of notification system
  • Algorithm for installing the system for new users, authorization and access level was developed
What's new in Asista 1.2
  • Asista concept

    Asista concept

    Previously, the request submission software (RSS) was a simple feature to help take the burden off the support line 1. But over time, RSS became one of the main directions for the development of the entire group of companies.

    We chose to market RSS as a product for the user and focus on user requests and needs.

    After the modernization of the system and the creation of a new concept, we introduced Asista, a caring and competent assistant. It is always in touch and ready to provide any specialist to solve IT problems for your enterprise.

    Asista is a new management system for support and creation of IT infrastructures.

  • Asista request module

    Request module

    This is the foundation of Asista. The process of developing our outsourcing service system began with the creation of the request module.
    The request module is an interface where the user can fill out a form. The system will send it to our CRM and assign an executor. This specialist will complete the task in order of priority or transfer it to a more experienced line, that is, request level gets increased.

    For example, we got a request for the restoration of the printer. The line 1 staff performed the standard procedures to restore the device but they didn't help. In this case, the request is advanced to the line 2. If this fails to yield results, then the request is transferred even further, to the line 3. The task is to be solved by the efforts of several professional masters until the desired result is obtained.

  • Asista archive module

    Archive module

    Asista has an archive module. We managed to safely transfer the data from our clients to the CRM system, so it became possible to give users access to archive materials. Access to the data archive can be full (all company requests for the entire period of cooperation) or partial (users see only their own requests).

    The list of requests can be generated using time, username or status filters. In addition, it is possible to re-activate any request from the archive, making it relevant.

  • Asista notification module

    Notification module

    The most important thing in any interface is the ability to understand what state the system is in at the moment, how it will behave in the future, and what options users have working with it. Asista follows this very principle.

    We have made a system of notifications automatically appearing in the working UI at every stage of working with the system.

How to use Asista

We will tell and show the interface

Access levels and roles in Asista

  • Users

    Users

    Ordinary users who need IT support every day. They are the initiators of the majority of requests in the system. They have access only to their own requests in the archive.

  • Specialists

    Specialists

    IT masters of three support lines, server, service and field specialists. They have an access to ITSG's internal CRM system.

  • Admin clients

    Admin clients

    Most often, these are the heads of companies that are serviced by ITSG. But unlike ordinary users, they have access to the archive of all requests by a particular organization.

  • Developers

    Developers

    Programmers with full access to the system. They can make changes to the business logic and algorithm of the Asista.

Blog

What are encoder viruses and how can you protect yourself from them

What are encoder viruses and how can you protect yourself from them

The more of information there are, the more any business processes are tied to it, and the more painful its loss will affect the life of the company.

How to tell if there are viruses on your computer

How to tell if there are viruses on your computer

Viruses are a type of malicious software used to gain access to the computing power of a computer or the information stored in it.

Cartridges: change or refill

Cartridges: change or refill

A cartridge is a consumable for a printer or multifunctional printing device that contains mainly a dye.

How to interview an IT specialist. Challenges, questions and pitfalls

How to interview an IT specialist. Challenges, questions and pitfalls

The importance of IT professionals is underestimated. Moreover, regardless of the size of the company the share of "tech persons" relative to specialists in other aspects of activities is very small.

How to defend against cyber-attacks?

How to defend against cyber-attacks?

News of another data breach due to a cyber-attack on large companies appears almost every day.

How to charge a laptop battery

How to charge a laptop battery

The main advantage of a laptop today, along with high performance, is its autonomy, that is the ability to fully work in the forest, car or bathroom for as long as possible, where there is no access to electricity.

How to choose a server

How to choose a server

Why do you need it in your office and what you should pay attention to In every company there is a period of technological growth, especially when it comes to work in the IT field in the era of the Internet.

How to choose a printer

How to choose a printer

How to choose a printer for your office? Today people print less and less in offices, at least they try. However the need to get several (or several hundred) high-quality inexpensive printed sheets per day fast is still a vital necessity for every company.

Business information security

Business information security

What is business information security and how to ensure it? Information security is a set of measures that you take to protect your confidential data, developments, ideas, technologies and, eventually corporate money.

Leave a request for a free IT audit, and our specialist will check how everything really works for you
“Thank you for your request”
Alexey Belimov,
General Manager of IT Support Group

Thank you!
Your request has been accepted for processing.
Our manager will contact you soon.

Алексей Белимов, генеральный директор IT Support Group