Kinetic Data

Platform use cases

These use cases represent just a few the ways the Kinetic Platform can help your team(s).

Server Virtualization and Provisioning

Virtually eliminate the pain of server virtualization and streamline other DevOps Processes

Problem: Corporations and government agencies can realize great financial benefits and architectural flexibility through server virtualization. However, migrating from physical to virtual servers is challenging: each migration is a mini project, and enterprises can have thousands of migrations. These projects also have many touch points and cross dependencies, and may have significant business impacts. The volume and complexity is daunting for many organizations.

Ideal: The goal of most enterprises is to quickly provision cloud infrastructure and easily migrate appropriate systems to the virtual world, maximizing savings and gaining architectural benefits, while also minimizing business disruptions.

How: Kinetic Request coupled with Kinetic Task provides simple-to-complete forms for tracking physical-to-virtual (P2V) requests and movement status. Kinetic Request makes it easy for project managers to register which machines should move. Kinetic Calendar provides visibility into business activity to enable intelligent decisions on when to move them.

Kinetic Task automates processes, keeping change management changes updated with subtasks for completing the move, while constantly providing up-to-date status on migration activity. This coordinated activity lowers costs, reduces confusion and completes migration projects faster.

Benefits: A coordinated approach to server virtualization accelerates the project, bringing the cost-savings to an organization sooner and providing unprecedented flexibility. Using Kinetic Data tools to accomplish this enables executives to minimize business disruptions. Executives can avoid interruptions in business processes, project managers can visually monitor migration status, and technical employees get clear directions on what to do and when to do it. This coordinated activity allows a large organization to churn through their projects in a cost-effective and business-safe manner. Other benefits include:

  • Executive visibility;
  • Minimized disruption;
  • Simplified scheduling;
  • Clear communication; and
  • Quick ROI.

Conclusion: Virtual server migration offers great financial savings and architectural flexibility, but it is a complex task. Using Kinetic Request, Kinetic Task, and Kinetic Calendar simplifies the process of moving from physical to virtual servers through simplified request management automation tasks, accelerating the P2V migration process while minimizing business disruptions.

Information Security

A Better Response to Cyber Threats

Problem: Cyber attacks on corporate and government networks are increasingly common as malicious actors around the globe seek to steal sensitive consumer data and intellectual property. Despite the best efforts and extensive investments made to protect networks and information, the scale and sophistication of cyber attacks make a data breach all but inevitable for most enterprises at some point.

Ideal: Cyber defenses successfully repel most intrusion attempts. If a breach does occur, the organization is able to quickly assemble a team of experts in an online collaboration space to identify the intrusion point, patch it, and get critical systems up and running again, promptly and securely.

How: Using the built in discussion function of the platform

The most urgent objective is to patch the breach point and resume secure operations of critical systems. But the resolution process should also be captured and archived, to assist with both longer-term data security planning and subsequent legal investigation of the attack to identify the perpetrators.

Benefits: Information security team members, inside or outside the organization, have a powerful yet easy-to-use tool for collaborating, communicating, and coordinating efforts to quickly stop the breach and resume normal network operations. Other benefits include:

  • Secure communications;
  • Real-time visibility into issue resolution status for executives;
  • Integration with other applications and tools;
  • Ability to easily share documents, diagrams, log files, and other key information; and
  • Task assignments and management so everyone knows "who's doing what."

Conclusion: Given the scale of online criminal activity, it's virtually inevitable most business and government networks will suffer a successful intrusion at some point. If a data breach does occur, having a team, plan, and the right collaboration tool in place is vital to minimizing the damage and resuming normal, secure business operations as quickly as possible.

Service Quality Automation Management

Meeting SLAs? If not, know now—and know why.

Problem: Whether you are a service provider assisting external clients or managing an internal IT group servicing different business units or divisions, failing to meet SLA targets is costly. Most SLA monitoring tools will only tell you if you’ve missed a target after the fact, and they won’t tell you exactly why the goal was missedparticularly if delays were caused by an external vendor or cloud service provider. You can’t take corrective actions in real time, and you can’t pinpoint the source of problems retroactively.

Ideal: Your team meets its targets most of the time. And when an SLA goal is missed, for any client or business divisionor is even at risk of being missedyou know immediately. As a process manager, you’re alerted if an SLA is out of compliance so you act right away. You can drill down into the discrete steps in the process and determine the who-what-where of the source of the problem and take corrective action.

How: With the Service Quality Automation Management (SQAM) Kinetic Application (or KAPP) and Kinetic Task

SQAM tracks both overall time to complete a multi-step process as well as times for each discrete task. Every defined action, or trigger, stops or starts a new timer.

These actions are defined in Kinetic Task, and can be triggered from virtually any application or source capable of communicating using common protocols (API's, Web Services, SOAP, REST, etc.): ERP, CRM and ITSM platforms, cloud applications, IoT devices, payment systems and more.

Dozens of Kinetic Task Handlers have been created, providing easy interaction with popular applications and data sources. With Task Handlers, business process owners can define triggers and create processes with no coding.

Benefits: As a service provider (whether internal or external to the enterprise) you can see the status of your SLA compliance at any time. SQAM can send proactive notifications to help prevent missed SLA targets (e.g., at fours hours into an eight-hour process, if you haven't reached a defined milestone, escalate the issue).

Easily view SLA compliance status in real time or for any defined time period (weekly, monthly, date range, etc.).

Hold vendors accountable; did a vendor really deliver within their promised timeframe? With the automated triggers in SQAM, you'll know for sure. If an SLA target is missed, you can pinpoint the source of delay to take corrective action.

Conclusion: SQAM gives you greater visibility into and control over your processes. It enables service delivery groups to improve SLA compliance, and identify issues when goals are missed. The ability to track SLAs by client or division simplifies maintenance in a multi-tenant environment or a busy, complex internal service group.


Stay in sync

Problem: Employees love their mobile devices—but they don’t want to carry two, one for work and another for personal use. And they want their personal preference, whether it’s an iPhone, Galaxy or a Blackberry. Employers are finding a solution in implementing the bring your own device (BYOD policy), but that brings challenges in company security, support, and responsibility.

Ideal: Employees bring the device they want and use it for both personal and company needs. Employee usage of mobile devices is welcomed, extending their utility into the corporate world, yet corporate goals and security are maintained.

How: Kinetic Request simplifies the BYOD registration process by using a self-help portal that enables employees to easily register their devices. Kinetic Task securely and appropriately populates databases and applications with that registration information to set up provisioning and required permissions. In addition, Kinetic Task can trigger remote installation of required software to those devices using third-party tools. All along, Kinetic Request keeps the user informed with status updates and a portal to see real-time activity.

Benefits: Employees get to use their preferred device via BYOD and can, therefore, maximize their ability to stay in sync with corporate data and processes while corporate IT security has updated information to track issues and maintain compliance goals. Other benefits include:

  • Maintaining corporate compliance;
  • Ensuring accurate device ownership;
  • Avoiding support calls through self-help; and
  • Rapidly deploying BYOD.

Conclusion: BYOD is bringing a new level of efficiency and productivity to enterprises. However, with these new capabilities, traditional IT concerns are being challenged, particularly security and governance. Using Kinetic Request and Kinetic Task, companies can simplify registration for the devices, automatically populating corporate databases, enabling tracking of security, and meeting compliance goals.

Lotus Notes Replacement

Drop Lotus Notes and other legacy applications without skipping a beat

Problem: Lotus Notes has long been a popular choice for creating internal business applications. However, Lotus Notes was developed years before the Web, and much of its core, pre-Web design is still there. Businesses now want to move to the new generation of design tools native to the Web. These new applications incorporate federated data, mobile usage and Internet standards.

Ideal: Users are looking for a more native Web and mobile experience, as well as greater access to corporate data and systems. Corporations seek to move to the next generation of easy internal business applications while leveraging existing federated data sources and new emerging APIs, accessed in the Cloud. Such applications use federated data and tap into existing processes, while using Web technologies and enabling mobile use.

These next-generation systems will usher in a new era of business agility and operational efficiency.

How: Kinetic Request is the next-generation design tool for corporate applications. Its cornerstones are Web delivery, mobile readiness, API production and consumption, and the ability to use federated data sources. Coupled with the Kinetic Task workflow automation engine, it integrates these new business applications with existing systems for fulfillment (inventory, costing, CRM, sales, etc.).

Benefits: Users get the native Web experience and mobile access they expect. Enterprises get the ability to rapidly build applications that leverage single-source corporate data, eliminating the common replication problems of Lotus Notes. Organizations can also reduce application maintenance time and cost thanks to Kinetic Task’s ability to orchestrate fulfillment using specialized business processes. Other benefits include:

  • User-friendly interface;
  • Mobile-readiness;
  • Ability to leverage existing, federated data;
  • Ability to reuse existing business processes; and
  • Reduced applications proliferation.

Conclusion: Many corporations have benefitted over the years from Lotus Notes’ ease of use to develop internal applications. However, today’s technology has moved beyond Lotus Notes. New designs and new application architectures are available to meet these new needs. Kinetic Request and Kinetic Task are designed to support the next 20 years of internal business applications, providing flexible user interfaces, leveraging existing data, and reusing existing business processes, while supporting rapid-application-development philosophies.

Lotus Notes Replacement

Simplify PC Refresh Program

PC Refresh

Stay ahead...without the headache

Problem: The PC Refresh program enables companies to keep current on technology by leasing computers. In large organizations, this is less expensive than continually purchasing new PCs, but it’s also a lot of work to realize those savings. Each refresh has to be selected and ordered, correct software specified and installed, the existing system backed up and its data transferred, the existing system collected and its data wiped, new PC deliveries scheduled; etc. Is your head spinning yet? Now, multiply this by the size of your staff. If a company has 10,000 employees on a three-year refresh program, that’s 3,300+ computers a year. This adds up to a lot of selections, specifications, backups, data wipings, and pickups and deliveries every year—and a major headache for enterprises.

Ideal: The ideal solution is to produce a simplified process to quickly and efficiently refresh PCs through automation, which will drive out inefficient and costly manual steps.

How: Kinetic Request and Kinetic Task are designed to produce simple forms that enable typical business users to easily select their next PCs and related software. In addition, a user can easily schedule the drop-off of the new PC and the collection of the old equipment. The forms can also be used to schedule installation, backup, and data wiping to meet corporate security and compliance.

Benefits: By producing simplified forms for PC and software selection, corporations can easily maintain standard configurations and gather accurate data upfront, ensuring that successful delivery can be performed on the first attempt.

Users welcome the ability to schedule drop-off and collection of PCs, minimizing disruption to their workday.

Standardizing data collection in the Kinetic Task engine allows corporations to orchestrate the installation of software and cleaning of existing hard drives to meet corporate security and compliance standards. Other benefits include:

  • Reduced costs;
  • Scheduled installation and collection;
  • First-time fulfillment;
  • Automated installation; and
  • Automated disk wiping.