Skip to content

Frequently asked questions

Click the "Book a demo" button in the top right corner to get to the demo booking form. A demo is always free of charge and you get the opportunity to ask all the questions you can think of.
Make sure to read through our implementation guide, you can reach it here: Implementation guide

Implementing a BI-tool is not an IT project, it is an operational project. Therefore, you should have people from the business available, people with responsibilities and mandates.

Investigate the conditions carefully and ask questions about, for example, operation, management, security, performance, how to access data, etc. Here, as the client, you must place high demands on your implementation partner to contribute.

At the start of the project, roles, responsibilities and communication channels must of course be established. Make sure everyone involved gets their questions answered before everything gets started.

An implementation has many moving parts. Luckily, we've done it before - over 500 times in fact. Get in touch and we'll talk more about how your implementation will be as good as possible.
INSIKT is completely web-based where the browser and web server communicate over http or https, where the latter is recommended to get secure traffic. The standard https with certificate and IIS as web server applies here. Web server and database server communicate via standard SQL Server which is normally not encrypted, but it is within one and the same server or alternatively between two servers in the same server network. Communication between INSIKT's background service and INSIKT's web application uses http and is encrypted according to the same configuration as the traffic between browser and web server.
INSIKT has a user-friendly and web-based interface that is based on standard products from Microsoft, primarily the world-leading and powerful OLAP server Analysis Services, which is part of SQL Server.
INSIKT can be integrated with many systems. The list of integrations gets bigger each day. Get in touch with us and we will tell you more.
Yes, everything is permission controlled in INSIKT.

It is possible to set own authorization levels in INSIKT via the administration module, which is only accessed by users with sufficient authorizations.

Here the administrator can search for and add, edit, synchronize and delete users. Other capabilities available through this administration interface include the ability to send out password reset emails, anonymize deleted users, display users blocked by the system, and display the number of licenses.

Permission can be based on either individual users or groups of users and security groups.

We are happy to help.

Contact our Service desk and they will help you out.

There are many ways to get better at INSIKT.

The help function
In the top menu of your INSIKT environment there is a small question mark. There you will find lots of useful information about how to best use INSIKT. You and your colleagues can also write your own articles to help each other.

Youtube
On our YouTube channel, you will find tons of videos where you can learn everything from navigating INSIKT to becoming the best in the office at building reports.

Get in touch