A complete tool for business management and decision making,
INSIKT 12 is finally here and is not only better - it has a reworked interface.
INSIKT connects to your already existing systems such as finance, sales and production systems. All information is then compiled in one place, which makes it easy to see trends and plan the future.
Since you can use INSIKT right in your web browser, it is easy to involve the entire organization at the same time as you can decide who gets to see what.
Regardless of whether it is an account budget, project budget or something else, INSIKT makes it easy for you to get accurate planning. With modules for all kinds of planning, you can gather the entire business in one tool.
Switch between a detailed view and the bigger picture. Investigate what affects the result and discover driving factors you were previously unable to see.
Wästbygg Gruppen AB is one of Sweden's largest construction and project development companies. With hundreds of simultaneous ongoing projects, it is important to be able to plan, control and follow up the operations in a flexible way.
Easily connect your favourite systems with INSIKT
Supporting your decisions with facts is of course one of the absolute biggest advantages of a decision support. Look at historical data, tune the current situation or make future forecasts to ensure the right decision is made.
Employees have access to data based on their area of responsibility and can see trends and developments. This increases commitment and benefits the entire organization.
A good decision support gives you the opportunity to create interactive reports where you can present your data with charts or other gauges. It increases understanding and makes the entire organization more efficient.
With visualizations, key figures, the ability to zoom in and out, to twist and turn the numbers, many of your employees can participate in the all-important analysis work.
Sometimes you really need to dig into numbers to understand and sometimes it's just the opposite, you need the helicopter perspective to see the bigger picture. A good decision support gives you both possibilities.
With automated data capture and automatically updated reports, margins for error are reduced in addition to all the time you gain.
Tatiana Pryadko
Presto Brandsäkerhet AB
INSIKT is completely web-based where the browser and web server communicate over http or https, where the latter is recommended to get secure traffic. The standard https with certificate and IIS as web server applies here. Web server and database server communicate via standard SQL Server which is normally not encrypted, but it is within one and the same server or alternatively between two servers in the same server network. Communication between INSIKT's background service and INSIKT's web application uses http and is encrypted according to the same configuration as the traffic between browser and web server.
Make sure to read through our implementation guide, you can reach it here: Implementation guide
Implementing a BI-tool is not an IT project, it is an operational project. Therefore, you should have people from the business available, people with responsibilities and mandates.
Investigate the conditions carefully and ask questions about, for example, operation, management, security, performance, how to access data, etc. Here, as the client, you must place high demands on your implementation partner to contribute.
At the start of the project, roles, responsibilities and communication channels must of course be established. Make sure everyone involved gets their questions answered before everything gets started.
An implementation has many moving parts. Luckily, we've done it before - over 500 times in fact. Get in touch and we'll talk more about how your implementation will be as good as possible.
Yes, everything is permission controlled in INSIKT.
It is possible to set own authorization levels in INSIKT via the administration module, which is only accessed by users with sufficient authorizations.
Here the administrator can search for and add, edit, synchronize and delete users. Other capabilities available through this administration interface include the ability to send out password reset emails, anonymize deleted users, display users blocked by the system, and display the number of licenses.
Permission can be based on either individual users or groups of users and security groups.