KDM Quicklist
description
Transcript of KDM Quicklist
![Page 1: KDM Quicklist](https://reader035.fdocuments.us/reader035/viewer/2022081501/568140a1550346895dac5818/html5/thumbnails/1.jpg)
KDM Quicklist
![Page 2: KDM Quicklist](https://reader035.fdocuments.us/reader035/viewer/2022081501/568140a1550346895dac5818/html5/thumbnails/2.jpg)
The Problem
• “Small” but critical company data “lists” are important to businesses.
• These “lists” are scattered in “One-Off” locations.
• Often these “lists” are not secured, audit trailed or backed up.
• Creating custom applications to manage each one of these “lists” can expensive and time consuming.
![Page 3: KDM Quicklist](https://reader035.fdocuments.us/reader035/viewer/2022081501/568140a1550346895dac5818/html5/thumbnails/3.jpg)
Critical Corporate Data• Important information is used every day by
business users, but often this data is not stored in a corporate quality system.
• Corporate IT department are not even aware of this data.
• Other areas of the business, who can use this information, are not even aware of this data.
• Spreadsheets, desktop databases, and even sheets of paper tucked in a drawer, contain this valuable corporate information.
• If data is changed, lost, corrupted or stolen, the business loses valuable time and money.
• Custom solutions to store and manage this data are prohibitively expensive. You can’t build a system for every “list” you need.
![Page 4: KDM Quicklist](https://reader035.fdocuments.us/reader035/viewer/2022081501/568140a1550346895dac5818/html5/thumbnails/4.jpg)
Data, Data everywhere, and…I can’t find it…
• In a large organization new information is created every day. This data may only be needed by a workgroup, but it may be of value to others as well.
• A secure, single point of storage and access for this data makes it widely available for reuse.
![Page 5: KDM Quicklist](https://reader035.fdocuments.us/reader035/viewer/2022081501/568140a1550346895dac5818/html5/thumbnails/5.jpg)
Who changed that?• Company data is used to make
critical decisions, prepare reports and often it’s integrity is questioned by auditors.
• With data stored in one-off sources, there is no disaster recovery process, no audit trails, no access control and no accountability.
• Without proper controls, not properly maintaining and controlling your data, and tracking who has access, and who modified it, can result in substantial cost.
![Page 6: KDM Quicklist](https://reader035.fdocuments.us/reader035/viewer/2022081501/568140a1550346895dac5818/html5/thumbnails/6.jpg)
Think About It…
• Do you have important business lists in a spreadsheet?
• If that list was lost, what would be the impact to your business?
• What would it cost you to reconstruct that information?
![Page 7: KDM Quicklist](https://reader035.fdocuments.us/reader035/viewer/2022081501/568140a1550346895dac5818/html5/thumbnails/7.jpg)
The Solution• KDM’s Quicklist uses industry standard technologies to
create, manage and access lists of important company data
• KDM’s Quicklist allows you to store information lists that otherwise are created as islands of technologies with no company controls around them.
• Easy to install, secure, manage and support, the Quicklist application provides an easy to use dynamic application which can be up and running in a minimal amount of time.
• Quicklists can be created for a wide variety of “lists”. Full audit trails of list insert/ update/ delete actions, who changed what and when, who viewed a list, when and what they saw, are all available out of the box.
• Lists can be exported to excel by authorized Quicklist users. Technology support groups can extract data in a variety of formats for additional reporting capabilities.
• Data that is deleted, or modified, can easily be recovered.
![Page 8: KDM Quicklist](https://reader035.fdocuments.us/reader035/viewer/2022081501/568140a1550346895dac5818/html5/thumbnails/8.jpg)
Questions