Customer Day 2024 | BENELUX
Op 21 november 2024 zal het evenement voor de OMNINET gemeenschap opnieuw een live evenement zijn en plaatsvinden op de Bluepoint evenementenlocatie in Antwerpen, België.
Huidige OMNITRACKER versie
OMNITRACKER versie 12.6.100 is officieel gereleased en voor u beschikbaar.
Word lid van de OMNINET gemeenschap
Deel uw ideeën met andere deskundigen op het OT-expertsforum.
Creating a knowledge base
Efficient support thanks to well-managed knowledge databaseA company’s knowledge can be scattered in countless places. A knowledge base allows the central gathering, organization, storage, and sharing of information. It is a kind of digital library, accessible to all departments and customers. Such a knowledge base contains, among other things, how-to articles that can be used to solve tasks and problems on one’s own. An example would be the standard procedure for a certain incident. In addition to how-to articles, knowledge bases contain frequently asked questions (FAQs), general information on industry-specific topics and terms, guidelines, support processes, and product details.
PDCA cycle
The PDCA cycle provides a concept for the structured improvement of corporate processes. It can be applied to all quality-relevant processes, for example in information security or in manufacturing of products. The objectives of the improvements are, among others, increased customer satisfaction, efficiency gains, and resilience against data loss or cyber attacks. The cycle is applied to comply with international standards. These include DIN EN ISO/IEC 27001 (requirements for information security management systems) and DIN EN ISO 9001 (requirements for quality management systems).
Protection needs analysis | Professional article
Accurate protection needs analysis in asset management avoids overprotectionProtection needs assessments are essential for efficient protection of all corporate assets—naturally, there is a strong overlap with asset management. Our authors show how organizations can reasonably cluster assets and assess their protection needs, what advantages this brings, and what requirements a software solution used for this purpose should fulfill in order to avoid both too low and too high protection needs being assigned to assets.