Welcome to the Cognitive Integrity Management user guide video series. in these videos we will take you through the fundamentals of Cognitive Integrity Management, also know as CIM (pronounced sim).
The solution is run solely on Microsoft Azure; it leverages Microsoft Power BI embedded for reporting and Microsoft SQL for the database. You can rest assured that all your data and analytics will be safe on the Microsoft Cloud.
The solution can be broken into 4 main modules:
- Assessment Planning
- Integrity Compliance
- Dig Management
- Threat Monitoring
In addition, the solution-wide functionality enables the user to:
- Take advantage of business intelligence reporting
- Data visualization and mapping
- Account Management
- Workflow approvals and notifications
Once you have been registered as a user for CIM you will have received a welcome email. We use a single sign-on authentication system that will recognize your email which has been assigned to your Microsoft account. Simply type in your email address and CIM will identify your email and recognize you as the user.
Should you have any issues logging into the solution please email firstname.lastname@example.org
Navigation within the solution:
Once you login to CIM, you will see a main menu navigation bar under the header, this will help you navigate to all areas within the solution which we will cover in more detail in the next videos.
Next to the CIM logo on the top left, you will see the software version number to reflect the most recent update you are running. This correlates with the solution updates we post to the Knowledge base.
Over to the far right, you will see your name and an alerts icon next to that. This is where all system-wide notifications will appear.
To the right of that, you will see your initials – once you hover over that icon you will be able to logout of your session.
To help troubleshoot and to access our release notes, we have a knowledge base setup, simply click on the question mark icon on the top right. This will open a new window to the knowledge base.
We have now covered the basic navigation within Cognitive Integrity Management.