To ensure business performance and data security throughout the service process, field service companies need to use various technologies. Our implementation combines the Comarch FSM mobile app, system identity access management (IAM) and Internet of Things (IoT) elements. With these systems capabilities merged together, businesses may take advantage of an end to end, comprehensive solution which is modular by design and easy to implement. To facilitate tasks performed on-site by field staff, Comarch enables two types of site management, passive (A) and active (B), depending on the level of technician engagement needed.
With passive site access management, field service workers are able to optimize service visits with automatic assignments sent by beacons IoT elements. When the field worker enters the range of a Comarch beacon with an active instance of the field service mobile application, they are notified of the proximity of the object. The technician receives a “preventive maintenance” notification, together with a new task visible in their schedule. Field staff can also display a detailed description of the object and perform remote diagnostics, with results readily available in the mobile device. Moreover, the integrated Comarch IoT beacon management ensures that only authorized personnel are allowed to connect with the beacon, and the server is notified when and to whom access is granted. With this solution, you are able to track the time that an internal or external worker spends in a given location, and compare this information with the time expected. All described functionalities can be accessed easily from the back office.
Handling access to many different places can be a challenge without a central management point. Thanks to the Field Service Management system’s integration with Comarch Identity Access Management (IAM), a dedicated person can manage access lists in real time. The IAM endpoint sends data from the monitored area to the IAM server. Its inputs are connected to a set of access detectors (monitoring motion, temperature and humidity), while its outputs control electric locks and trigger systems. The entry authentication in a facility protected by IAM endpoint is performed by the tPro Mobile token application enabling user verification with PIN or pattern, which is installed on a device with an instance of FSM Mobile. That means the technician’s device is the only thing they need in order to access any places they have authorization for. Comarch FSM system triggered by sensors, can establish whether a person entering a protected area is in possession of the above applications and has the correct access rights, and decide to allow or deny access. All communication between the modules is secured by elliptic curve cryptography (ECC), in order to maintain a high level of data security. What’s more, having a central management point simplifies auditing and reporting processes.
Resource management, service request management, planning and scheduling, business management, work order execution, effective communication, and asset management. All of these processes can be fully automated.
Learn how, by downloading our free 23-page guide that defines 50 areas to be optimized in field service delivery, categorized by process.
Tell us about your business needs. We will find the perfect solution.