Customer Service

We will be INZENT who strive to provide satisfactory service

Customer Support Service
Call Center Usage Guide
INZENT Service Center
운영시간 아이콘operating time
weekday 09:00~18:00

We will respond kindly.
· UI/UX
T.02-787-3649
· ESB
T.02-787-3669
· ECM
T.02-3484-8361
· Electronic Library
T.02-787-3658
· Document centralization
T.02-3484-8363
Maintenance Service
The solution for the delivery and installation of the commercial products for the solution ensures the compatibility, stability and interoperability of the system with the aim of stable service operation, and performs maintenance free of charge according to the contract period after inspection.


Stable and efficient system operation


Maintenance plan
· Definition of maintenance scope
· Setup of maintenance organization
· Establish maintenance procedures
Related technology
· Technical support for operation
Human resources
· Maintenance through professional staff
· Utilize project staff
Instruction Manual
· Operator Training
· Operator Manual Training
Education training services
INZENT provides the following education and training to acquire the latest IT skills and improve system operation ability. The planned training courses can be changed by consulting with the company.
Classification Educational object Educational Contents Educational object
System usage and operation User Training · Build-up System Overview
· Business handling method
Cooperation manager
Method Textbook Period
Theory Own data 2 days
Classification Educational object Educational Contents Educational object
System usage and operation Operator Training · Build-up System Overview
· System operation capacity cultivation
· Cultivation of disability treatment capacity
System Operator
/ Security manager
Method Textbook Period
Theory Own data 2 days

* The contents of this training can be changed in consultation with the client's team.

Security measures
Clarifying roles and responsibilities related to confidential security by applying managerial, physical, technical security policies to prevent leakage of customer assets and complying with customer information and to protect copyright, identify possible security risks and vulnerabilities.