Process Mining can only be used successfully if the seamless connection of the data sources and the continuous raw data transformation  is successful. This is exactly where the wheat separates from the chaff in the Process Mining tools.

Introduction

“That’s not possible” – was the typical reaction when I presented process mining to the first interested parties in 2009.

At that time, hardly anyone could imagine the possibility of processes reconstruction from digital traces of IT systems alone. ING-DiBa alone and its, back then – Head of Internal Audit, Volker Panreck, were innovative enough to dare a first pilot in the field of construction financing processes.

The deployment was extremely successful, thereupon Process Mining was introduced and later the bank was awarded the “Audit Innovation Award” at the Frankfurt School of Finance and Management. This also gave the starting signal for broader use of Process Mining in business.

The rest is history and a lot has happened since then.

However, for many managers, process mining is still an almost unknown topic.

sorting data

Indeed, numerous successful implementations have been published already and prove that process mining works and the benefits it provides worth the investment.

However, there is always a certain skepticism we face during the presentations, which does not question the technical function of process mining, but the effort of data preparation and integration. And asking yourself such questions is more than correct.

Only if the seamless connection of data sources and the continuous transformation of raw data is successful can process mining be used successfully in the long term.

And this is exactly where the wheat separates from the chaff in Process Mining tools.

Process Mining data

In order to reconstruct a process with Process Mining, the software requires so-called event logs with at least three attributes:

  • a unique transaction number (for example, invoice number);
  • a time stamp (date and time);
  • the activity executed (for example, release).
data components for process mining

In addition, other attributes such as supplier names, invoice amounts or persons involved in the process help with the further analysis of the processes.

Systems such as SAP generate all the required data but do not store it in a directly usable event log. Instead, they distribute it in numerous database tables.

How does the data access and transformation take place?

Almost all process mining tools on the market are limited to the visualization and analysis of processes.

Usually, the required data is extracted from the databases of SAP or other ERP systems, for example, using third-party tools.

As a next step,  it’s being imported manually or occasionally semi-automatically into relational databases and then converted into the event logs described above using individually programmed SQL procedures.

Occasionally these collections of SQL procedures are also called connectors. It’s quite a commercial term, and masks the high effort, the possible sources of error at the interfaces and the unnecessary duplication of data.

Process mining always unfolds its greatest benefit, where it is not only used for one-off snapshots of processes but also for their continuous analysis and optimization.

The prerequisite for this is a data transformation that is integrated and high-performance as possible, as it is contained in ProcessGold’s Process Mining software.

As usual with professional Business Intelligence platforms, ProcessGold has real connectors (interfaces) that allow direct connection to any relational database (HANA, MS SQL, Oracle, etc.) and file format (CSV, XML, XLS, etc.).

The subsequent transformation, i.e. the conversion of data from different sources or tables, also takes place within the ProcessGold platform, using a proprietary in-memory database.

data extraction transformation visualization

This way of data connection and data transformation is not only particularly high-performance but also enables the use of Process Mining for topics such as Process Monitoring and Continuous Auditing.

How does the visualization and analysis of the processes take place?

Since ProcessGold was founded more than nine years ago, several hundred projects have been carried out worldwide and it was not until the end of 2016 that the company’s own Process Mining platform was launched on the market.

As a result, all our experience flowed into the development of the “ApplicationOne”.

application one processgold

This pre-configured solution enables quick entry into Process Mining and allows the immediate analysis of all business processes in the company. Therefore, users gain valuable insights into how their processes actually work and where they can be improved.

At the same time, the ApplicationOne also represents a template that can be extended and adapted to individual wishes and needs as the project progresses.

application one process gold template

Conclusion

Process mining is a magic wand for large businesses. This is the first time big data can actually be transformed into a comprehensive visualized analytical tool which even gives tips on operational process improvements.

The trick is – to transform your data right and to make sure you are using it all.

That’s why ProcessGold is here for you! Discover partnership opportunities with us, contact info@processgold.com

Rudolf Kuhn, Chief Mining Officer @ProcessGold