T-K ingests data from systems where work is performed and runs a series of algorithms to produce opportunities companies can take advantage of relating to process improvements, capacity adjustments and elimination of work. T-K also spots individual issues with work items that are delayed or that cause customer or end user dissatisfaction.
These recommendations include areas where overstaffing exists, areas where bottlenecks are occurring, areas where automation makes sense to apply due to the highly repetitive nature of work, areas where employee training is needed to move low performers up to the mean etc. Please see our “PRODUCT” page for more details on specific functions of TK.
Using a 100% data driven approach versus applying qualitative analyses T-K can generally produce efficiency gains for a process of 30-50 percent in a more rapid timeframe then traditional LEAN or Six Sigma exercises do and without any opinions. T-K also identifies opportunity to improve service levels, improve customer satisfaction and lower the risk of an operation.
T-K is agnostic to the process or industry that a company is operating in. The modules have been designed in a way to look at process inefficiencies, service improvements and capacity issues regardless of the type of work being performed. The most commonly used operating model we have dealt with is ITSM and service desks but we have worked in multiple types of organizations.
T-K is most easily configured to run in the CKM cloud. Our application is run on AWS and is deployments are managed with infrastructure as code approaches. However, we do offer an on-premise deployment mode which has been required for some customers that we deal with in governmental agencies where top secretclearance is required,etc.
CKM follows the NIST Cybersecurity Framework and the regulations put forward by GDPR. Security is paramount in everything we do. Our security organization is led by our Data Protection Officer and our Security Committee that includes members from all disciplines within our organization.
T-K is generally looking for audit log level data from the systems it integrates with. Real-time streaming of data is available in T-K assuming the source systems being integrated with can support this. We also support pulling extracts from systems on a routine basis where the streaming of data is not available.
We can integrate with centralized data lakes or MDM solutions if data has been centralized. We look to minimize the level of effort involved in performing integrations with our customers to whatever works best for them. We do have pre-built adaptors for commonly used solutions such as Service Now, Avaya, Genesys and many others.
T-K can generally be implemented in under 2 months in the CKM cloud. The timeframe does depend on the number of systems that are involved with an integration.
We do offer “diagnostic” studies where we can work with historical extracts of dataand provide much of the analysis within T-K quickly. These exercises can be completed in under a month with some initial results available within two weeks. This offers the potential customer the ability to see T-K in action with their data, produce some value immediately before or while the implementation is being completed.
Basic training is provided to all customers on the usage of T-K and the ability to access support staff 24X7 365 days a year is offered as well. In addition, T-K is a product that is actively evolving and updates/releases to the application can be expected on a frequent basis.
Customers also generally have access to our product management team and may be called on at times to give their opinions or weigh in on new features we are considering for the application.