We generally don’t access your system directly. Instead, we request for the presence of a Key user to show us the system. Also we would interview your key users on the challenges they face on day to day basis. We try to find out the pain areas and recommend solutions for that along with suggestions on how you can improve the system and get most value out of it.