Blueprint your IPMS

March 2010 Integrated Solutions, Information Security

The most common mistake companies make before embarking on a technology implementation or modernisation project is to solicit bids from vendors prior to developing a blueprint or requirements specification. Integrated people management solutions (IPMS) are no different. From our experience, the following is the result of failing to create a blueprint:

* The 'bigger picture' is missed.

* True requirements are not understood.

* Business objectives are not met.

Bigger picture missed

By approaching vendors before the business requirements have been defined, it is assumed that the scope of the project is limited to whatever functions the vendor’s solution covers. Enterprise-wide requirements and synergies are not considered and explored. This can result in some business functions from being incorrectly excluded from the scope. This leads to implementing standalone technology that is inadequate – forcing the company to either replace the technology at some later stage or develop customised solutions that are expensive to maintain.

For example, take an access control and HR solution that is not centralised. A contractor could be banned from one site preventing that person from entering that specific site. He/she then leaves his position at the contracting company and applies for a position at the main company at another site – effectively providing the same person access to the same company. A centralised security/people management solution would prevent this from happening.

Requirements not understood

By not spending the time to define your IPMS business’s requirements, the decision makers do not have a clear and complete picture of the complete set of requirements. Having the right people involved during the design phase can make sure all requirements are considered. For example, your company might have an access control solution and a time and attendance solution. The access control function could typically reside with the IT department or security manager, while the time and attendance function resides with the operations or HR manager. By not involving the right people upfront, one could miss the opportunity to re-use current infrastructure like the access control readers and apply it for the time and attendance solution. There would then be an opportunity to integrate these solutions.

It is clear that not conducting a proper blueprinting process can lead to internal conflict between business process owners. It also leads to false perceptions of what the real requirements are (with warped priorities). This could result in paying for and implementing technology that is not needed or will not work in the specific business environment.

Business objectives not met

A very important step during the blueprint phase of an IPMS solution is to first align the business requirements with the company’s HCM, risk management and IT strategy and objectives. Aligning the requirements to meet these objectives would go a long way to understand and prioritise which systems or technology is required.

Based on perceived requirements, the wrong vendors are involved in the beginning and a lot of time is wasted by both the vendors and their prospective clients. For example, if the security manager wants to upgrade the access control system, he/she could solicit vendors only providing security solutions. After many meetings with the prospective vendors and the security manager, the HR manager becomes involved in the process and then adds their requirements. The need for a wider solution has now been identified, which may require the company to engage with different vendors altogether.

Unclear or vague requirements also results in:

* Many back and forth communication and clarification meetings.

* Inconsistent communication between prospective vendors, resulting in confusion.

* Incorrect responses from vendors resulting in incorrect findings during the evaluation process.

Unclear or undefined requirements can also lead to a very subjective vendor selection process. A vendor’s weaknesses can be played down by internal process owners and vendors since the requirements are not precise or sometimes not even defined at all.

Performing a proper blueprint design for your IPMS function before embarking on a vendor selection process is essential to having a successful technology implementation. It saves time, reduces frustration, improves the adoption rate and is a lower risk approach to ensure that business objectives are met, whilst delivering sustainable solutions.

For more information contact Michael Olivier, innoVIZION Business Solutions, +27 (0)11 463 0123, [email protected], www.innovizion.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements, inserts and company contact details are printed as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.