Blueprint your IPMS

March 2010 Integrated Solutions, Information Security

The most common mistake companies make before embarking on a technology implementation or modernisation project is to solicit bids from vendors prior to developing a blueprint or requirements specification. Integrated people management solutions (IPMS) are no different. From our experience, the following is the result of failing to create a blueprint:

* The 'bigger picture' is missed.

* True requirements are not understood.

* Business objectives are not met.

Bigger picture missed

By approaching vendors before the business requirements have been defined, it is assumed that the scope of the project is limited to whatever functions the vendor’s solution covers. Enterprise-wide requirements and synergies are not considered and explored. This can result in some business functions from being incorrectly excluded from the scope. This leads to implementing standalone technology that is inadequate – forcing the company to either replace the technology at some later stage or develop customised solutions that are expensive to maintain.

For example, take an access control and HR solution that is not centralised. A contractor could be banned from one site preventing that person from entering that specific site. He/she then leaves his position at the contracting company and applies for a position at the main company at another site – effectively providing the same person access to the same company. A centralised security/people management solution would prevent this from happening.

Requirements not understood

By not spending the time to define your IPMS business’s requirements, the decision makers do not have a clear and complete picture of the complete set of requirements. Having the right people involved during the design phase can make sure all requirements are considered. For example, your company might have an access control solution and a time and attendance solution. The access control function could typically reside with the IT department or security manager, while the time and attendance function resides with the operations or HR manager. By not involving the right people upfront, one could miss the opportunity to re-use current infrastructure like the access control readers and apply it for the time and attendance solution. There would then be an opportunity to integrate these solutions.

It is clear that not conducting a proper blueprinting process can lead to internal conflict between business process owners. It also leads to false perceptions of what the real requirements are (with warped priorities). This could result in paying for and implementing technology that is not needed or will not work in the specific business environment.

Business objectives not met

A very important step during the blueprint phase of an IPMS solution is to first align the business requirements with the company’s HCM, risk management and IT strategy and objectives. Aligning the requirements to meet these objectives would go a long way to understand and prioritise which systems or technology is required.

Based on perceived requirements, the wrong vendors are involved in the beginning and a lot of time is wasted by both the vendors and their prospective clients. For example, if the security manager wants to upgrade the access control system, he/she could solicit vendors only providing security solutions. After many meetings with the prospective vendors and the security manager, the HR manager becomes involved in the process and then adds their requirements. The need for a wider solution has now been identified, which may require the company to engage with different vendors altogether.

Unclear or vague requirements also results in:

* Many back and forth communication and clarification meetings.

* Inconsistent communication between prospective vendors, resulting in confusion.

* Incorrect responses from vendors resulting in incorrect findings during the evaluation process.

Unclear or undefined requirements can also lead to a very subjective vendor selection process. A vendor’s weaknesses can be played down by internal process owners and vendors since the requirements are not precise or sometimes not even defined at all.

Performing a proper blueprint design for your IPMS function before embarking on a vendor selection process is essential to having a successful technology implementation. It saves time, reduces frustration, improves the adoption rate and is a lower risk approach to ensure that business objectives are met, whilst delivering sustainable solutions.

For more information contact Michael Olivier, innoVIZION Business Solutions, +27 (0)11 463 0123, [email protected], www.innovizion.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...
New tools for investigation and robust infrastructure security
News & Events Information Security
Cybereason continues to enhance its security platform, with recent updates introducing improvements in file search operations, investigation query results, and cloud workload protection, providing more granular data and faster key artefact identification.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Technologies Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Dynamic Dashboard enhances security and operational efficiency
Suprema neaMetrics Products & Solutions Integrated Solutions Residential Estate (Industry)
In today’s data-driven world, security systems are overwhelmed by an unprecedented volume of data, from video surveillance and access control logs to intrusion alerts and a variety of IoT sensor data.

Read more...
HELLO visitor access management
Products & Solutions Access Control & Identity Management Integrated Solutions Residential Estate (Industry)
HELLO is an on-premises visitor and contractor access management solution designed to be fully integrated and complementary with smart, on-trend technologies, securing estates and businesses alike.

Read more...