Technology supports labour management

June 2017 Access Control & Identity Management, Security Services & Risk Management

Experts in the workforce management products and services and solutions markets know that solutions are entering the market that are designed expressly to be managed by smartphones and GPS tracking with data linked and used centrally to meet core business requirements.

Guenter Nerlich, executive manager, ERP solutions – access & workforce management at dormakaba, says workforce management technology has become more sophisticated and the functionality today, is among others, mobile. “The industry has kept up with market trends and today business managers have the technical means to track employees and business processes and manage productivity automatically and in real time,” says Nerlich.

“Technology is key – and with that comes the choice for fully integrated and certified solutions. A larger company’s main goal is to handle all the workforce management needs in one central platform – their ERP solution. This assures the highest degree of productivity of their workforce with lowest cost impact possible.”

But where does a company start and at what point can a business claim it has complete control over technology-driven workforce management?

Nerlich says time and attendance is a start and maybe considered by some to be merely a beginning, but he believes it is a critical piece of the overall puzzle.

“Without an automated WFM solution, companies are losing out daily and in many cases so does the employee. Automated time and attendance is of the outmost important as a starting point leading to further solution parts like shop floor data collection and access control,” he explains.

So, if mobility centralised management and automation are considered the hallmarks of reliable workforce management, then integration is the glue that cements the strategy. There are a variety of solutions available, as is the nature of this expanding marketplace, but Nerlich advises that it is important to find a solution that fulfils a key aspect – it should be ERP-provider certified.

Ultimately, the size of a business is not a factor when it comes to the need to integrate the latest workforce management technology, nor how best to leverage solutions. However, while the principles are the same, smaller businesses may not require an immediate and extensive full integration into their systems like payroll or production.

As with all technology-based strategies, success depends on buy-in and whether the people-factor has been fully considered.

“Never forget – technology is one side of the project, but proper change management is key as well. Taking both into account at the same level and importance you will create a win-win situation for the company and its employees,” Nerlich adds.

For more information contact dormakaba SA, +27 (0)11 510 1535, inge.wulff@dormakaba.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.