The hidden claws of proof of concept

Residential Estate Security Handbook 2019 Editor's Choice, Integrated Solutions

A proof of concept is a wonderful thing. It is the glorious end-product of months, perhaps even years, of honing an idea and its abilities to perfectly suit a market and need. It is the physical manifestation of innovation and it plays an important role in helping the organisation to fine tune issues, assess the true value of a product, determine its value to the market, and so much more. However, it can also be an expensive and time-consuming trap.


Sean Laval.

“A proof of concept (PoC) project is a great way to test new technologies and ideas, but it becomes problematic when it continues for extended periods of time without any quantifiable conclusion as to its success or failure,” says Sean Laval, executive: solutions and innovations, SqwidNet. “It can delay the commercial deployment of a viable solution within the business or for its customers. And this happens far more regularly than organisations realise.”

The pitfalls of PoC often occur when the success criteria of the project aren’t clearly defined from the outset. When the milestones, key performance indicators and benchmarks by which the PoC are measured are not adequately stipulated nor correctly managed. This can be a critical failure point for any project. Just as the employee requires ongoing measurement to ensure growth and performance, a PoC requires precise parameters within which to operate.

“The biggest challenge around the timeous completion of PoC projects is the temptation to keep on adding more to the original scope,” adds Laval. “This often happens as more possibilities become evident as the project evolves and grows. Suddenly, there are so many iterations and opportunities that they are tacked onto the original project without clear outlines or goals. To avoid this, the PoC has to remain a well-structured process.”

A successful PoC project should have a defined operational lifespan. Once this is completed, it needs to be assessed against the final metrics that were determined at the outset to establish whether or not it is worth taking further within the purchase and production lifecycle. This doesn’t mean that new insights and information won’t be uncovered throughout, or that these insights should be ignored, but rather that these fresh ideas and thoughts should be contained within a different phase of the operation.

“In fact, the new information and ideas that are unlocked throughout the course of the PoC, should be considered only after the initial results have indicated that the PoC meets minimum specifications,” says Laval. “The metric that ultimately determines the success of the PoC is whether or not the solution adds value to the business and this can only be understood objectively if the metrics are agreed upon early in the engagement. They should ideally be agreed upon by both the business and the solutions vendor at the beginning of the process to avoid any complications later on.”

To deliver relevant results, the business entering into the PoC needs to understand exactly what information is valuable. This can relate to increased return on investment (ROI), greater operational efficiencies, faster go-to-market capabilities, or improved customer satisfaction. Often, solution providers will promise an array of benefits to the business, across multiple spheres, and equally often, many of these may not be feasible.

The best approach to any PoC is a realistic one that isolates a few key pain points that need to be addressed during the PoC period. This tends to lead to simpler metrics that allow for more valuable evaluation and improved long-term success.

“It is critical to involve all the stakeholders in the business to ensure the problem is correctly defined and understood across multiple levels of the organisation,” says Laval. “By the same token, PoC success is dependent on the reputation and capabilities of the service providers and consultants that the organisation works with.”

Before embarking on a PoC, check the credentials of partner organisations, reference their case studies that describe similar deployments, and ensure you have a clear picture of their capabilities. This will help to identify possible complications early on in the process and mitigate preventable issues.

“A business should consider a PoC project wherever there is a problem that requires an innovative solution, but should always ensure completion is timeous, partners well-vetted, and parameters extensively measured,” concludes Laval.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
Perspectives on personal care monitoring and smart surveillance
Leaderware Editor's Choice Surveillance Smart Home Automation IoT & Automation
Dr Craig Donald believes smart surveillance offers a range of options for monitoring loved ones, but making the right choice is not always as simple as selecting the latest technology.

Read more...
MySecurityApp for SME security firms
Surveillance Integrated Solutions
Solution House Software has introduced MySecurityApp, a platform that expedites security operations management for startup and growing security companies by delivering a comprehensive and user-friendly mobile app designed to simplify setting up and growing security companies’ operations.

Read more...
MySecurityApp for SME security firms
Surveillance Integrated Solutions
Solution House Software has introduced MySecurityApp, a platform that expedites security operations management for startup and growing security companies by delivering a comprehensive and user-friendly mobile app designed to simplify setting up and growing security companies’ operations.

Read more...
AI enables security solutions to define business strategies
Regal Distributors SA Editor's Choice
While allowing technologies to do exactly what they should do with even more efficiency and precision, AI is also empowering these same technologies to break through their traditional boundaries and create an ecosystem where one interface delivers outcomes across highly segmented verticals.

Read more...
Putting cyber into surveillance
Dallmeier Electronic Southern Africa Cathexis Technologies Technews Publishing Editor's Choice
Cybersecurity has become an essential part of the physical security industry. However, unlike other IoT technologies, of which security products are a part, surveillance technologies have more to protect.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...