Workforce management beyond T&A

June 2017 Editor's Choice, Access Control & Identity Management, Integrated Solutions

As expectations of workforce management systems have progressed far beyond simple time and attendance registers kept by HR departments, they have increasingly incorporated functions and features that fall under the domain of security departments. These advances necessitate more sophisticated software and hardware platforms, as well as more specialised skills to set up, manage and administer them.

Mark Stoop.
Mark Stoop.

Mark Stoop, sales manager – workforce management at EOH Security and Building Technologies, explains that “true workforce management covers all aspects of looking after your most important assets, your employee workforce. This scales way above just the standard T&A, it encompasses aspects such as leave management, fatigue management, operational health and safety, perimeter control, surveillance, self-service and more.

“The legacy of workforce management was for the mining, manufacturing and engineering sectors which historically focused on time and attendance solutions. Nowadays, all types of companies are looking for solutions to assist in scheduling, suitability, managing of project time, budget versus actual versus forecast, hosted/cloud solutions, to name a few. This requirement and market trend has opened the market to white collar workers who are actively interested in achieving ROI (return on investment) through technology. No longer is this just a sporadic, or shot-in-the-dark approach, rather technology is making company goals achievable.”

Tiaan Janse van Rensburg.
Tiaan Janse van Rensburg.

According to Tiaan Janse van Rensburg, director at Solution House, the company views everything as a service request to complete a specific task. “For a specific guard to be at a specific site at a predefined time and duration is a service request,” he clarifies. “A technician required to fix something on a site is also a service request. Time and attendance is thus one aspect of a service request, the others being scheduling, task management and verification of location and duration.

In my view, the success of any solution depends on its ability to handle complex problems in a simple way. In workforce management, the complexity arises when you are dealing with multiple layers such as managing teams of workers, and not just a single site but a multi-layered site such as a room on a floor in a building on a site – all through a smartphone app.”

He goes on to say that current trends are focused on completing the full lifecycle of workforce management: logging the initial service request, scheduling work, acceptance of the job by the remote worker, starting and completing the task, measurement of duration, business information and integration. “The challenge is obviously to handle the added complexity in a simple and user friendly manner,” he says. “There is without a doubt movement towards mobile workforce management in large corporates and now medium sized companies. Smaller companies which are usually less mature in terms of processes and technology are lagging behind.”

Flexibility and simplicity

Stoop pinpoints flexibility, ease-of-use and mobility as features that are trending at present. “Most companies are looking for solutions that can cater for their standard requirements, as well as enhance the employee benefits,” he states. “Managers shouldn’t be running reports. Their workforce management system should give them the actionable data they need, when they need it.

“Getting employees involved in your workforce management system is essential to its adoption and ability to achieve ROI. An employee self-service or mobility module is key to allow staff to request time off, clock in/out, view their upcoming schedules, view their timesheets, request shift swaps and more, all via their mobile device.”

He further emphasises that integration is a key consideration for modern workforce management solutions: “With the many platforms and technology available, without the ability to have a single approach, the competitive edge will be lost. Take for example the linking of an ERP solution, with all relevant employee master data detail including leave etc, seamlessly imported into a workforce management solution and/or access control, this provides the clients with a single point of entry to enforce company policies through the various applications.”

On the point of integration, Stoop continues by saying that “Organisations tend to lump all applications as the responsibility of the IT department, and rightly so due to the need for infrastructure and maintenance thereof. However, when it comes to the custodians of the actual running of these applications on a day-to-day basis, various departments are involved, including human resources, security, operations, SHERQ (Safety, Health, Environment, Risk and Quality) and finance. With modern solutions, the need for flexibility and to be able to cater for various users is a must.”

While in agreement on the importance of such integration, Janse van Rensburg says it is far from ubiquitously implemented in the South African market. “Large service management companies are demanding it, which will filter down to the smaller companies. It will probably be standard in South Africa in another two years’ time, and is already fairly standard with our customers in the UK. Sage is quite popular and we already integrate with SAP,” he says.

Skills and simplicity

Workforce management goes beyond security, while still including security, so it is vital to define who is responsible for implementing and maintaining these complex systems, and that they have the skills required to manage them. Stoop believes that having locally based, skilled engineers to deploy applications will determine not only the success of a project implementation, but also the long-term service programme available to clients.

“Generally if applications are not locally developed, and sourced from best of breed partners internationally, a stringent training and certification programme is usually available to ensure locally based engineers are equipped to sell, deploy and maintain.”

As Janse van Rensburg puts it, “We live in a 24 hour on-demand industry and economy. Systems must be available all the time. If systems are designed and implemented with this in mind they usually require very little maintenance and support, which equates to low running costs. This always comes back in the first instance to the system installer and secondly to the system developer. The skills are available locally, but not always the experience. It is easy to develop a system that is difficult to use and maintain. It is difficult to develop a system that is easy to use and maintain.”

For more information contact:

Mark Stoop, EOH Security and Building Technologies, +27 (0)11 844 3200, [email protected], www.eoh-fss.co.za

Tiaan Janse van Rensburg, Solution House, +27 (0)82 565 8081, [email protected], www.incidentmanagement.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

South African fire standards in a nutshell
Fire & Safety Editor's Choice Training & Education
The importance of compliant fire detection systems and proper fire protection cannot be overstated, especially for businesses. Statistics reveal that 44% of businesses fail to reopen after a fire.

Read more...
LidarVision for substation security
Fire & Safety Government and Parastatal (Industry) Editor's Choice
EG.D supplies electricity to 2,7 million people in the southern regions of the Czech Republic, on the borders of Austria and Germany. The company operates and maintains infrastructure, including power lines and high-voltage transformer substations.

Read more...
Standards for fire detection
Fire & Safety Associations Editor's Choice
In previous articles in the series on fire standards, Nick Collins discussed SANS 10400-T and SANS 10139. In this editorial, he continues with SANS 322 – Fire Detection and Alarm Systems for Hospitals.

Read more...
Wildfires: a growing global threat
Editor's Choice Fire & Safety
Regulatory challenges and litigation related to wildfire liabilities are on the rise, necessitating robust risk management strategies and well-documented wildfire management plans. Technological innovations are enhancing detection and suppression capabilities.

Read more...
Nice unveils MyNice Smartgo
News & Events Access Control & Identity Management
Nice SA has announced the release of MyNice Smartgo, a compact access automation solution, designed specifically for the South African market, combining an easy-to-install device with a user-friendly smartphone application.friendly smartphone application.

Read more...
Acronis and Metrofile Cloud announce partnership
Infrastructure Integrated Solutions
Acronis has appointed Metrofile Cloud as its premier disaster recovery (DR) partner in southern Africa, combining Acronis' technologies with Metrofile Cloud's local expertise to deliver secure and adaptable disaster recovery solutions for businesses across the region.

Read more...
Biometric security key for phishing-resistant MFA
Products & Solutions Access Control & Identity Management
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Read more...
Winners of the 2025 Southern Africa OSPAs
Editor's Choice
The winners of the 2025 Southern Africa Outstanding Security Performance Awards (OSPAs) were revealed on Wednesday, 4th June, at Securex South Africa. Winners from all categories (except the Lifetime Achievement) will be featured in the second Global OSPAs set to take place in 2026.

Read more...
Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.