Workforce management beyond T&A

June 2017 Editor's Choice, Access Control & Identity Management, Integrated Solutions

As expectations of workforce management systems have progressed far beyond simple time and attendance registers kept by HR departments, they have increasingly incorporated functions and features that fall under the domain of security departments. These advances necessitate more sophisticated software and hardware platforms, as well as more specialised skills to set up, manage and administer them.

Mark Stoop.
Mark Stoop.

Mark Stoop, sales manager – workforce management at EOH Security and Building Technologies, explains that “true workforce management covers all aspects of looking after your most important assets, your employee workforce. This scales way above just the standard T&A, it encompasses aspects such as leave management, fatigue management, operational health and safety, perimeter control, surveillance, self-service and more.

“The legacy of workforce management was for the mining, manufacturing and engineering sectors which historically focused on time and attendance solutions. Nowadays, all types of companies are looking for solutions to assist in scheduling, suitability, managing of project time, budget versus actual versus forecast, hosted/cloud solutions, to name a few. This requirement and market trend has opened the market to white collar workers who are actively interested in achieving ROI (return on investment) through technology. No longer is this just a sporadic, or shot-in-the-dark approach, rather technology is making company goals achievable.”

Tiaan Janse van Rensburg.
Tiaan Janse van Rensburg.

According to Tiaan Janse van Rensburg, director at Solution House, the company views everything as a service request to complete a specific task. “For a specific guard to be at a specific site at a predefined time and duration is a service request,” he clarifies. “A technician required to fix something on a site is also a service request. Time and attendance is thus one aspect of a service request, the others being scheduling, task management and verification of location and duration.

In my view, the success of any solution depends on its ability to handle complex problems in a simple way. In workforce management, the complexity arises when you are dealing with multiple layers such as managing teams of workers, and not just a single site but a multi-layered site such as a room on a floor in a building on a site – all through a smartphone app.”

He goes on to say that current trends are focused on completing the full lifecycle of workforce management: logging the initial service request, scheduling work, acceptance of the job by the remote worker, starting and completing the task, measurement of duration, business information and integration. “The challenge is obviously to handle the added complexity in a simple and user friendly manner,” he says. “There is without a doubt movement towards mobile workforce management in large corporates and now medium sized companies. Smaller companies which are usually less mature in terms of processes and technology are lagging behind.”

Flexibility and simplicity

Stoop pinpoints flexibility, ease-of-use and mobility as features that are trending at present. “Most companies are looking for solutions that can cater for their standard requirements, as well as enhance the employee benefits,” he states. “Managers shouldn’t be running reports. Their workforce management system should give them the actionable data they need, when they need it.

“Getting employees involved in your workforce management system is essential to its adoption and ability to achieve ROI. An employee self-service or mobility module is key to allow staff to request time off, clock in/out, view their upcoming schedules, view their timesheets, request shift swaps and more, all via their mobile device.”

He further emphasises that integration is a key consideration for modern workforce management solutions: “With the many platforms and technology available, without the ability to have a single approach, the competitive edge will be lost. Take for example the linking of an ERP solution, with all relevant employee master data detail including leave etc, seamlessly imported into a workforce management solution and/or access control, this provides the clients with a single point of entry to enforce company policies through the various applications.”

On the point of integration, Stoop continues by saying that “Organisations tend to lump all applications as the responsibility of the IT department, and rightly so due to the need for infrastructure and maintenance thereof. However, when it comes to the custodians of the actual running of these applications on a day-to-day basis, various departments are involved, including human resources, security, operations, SHERQ (Safety, Health, Environment, Risk and Quality) and finance. With modern solutions, the need for flexibility and to be able to cater for various users is a must.”

While in agreement on the importance of such integration, Janse van Rensburg says it is far from ubiquitously implemented in the South African market. “Large service management companies are demanding it, which will filter down to the smaller companies. It will probably be standard in South Africa in another two years’ time, and is already fairly standard with our customers in the UK. Sage is quite popular and we already integrate with SAP,” he says.

Skills and simplicity

Workforce management goes beyond security, while still including security, so it is vital to define who is responsible for implementing and maintaining these complex systems, and that they have the skills required to manage them. Stoop believes that having locally based, skilled engineers to deploy applications will determine not only the success of a project implementation, but also the long-term service programme available to clients.

“Generally if applications are not locally developed, and sourced from best of breed partners internationally, a stringent training and certification programme is usually available to ensure locally based engineers are equipped to sell, deploy and maintain.”

As Janse van Rensburg puts it, “We live in a 24 hour on-demand industry and economy. Systems must be available all the time. If systems are designed and implemented with this in mind they usually require very little maintenance and support, which equates to low running costs. This always comes back in the first instance to the system installer and secondly to the system developer. The skills are available locally, but not always the experience. It is easy to develop a system that is difficult to use and maintain. It is difficult to develop a system that is easy to use and maintain.”

For more information contact:

Mark Stoop, EOH Security and Building Technologies, +27 (0)11 844 3200, mark.stoop@eoh.com, www.eoh-fss.co.za

Tiaan Janse van Rensburg, Solution House, +27 (0)82 565 8081, tiaan@solutionhouse.co.za, www.incidentmanagement.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Unlocking Africa's AI potential
Editor's Choice News & Events AI & Data Analytics
Africa's AI market is set to grow exponentially; by investing in AI education, training, and ethical practices, African nations can harness the power of AI to transform the continent and create a brighter future for its people.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...