Workforce management beyond T&A

June 2017 Editor's Choice, Access Control & Identity Management, Integrated Solutions

As expectations of workforce management systems have progressed far beyond simple time and attendance registers kept by HR departments, they have increasingly incorporated functions and features that fall under the domain of security departments. These advances necessitate more sophisticated software and hardware platforms, as well as more specialised skills to set up, manage and administer them.

Mark Stoop.
Mark Stoop.

Mark Stoop, sales manager – workforce management at EOH Security and Building Technologies, explains that “true workforce management covers all aspects of looking after your most important assets, your employee workforce. This scales way above just the standard T&A, it encompasses aspects such as leave management, fatigue management, operational health and safety, perimeter control, surveillance, self-service and more.

“The legacy of workforce management was for the mining, manufacturing and engineering sectors which historically focused on time and attendance solutions. Nowadays, all types of companies are looking for solutions to assist in scheduling, suitability, managing of project time, budget versus actual versus forecast, hosted/cloud solutions, to name a few. This requirement and market trend has opened the market to white collar workers who are actively interested in achieving ROI (return on investment) through technology. No longer is this just a sporadic, or shot-in-the-dark approach, rather technology is making company goals achievable.”

Tiaan Janse van Rensburg.
Tiaan Janse van Rensburg.

According to Tiaan Janse van Rensburg, director at Solution House, the company views everything as a service request to complete a specific task. “For a specific guard to be at a specific site at a predefined time and duration is a service request,” he clarifies. “A technician required to fix something on a site is also a service request. Time and attendance is thus one aspect of a service request, the others being scheduling, task management and verification of location and duration.

In my view, the success of any solution depends on its ability to handle complex problems in a simple way. In workforce management, the complexity arises when you are dealing with multiple layers such as managing teams of workers, and not just a single site but a multi-layered site such as a room on a floor in a building on a site – all through a smartphone app.”

He goes on to say that current trends are focused on completing the full lifecycle of workforce management: logging the initial service request, scheduling work, acceptance of the job by the remote worker, starting and completing the task, measurement of duration, business information and integration. “The challenge is obviously to handle the added complexity in a simple and user friendly manner,” he says. “There is without a doubt movement towards mobile workforce management in large corporates and now medium sized companies. Smaller companies which are usually less mature in terms of processes and technology are lagging behind.”

Flexibility and simplicity

Stoop pinpoints flexibility, ease-of-use and mobility as features that are trending at present. “Most companies are looking for solutions that can cater for their standard requirements, as well as enhance the employee benefits,” he states. “Managers shouldn’t be running reports. Their workforce management system should give them the actionable data they need, when they need it.

“Getting employees involved in your workforce management system is essential to its adoption and ability to achieve ROI. An employee self-service or mobility module is key to allow staff to request time off, clock in/out, view their upcoming schedules, view their timesheets, request shift swaps and more, all via their mobile device.”

He further emphasises that integration is a key consideration for modern workforce management solutions: “With the many platforms and technology available, without the ability to have a single approach, the competitive edge will be lost. Take for example the linking of an ERP solution, with all relevant employee master data detail including leave etc, seamlessly imported into a workforce management solution and/or access control, this provides the clients with a single point of entry to enforce company policies through the various applications.”

On the point of integration, Stoop continues by saying that “Organisations tend to lump all applications as the responsibility of the IT department, and rightly so due to the need for infrastructure and maintenance thereof. However, when it comes to the custodians of the actual running of these applications on a day-to-day basis, various departments are involved, including human resources, security, operations, SHERQ (Safety, Health, Environment, Risk and Quality) and finance. With modern solutions, the need for flexibility and to be able to cater for various users is a must.”

While in agreement on the importance of such integration, Janse van Rensburg says it is far from ubiquitously implemented in the South African market. “Large service management companies are demanding it, which will filter down to the smaller companies. It will probably be standard in South Africa in another two years’ time, and is already fairly standard with our customers in the UK. Sage is quite popular and we already integrate with SAP,” he says.

Skills and simplicity

Workforce management goes beyond security, while still including security, so it is vital to define who is responsible for implementing and maintaining these complex systems, and that they have the skills required to manage them. Stoop believes that having locally based, skilled engineers to deploy applications will determine not only the success of a project implementation, but also the long-term service programme available to clients.

“Generally if applications are not locally developed, and sourced from best of breed partners internationally, a stringent training and certification programme is usually available to ensure locally based engineers are equipped to sell, deploy and maintain.”

As Janse van Rensburg puts it, “We live in a 24 hour on-demand industry and economy. Systems must be available all the time. If systems are designed and implemented with this in mind they usually require very little maintenance and support, which equates to low running costs. This always comes back in the first instance to the system installer and secondly to the system developer. The skills are available locally, but not always the experience. It is easy to develop a system that is difficult to use and maintain. It is difficult to develop a system that is easy to use and maintain.”

For more information contact:

Mark Stoop, EOH Security and Building Technologies, +27 (0)11 844 3200, [email protected], www.eoh-fss.co.za

Tiaan Janse van Rensburg, Solution House, +27 (0)82 565 8081, [email protected], www.incidentmanagement.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Biometric security key for phishing-resistant MFA
Products & Solutions Access Control & Identity Management
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Read more...
Winners of the 2025 Southern Africa OSPAs
Editor's Choice
The winners of the 2025 Southern Africa Outstanding Security Performance Awards (OSPAs) were revealed on Wednesday, 4th June, at Securex South Africa. Winners from all categories (except the Lifetime Achievement) will be featured in the second Global OSPAs set to take place in 2026.

Read more...
Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.