Blueprint your IPMS

March 2010 Integrated Solutions, Information Security

The most common mistake companies make before embarking on a technology implementation or modernisation project is to solicit bids from vendors prior to developing a blueprint or requirements specification. Integrated people management solutions (IPMS) are no different. From our experience, the following is the result of failing to create a blueprint:

* The 'bigger picture' is missed.

* True requirements are not understood.

* Business objectives are not met.

Bigger picture missed

By approaching vendors before the business requirements have been defined, it is assumed that the scope of the project is limited to whatever functions the vendor’s solution covers. Enterprise-wide requirements and synergies are not considered and explored. This can result in some business functions from being incorrectly excluded from the scope. This leads to implementing standalone technology that is inadequate – forcing the company to either replace the technology at some later stage or develop customised solutions that are expensive to maintain.

For example, take an access control and HR solution that is not centralised. A contractor could be banned from one site preventing that person from entering that specific site. He/she then leaves his position at the contracting company and applies for a position at the main company at another site – effectively providing the same person access to the same company. A centralised security/people management solution would prevent this from happening.

Requirements not understood

By not spending the time to define your IPMS business’s requirements, the decision makers do not have a clear and complete picture of the complete set of requirements. Having the right people involved during the design phase can make sure all requirements are considered. For example, your company might have an access control solution and a time and attendance solution. The access control function could typically reside with the IT department or security manager, while the time and attendance function resides with the operations or HR manager. By not involving the right people upfront, one could miss the opportunity to re-use current infrastructure like the access control readers and apply it for the time and attendance solution. There would then be an opportunity to integrate these solutions.

It is clear that not conducting a proper blueprinting process can lead to internal conflict between business process owners. It also leads to false perceptions of what the real requirements are (with warped priorities). This could result in paying for and implementing technology that is not needed or will not work in the specific business environment.

Business objectives not met

A very important step during the blueprint phase of an IPMS solution is to first align the business requirements with the company’s HCM, risk management and IT strategy and objectives. Aligning the requirements to meet these objectives would go a long way to understand and prioritise which systems or technology is required.

Based on perceived requirements, the wrong vendors are involved in the beginning and a lot of time is wasted by both the vendors and their prospective clients. For example, if the security manager wants to upgrade the access control system, he/she could solicit vendors only providing security solutions. After many meetings with the prospective vendors and the security manager, the HR manager becomes involved in the process and then adds their requirements. The need for a wider solution has now been identified, which may require the company to engage with different vendors altogether.

Unclear or vague requirements also results in:

* Many back and forth communication and clarification meetings.

* Inconsistent communication between prospective vendors, resulting in confusion.

* Incorrect responses from vendors resulting in incorrect findings during the evaluation process.

Unclear or undefined requirements can also lead to a very subjective vendor selection process. A vendor’s weaknesses can be played down by internal process owners and vendors since the requirements are not precise or sometimes not even defined at all.

Performing a proper blueprint design for your IPMS function before embarking on a vendor selection process is essential to having a successful technology implementation. It saves time, reduces frustration, improves the adoption rate and is a lower risk approach to ensure that business objectives are met, whilst delivering sustainable solutions.

For more information contact Michael Olivier, innoVIZION Business Solutions, +27 (0)11 463 0123, michaelo@innovizion.co.za, www.innovizion.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.