Blueprint your IPMS

March 2010 Integrated Solutions, Information Security

The most common mistake companies make before embarking on a technology implementation or modernisation project is to solicit bids from vendors prior to developing a blueprint or requirements specification. Integrated people management solutions (IPMS) are no different. From our experience, the following is the result of failing to create a blueprint:

* The 'bigger picture' is missed.

* True requirements are not understood.

* Business objectives are not met.

Bigger picture missed

By approaching vendors before the business requirements have been defined, it is assumed that the scope of the project is limited to whatever functions the vendor’s solution covers. Enterprise-wide requirements and synergies are not considered and explored. This can result in some business functions from being incorrectly excluded from the scope. This leads to implementing standalone technology that is inadequate – forcing the company to either replace the technology at some later stage or develop customised solutions that are expensive to maintain.

For example, take an access control and HR solution that is not centralised. A contractor could be banned from one site preventing that person from entering that specific site. He/she then leaves his position at the contracting company and applies for a position at the main company at another site – effectively providing the same person access to the same company. A centralised security/people management solution would prevent this from happening.

Requirements not understood

By not spending the time to define your IPMS business’s requirements, the decision makers do not have a clear and complete picture of the complete set of requirements. Having the right people involved during the design phase can make sure all requirements are considered. For example, your company might have an access control solution and a time and attendance solution. The access control function could typically reside with the IT department or security manager, while the time and attendance function resides with the operations or HR manager. By not involving the right people upfront, one could miss the opportunity to re-use current infrastructure like the access control readers and apply it for the time and attendance solution. There would then be an opportunity to integrate these solutions.

It is clear that not conducting a proper blueprinting process can lead to internal conflict between business process owners. It also leads to false perceptions of what the real requirements are (with warped priorities). This could result in paying for and implementing technology that is not needed or will not work in the specific business environment.

Business objectives not met

A very important step during the blueprint phase of an IPMS solution is to first align the business requirements with the company’s HCM, risk management and IT strategy and objectives. Aligning the requirements to meet these objectives would go a long way to understand and prioritise which systems or technology is required.

Based on perceived requirements, the wrong vendors are involved in the beginning and a lot of time is wasted by both the vendors and their prospective clients. For example, if the security manager wants to upgrade the access control system, he/she could solicit vendors only providing security solutions. After many meetings with the prospective vendors and the security manager, the HR manager becomes involved in the process and then adds their requirements. The need for a wider solution has now been identified, which may require the company to engage with different vendors altogether.

Unclear or vague requirements also results in:

* Many back and forth communication and clarification meetings.

* Inconsistent communication between prospective vendors, resulting in confusion.

* Incorrect responses from vendors resulting in incorrect findings during the evaluation process.

Unclear or undefined requirements can also lead to a very subjective vendor selection process. A vendor’s weaknesses can be played down by internal process owners and vendors since the requirements are not precise or sometimes not even defined at all.

Performing a proper blueprint design for your IPMS function before embarking on a vendor selection process is essential to having a successful technology implementation. It saves time, reduces frustration, improves the adoption rate and is a lower risk approach to ensure that business objectives are met, whilst delivering sustainable solutions.

For more information contact Michael Olivier, innoVIZION Business Solutions, +27 (0)11 463 0123, [email protected], www.innovizion.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...