Blueprint your IPMS - Part 2

May 2010 Integrated Solutions, Information Security

The March 2010 edition of Hi-Tech Security Solutions featured Part 1 on Blueprinting your Integrated People Management Solutions (IPMS). Part 2 follows.

In the March article, it was highlighted that a crucial step in understanding the bigger picture is understanding the company’s true requirements and ensuring that the solution implementation meets the company’s business objectives.

By soliciting vendors prior to performing a blueprint, business requirements and resulting technology selection is driven by what the vendor’s products strengths are and not by what the business really wants the technology’s strengths to be.

So, how do you get it right first time and on budget? The diagram shows an example of a modern IPMS framework that should be considered during your blueprinting process.

In most companies, many of the functions listed in this framework operate as silos. Small enterprises can cope with these islands of information. Medium to large enterprises however, have specific departments dealing with these functions.

For example, there is a security/risk department that needs security information about their employees. There is a manufacturing department that needs people asset management, time and attendance, contractor, visitor and vehicle management. There is a logistics and warehousing department that needs digital surveillance and performance management. There are retail stores that need workforce planning, scheduling and single-sign-on for the POS sale operations. The list goes on – not even to mention the human resources department.

These business functions need an integrated approach to enable process owners to manage costs and drive profitability effectively. Therefore, understanding, documenting and then managing your business processes across these functions becomes important. This is core to the blueprinting process. It enables process owners to understand up-stream and down-stream effects across departments and identify ways to benefit from the information generated by them.

Once the business processes are defined and business benefits are understood, business requirements are defined and prioritised.

Typical questions from management would be: 'How much will we save?' and 'How much will it cost?' Defining the benefits up front is important in order to motivate the required changes. Getting the requirements clear and complete also helps getting the costing side right resulting in more accurate budgets.

'Must-haves' vs. 'nice-to-haves' plays a big part in clarifying the requirements. For example, the HR manager might think to have an access control solution that seamlessly links to a criminal record check is of low priority. The security manager might see this as high priority based on certain legal requirements and/or industry specific standards. If these are not discussed and agreed up front, the company might miss critical requirements.

Blueprinting your IPMS also has benefits in the detail design and implementation phase of the project. It reduces the chances of:

* Technology not fitting the business requirements.

* Adapting business processes to fit with the technology, rather than vice-versa.

* The project team encountering resistance from the business users.

The last part of the blueprint focuses on the technology side, where the systems architecture is defined. This includes hardware, software and networking requirements. Based on the business processes and business requirements, a systems architecture model is developed. For an IPMS, typical aspects to consider include secure Single Sign-On, centralised vs. decentralised data management, biometric template distribution and total and seamless integration to other business applications.

For more information contact innoVIZION Business Solutions, +27 (0)11 463 0123, [email protected], www.innovizion.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.