Blueprint your IPMS - Part 2

May 2010 Integrated Solutions, Cyber Security

The March 2010 edition of Hi-Tech Security Solutions featured Part 1 on Blueprinting your Integrated People Management Solutions (IPMS). Part 2 follows.

In the March article, it was highlighted that a crucial step in understanding the bigger picture is understanding the company’s true requirements and ensuring that the solution implementation meets the company’s business objectives.

By soliciting vendors prior to performing a blueprint, business requirements and resulting technology selection is driven by what the vendor’s products strengths are and not by what the business really wants the technology’s strengths to be.

So, how do you get it right first time and on budget? The diagram shows an example of a modern IPMS framework that should be considered during your blueprinting process.

In most companies, many of the functions listed in this framework operate as silos. Small enterprises can cope with these islands of information. Medium to large enterprises however, have specific departments dealing with these functions.

For example, there is a security/risk department that needs security information about their employees. There is a manufacturing department that needs people asset management, time and attendance, contractor, visitor and vehicle management. There is a logistics and warehousing department that needs digital surveillance and performance management. There are retail stores that need workforce planning, scheduling and single-sign-on for the POS sale operations. The list goes on – not even to mention the human resources department.

These business functions need an integrated approach to enable process owners to manage costs and drive profitability effectively. Therefore, understanding, documenting and then managing your business processes across these functions becomes important. This is core to the blueprinting process. It enables process owners to understand up-stream and down-stream effects across departments and identify ways to benefit from the information generated by them.

Once the business processes are defined and business benefits are understood, business requirements are defined and prioritised.

Typical questions from management would be: 'How much will we save?' and 'How much will it cost?' Defining the benefits up front is important in order to motivate the required changes. Getting the requirements clear and complete also helps getting the costing side right resulting in more accurate budgets.

'Must-haves' vs. 'nice-to-haves' plays a big part in clarifying the requirements. For example, the HR manager might think to have an access control solution that seamlessly links to a criminal record check is of low priority. The security manager might see this as high priority based on certain legal requirements and/or industry specific standards. If these are not discussed and agreed up front, the company might miss critical requirements.

Blueprinting your IPMS also has benefits in the detail design and implementation phase of the project. It reduces the chances of:

* Technology not fitting the business requirements.

* Adapting business processes to fit with the technology, rather than vice-versa.

* The project team encountering resistance from the business users.

The last part of the blueprint focuses on the technology side, where the systems architecture is defined. This includes hardware, software and networking requirements. Based on the business processes and business requirements, a systems architecture model is developed. For an IPMS, typical aspects to consider include secure Single Sign-On, centralised vs. decentralised data management, biometric template distribution and total and seamless integration to other business applications.

For more information contact innoVIZION Business Solutions, +27 (0)11 463 0123,,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Keep your distance with PeopleCounter and DistanceGuard
Issue 6 2020 , Integrated Solutions
Using 2D and 3D LiDAR sensors from SICK, people can easily uphold the recommended minimum distance in public and pre-defined spaces.

Critical control management
Issue 5 2020 , Integrated Solutions
The critical control management process is an excellent practical approach to ensure effective controls over potentially catastrophic events.

Adjusting to a new reality
Issue 5 2020, Technews Publishing , Integrated Solutions
COVID-19 to accelerate adoption of technology-enabled smart city resilience approaches: robotics, digital twins, and autonomous freight.

Remote oversight imperative for smart buildings
Issue 5 2020 , Integrated Solutions
Duran Viera, CEO of Amecor, says one of South Africa’s biggest drivers for smart building development is security.

Shaping today’s smart cities
Issue 5 2020, ZKTeco , Integrated Solutions
As our physical and digital worlds become intertwined, the absorption of new technologies in smart cities is inevitable.

The evolution of security in residential estates
Residential Estate Security Handbook 2020 , Editor's Choice, Integrated Solutions, Security Services & Risk Management
Two large estates discuss their security processes and the ever-expanding scope of responsibilities they need to fulfil.

Home-grown, cloud-based safety and security solutions
Residential Estate Security Handbook 2020 , IT infrastructure, Integrated Solutions
BeSecure has taken security and communications technologies and turned them into what is best described as care and safety solutions for the estate community in South Africa.

Integrated security management system
Residential Estate Security Handbook 2020, Protoclea Advanced Image Engineering , Products, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Phorcas is a security information system developed by Protoclea designed to integrate multiple sub-systems into a powerful crime fighting solution.

Critical control management is essential for quality surveillance
Issue 6 2020 , Integrated Solutions
The demand for effective surveillance remains a priority for security and line management involved with the day to day protection of assets.

Tips on secure remote working
Issue 3 2020 , IT infrastructure, Cyber Security
NordVPN advises how to stay secure while working from home during the coronavirus outbreak.