Blueprint your IPMS - Part 2

May 2010 Integrated Solutions, Information Security

The March 2010 edition of Hi-Tech Security Solutions featured Part 1 on Blueprinting your Integrated People Management Solutions (IPMS). Part 2 follows.

In the March article, it was highlighted that a crucial step in understanding the bigger picture is understanding the company’s true requirements and ensuring that the solution implementation meets the company’s business objectives.

By soliciting vendors prior to performing a blueprint, business requirements and resulting technology selection is driven by what the vendor’s products strengths are and not by what the business really wants the technology’s strengths to be.

So, how do you get it right first time and on budget? The diagram shows an example of a modern IPMS framework that should be considered during your blueprinting process.

In most companies, many of the functions listed in this framework operate as silos. Small enterprises can cope with these islands of information. Medium to large enterprises however, have specific departments dealing with these functions.

For example, there is a security/risk department that needs security information about their employees. There is a manufacturing department that needs people asset management, time and attendance, contractor, visitor and vehicle management. There is a logistics and warehousing department that needs digital surveillance and performance management. There are retail stores that need workforce planning, scheduling and single-sign-on for the POS sale operations. The list goes on – not even to mention the human resources department.

These business functions need an integrated approach to enable process owners to manage costs and drive profitability effectively. Therefore, understanding, documenting and then managing your business processes across these functions becomes important. This is core to the blueprinting process. It enables process owners to understand up-stream and down-stream effects across departments and identify ways to benefit from the information generated by them.

Once the business processes are defined and business benefits are understood, business requirements are defined and prioritised.

Typical questions from management would be: 'How much will we save?' and 'How much will it cost?' Defining the benefits up front is important in order to motivate the required changes. Getting the requirements clear and complete also helps getting the costing side right resulting in more accurate budgets.

'Must-haves' vs. 'nice-to-haves' plays a big part in clarifying the requirements. For example, the HR manager might think to have an access control solution that seamlessly links to a criminal record check is of low priority. The security manager might see this as high priority based on certain legal requirements and/or industry specific standards. If these are not discussed and agreed up front, the company might miss critical requirements.

Blueprinting your IPMS also has benefits in the detail design and implementation phase of the project. It reduces the chances of:

* Technology not fitting the business requirements.

* Adapting business processes to fit with the technology, rather than vice-versa.

* The project team encountering resistance from the business users.

The last part of the blueprint focuses on the technology side, where the systems architecture is defined. This includes hardware, software and networking requirements. Based on the business processes and business requirements, a systems architecture model is developed. For an IPMS, typical aspects to consider include secure Single Sign-On, centralised vs. decentralised data management, biometric template distribution and total and seamless integration to other business applications.

For more information contact innoVIZION Business Solutions, +27 (0)11 463 0123, [email protected], www.innovizion.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...