BPM Assets - asset management
The BPM Infrastructure module is used to manage the resources available in the organization, taking into account the division into specific groups. The module can distinguish fractions of devices, rooms and assets:
- ICT systems broken down into devices and software (licenses),
- Objects – KOB,
- Machines – DTR,
- Control and measurement devices,
- Work environment monitoring devices,
- Fire fighting devices / fire extinguishers,
- Any other.
For each of the above-mentioned groups, there is a separate tab presenting the register with information on individual assets. Each asset has its own metric, or as it is commonly used in property management methodologies – a passport. The passport allows you to describe a number of features that relate to it, from the name, category, manufacturer, location, responsible for operation, to the warranty or service. The system also enables the description of planned actions or events related to this component (e.g. service dates, inspection, validation, etc.).
The BPM system has a dedicated mobile application, designed in the power apps technology, supporting the BPM Infrastructure module. This application has a number of functionalities related to conducting field reviews of resources available in the organization.
The user scans the QR code located on the surface of the resource, thanks to which he receives a set of up-to-date information about it. Without access to a computer, it can easily verify whether the data is up-to-date and plan additional actions. Thanks to the continuous communication between the system and the server, all information completed during the inspection is entered into the BPM system.
The activities related to the maintenance and operation of an asset are assigned to its metric / passport directly or as part of the planning of risk activities. Events are reminded by creating an appropriate task to carry out a planned action, e.g. a review of an asset directed to the responsible person, who was previously indicated in the definition of the action (in the asset calendar). She receives an e-mail with a task assignment notification, in which she enters the execution date and the result of the action. It can also attach files and notify the supervisor of a given component about the action.
By assessing the risk of an organization’s operation, you assess the risk of security and availability of resources. Therefore, BPM links the analyzes performed under other modules: “Information security”, “Business continuity”, “GDPR”, “Operational risk”, “Incident management” with the resources they concern. This allows you to manage assets in a very effective way and obtain information about their actual impact on our business.
In the passport, the assets describing the asset, in addition to the features, also collect actions performed on it, such as: inspections, calibrations, payments made and related events, such as an incident, failure, tests. A specific case of actions are actions that change the device status (e.g. withdrawal).
The system ensures the linking of resources and the construction of their hierarchical dependencies, which allows to understand the functioning of the organization and the dependencies between resources.
A very interesting functionality is the automatic identification of resources, which can be carried out with an additional module in the area of IT infrastructure.
The implemented module improved the management of infrastructure in the form of mining equipment. The register of property, in particular of fire-fighting equipment, was easily carried out. Thanks to the use of the mobile application, it was possible to check and keep up-to-date inspections of the equipment distributed throughout the mine.
The designed module made it possible to enter information on numerous laboratory equipment into the system. The implementation of this facility resulted in the systematization of documentation related to certified laboratory work, including classifying analytical patterns, generating procedures for performing analyzes, as well as carrying out technical inspections of research equipment.
Thanks to the integration of the Infrastructure module with the BPM module responsible for carrying out information security risk analysis, it was possible to investigate possible vulnerabilities to PID loss (confidentiality, integrity, availability). By introducing an inventory of rooms and IT resources, it is possible to support the organization in identifying the sources of problems, planning and implementing activities.
Related blog articles
Krajowy System Cyberbezpieczeństwa to wymagania dla operatorów usług kluczowych oraz usług cyfrowych. Czym są te wymagania opisane w dość oszczędny sposób w Ustawie? Co mówi sama ustawa o tym jak zapewnić bezpieczeństwo i ciągłość realizacji usług kluczowych?
Częstym problemem organizacji jest zapewnienie efektywnego i gwarantującego właściwą rozliczalność kanału komunikacji wewnętrznej, np. związanej z realizacją praw podmiotów danych, czy zgłaszaniem i obsługą naruszeń ochrony danych osobowych
Ile faktycznie zajmuje identyfikacja i realizacja praw podmiotu danych? Czy nasz rejestr czynności wspiera realizację praw? Czy potrafimy automatyzować procesy realizacji praw podmiotu danych?