Streamlining functionality and workflows of human capital management (HCM) systems while ensuring a rigorous level of security can be challenging. ADP prides itself on staying in front of business need through innovative, mark-making HCM solutions.
Source: ADP at Software Reviews, Report Published January 2019
ADP’s goal is to help employees help themselves through digital automation and streamlining. In a press release this month, it explains its integration of identity and access management (IAM), Cloud Identity, with its productivity and collaboration services, G Suite.
Aside from security, the administration of identity services and access to information within an HCM system can be inefficient. Generally speaking, a time gap can also exist between hiring someone or moving into a new role and the back-end system changes necessary to get them up and running. This limits the speed at which they can begin to create value. Conversely, there can be significant risk to the organization if an employee is terminated but their security access is not removed quickly.
ADP states that by bringing both IAM and HCM workflows together, it is introducing expediency to provisioning services and lessening the burden of having too many employee accounts. This mitigates delays for employees in reaching full functionality, as well as data and security risks. Frank Villavicencio, CPO for Access & Identity Management at ADP comments:
"Thanks to this integration with Google Cloud Identity, our mutual customers can now realize measurable business benefits in productivity, end user satisfaction, compliance and security."
The ease at which any system can be used is complicated by the progression of cloud-based processes and associated security threats. Before introducing new automation to HCM, organizations should first implement role-based access control (RBAC) to take inventory of permission/user-role assignments and carry out process and role engineering. This ensures you have foundational information in place before entertaining potential solutions put forward by vendors.
Source: Info-Tech Blueprint, “Simplify Identity and Access Management”