Playbook: IT risks and mitigations in IWMS / CAFM procurement

Playbook: IT risks and mitigations in IWMS / CAFM procurement
The playbook covers:
- Data security and privacy breaches
- Poor integration with existing systems
- Vendor lock-in or proprietary data formats
- Unvetted cloud or hosting environments
- Underestimating total cost of ownership (TCO)
- Inflexible system configuration
- Limited user access and support models
- No exit strategy or poor handover capability
- Estates checklist for mitigating IT risks
- Final advice to estate teams
You are one simple step away from securing your playbook on managing the IT risks associated with procuring CAFM/IWMS software.
Written by the experts at Concerto, and the Bellrock IT team, this playbook is full of practical advice and tips to make sure you not only keep IT UpToDate, but manage the risk that will be high on their agenda.
Download your playbook on managing the IT risks associated with procuring CAFM/IWMS software