Playbook: IT risks and mitigations in IWMS / CAFM procurement

This playbook explores the IT risks and mitigations when procuring an IWMS.

Download Playbook

Playbook: IT risks and mitigations in IWMS / CAFM procurement

The playbook covers:

  • Data security and privacy breaches
  • Poor integration with existing systems
  • Vendor lock-in or proprietary data formats
  • Unvetted cloud or hosting environments
  • Underestimating total cost of ownership (TCO)
  • Inflexible system configuration
  • Limited user access and support models
  • No exit strategy or poor handover capability
  • Estates checklist for mitigating IT risks
  • Final advice to estate teams
Share this playbook
Facebook icon
Linkedin icon
Email icon

Download your playbook on managing the IT risks associated with procuring CAFM/IWMS software

Download Playbook