Six Key Components to Enhance Your MDM Program

Print Friendly, PDF & Email

In this special guest feature, Robert Eichelman, Solutions Architect at Experis, shows that whether you are starting to build your Master Data Management (MDM) approach or are continuing to evolve your current program, there are key MDM fundamentals to keep in mind. This article outlines six steps to help businesses evaluate and sustain an extendable program to help ensure future success. Robert is an IT specialist with 20+ years of combined experience in enterprise data ecosystem development, enterprise data warehouses and large-scale customer-facing applications. He is a leader in delivering large-scale Business Intelligence and Analytics solutions for Experis customers in financial services, energy, Healthcare, Supply Chain, Manufacturing and Web Analytics.

A well set up and optimized Master Data Management (MDM) solution will not only provide effective product management but will be a key component in future business initiatives. MDM insights are fed into supply chain optimization, customer 360 views, sales targeting and advanced business analytics. If you have built your own MDM solution or leveraged a commercial product, you will want to keep six key MDM fundamentals in mind. These fundamentals apply whether you are starting to build your MDM approach or are continuing to evolve your MDM program.

#1. Setup Master data matching and linkingA well-constructed MDM solution will pull together disparate and diverse sources of data from different systems and applications. Algorithms should be applied that automatically identify duplicates and resolve multiple entries into a single record. This assures you are always describing the same customer/service/product etc.Effective matching and linking eliminates duplicated data, shares accurately across all systems, creates a foundation for future enrichment, monitors the integrity of Master data and data integrity of source systems, and creates a way to automate/eliminate manual values assignment and regrooming.

#2. Create and Apply Master data business rulesYou will want to ensure that you introduce conditions and actions as business rules that are shareable across subject area use cases. A good MDM will provide this functionality. This directly enables rules to be changed once and applied in multiple places with authority of an approval process. Governance strategies and policies you put in force define workflow decisions and approval processes that actively enforce data integrity.

#3. Manage data location/localization as part of governance strategies proactivelyWhere data is generated, where it is physically present, and how it is safeguarded through the assigned responsibilities of its controllers is critical to establishing custody and proper use compliance. Regulatory and statutory requirements have high non-compliance costs.

#4. Create effective and appropriate safeguards for data privacy and securityData privacy policies and processes and role-based security policies must proactively define access rights to all Master data. This dictates active roles-based access to data including data obfuscation, masking and encryption be applied. This ensures auditable access controls and proactively eliminates vulnerabilities that could be exploited by hostile parties to gain undue access to data.

#5. Establish data baselines with abilities to support future data enrichment and refinementCreate point-in-time 360-degree views of your data. Clean and streamline data to ensure incorrect and irrelevant data are corrected over time. This ensures levels of evolving accuracy and similarly supports actively integrating third-party data toward deriving maximum business insights.

#6. Deliver baseline consolidation and control including consent managementActively consolidate subject area data into a single place to reinforce active collaboration between stakeholders throughout business processes. Key features like “rights to access” and “rights to object” must be implemented as part of a clear and transparent information custody framework. Clear policy on how PII data is maintained and authorized includes the “why” and proof of active “consent.”

Maintaining a centralized repository allows you to monitor and better protect sensitive data, reducing the risk of improper data exposure. Evaluating these core components when starting your program or periodically via your governance process will allow for a sustainable and extendable MDM program.

Sign up for the free insideBIGDATA newsletter.

Join us on Twitter: https://twitter.com/InsideBigData1

Join us on LinkedIn: https://www.linkedin.com/company/insidebigdata/

Join us on Facebook: https://www.facebook.com/insideBIGDATANOW

Speak Your Mind

*