SuiteWorld 2011: Health charity Imagine cuts ERP upgrade time 60% using NetSuite

Not-for-profit health organisation Imagine has cut its enterprise resource planning (ERP) upgrade time by 60% using NetSuite's on-demand ERP system.

This Article Covers


Not-for-profit health organisation Imagine has cut its enterprise resource planning (ERP) upgrade time by 60% using NetSuite's on-demand ERP system.

Imagine previously used its own bespoke CRM system and Microsoft Dynamics GP (Great Plains), which it replaced with NetSuite's cloud-based applications, including accounting and case management.

"IT time for ERP upgrades has been cut by 60% using NetSuite," said Imagine's IT director, Kevin Harding, during a panel session at NetSuite's SuiteWorld conference.

Despite the reduction in time and man hours, Kevin Harding warned: "It's important to test customisations thoroughly."

Imagine customised NetSuite's products to administrate themselves, including its vehicle management and incident tracking, cash-grant programme, hiring process and web store.

Imagine started using NetSuite in 2002 for case management to save one and a half on full-time equivalent staff. Case management provides helpdesk software to automate support and e-mail notifications to customer queries.

The charity now has its entire organisation running on NetSuite's cloud-based products, including its back office.

"We wanted to replace our accounting system and had to pull all our data onto one single platform." said Harding.

Harding explains this has changed the role of his six IT staff in the department. "The IT role shifts from dealing with person-specific to enterprise-wide issues," he said.

The charity are considering eliminating smaller systems, such as Microsoft's Access databases.

"If we can get rid of duplications, we can be more streamlined," added Harding.

The charity provides services for over 2,600 people with cognitive and physical health needs, with an operating budget of $32m.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT outsourcing

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...