Welcome!

@ThingsExpo Authors: Yeshim Deniz, Pat Romanski, Liz McMillan, Elizabeth White, Zakia Bouachraoui

Related Topics: @ThingsExpo, Agile Computing, @DXWorldExpo

@ThingsExpo: Blog Feed Post

Benefits and Security for IIoT Communications | @ThingsExpo #IoT #IIoT #M2M

From a technology partnership perspective, Big Data vendors face the challenge of comparing data in motion versus data at rest

*This is part of a series of blogs examining Sensor-2-Server (S2S) communications, development, security and implementation.

For the past two weeks, we’ve taken an in-depth look at what Sensor-2-Server communications are, how to implement these systems, and some of the specific aspects of communication that these systems facilitate. This week, for our final installment, we’ll examine some of the benefits, as well as security considerations, for S2S communications.

Benefits of Sensor-2-Server Communications
From a technology partnership perspective, Big Data vendors face the challenge of comparing data in motion versus data at rest. If the data has already moved through a SCADA system and has been aggregated, changed, stalled, or is not quite granular enough, it can be difficult to deliver high-value predictive analytics. The concept of predictive analytics is that an operator can make an accurate estimate that certain things can happen during operations. However, the operator needs to determine what the drivers are for the predicted actions to happen and must look at active data to determine if this is, in fact, happening. Without insight into the active data in motion, they are lacking an essential piece of the predictive analytics. This ability to compare data in motion at the access layer could benefit Big Data vendors when it comes to predictive analytics because it allows them to give higher value to their customers, which drives additional revenue. With S2S technology, they can deploy a tiered application infrastructure that allows data to intelligently move from one point to another.

S2S also enables operators to go beyond a legacy SCADA data network. To operate a SCADA network, it requires a lot of institutional knowledge to truly understand, manage and work within the environment. S2S expands beyond moving the data into SCADA systems and allows operators to leverage more advanced technology, like predictive analytics. Essentially, S2S communications provide the opportunity to take advantage of new advanced tools, but the operator doesn’t necessarily have to sacrifice the institutional knowledge built into the SCADA data systems.

As new generations enter the workforce, it’s likely that there will be a shift and some of that institutional knowledge will be replaced with technology that will allow operators to do more than they ever could before. The addition of new technology and IoT networks is where operators are starting to see the functional lines blur between the IT and production groups.

As more technology is leveraged, these two disparate groups will have to work together more often. There is now a drive for a more holistic picture of what is going on in IT, what is going on in the field, and whether the technology used will be compatible with future needs. SCADA will likely always have value for industrial communications but, going forward, there will be an increase in the use other technologies as well. Additionally, with more technology physically in the field, there is always going to be a focus on data security.

Security
Sensors at the access layer present interesting security challenges. For example, consider a data concentrator sitting on an oil pad that is collecting data. This device is collecting data from a number of sensors and has data logging capabilities, which also means the other devices sitting at the remote site contain historical data. Technology providers need to insure that the technology used is taking advantage of all the security features that are available to make sure their data is protected through a variety of means including encryption, authentication, virus and intrusion protection, and by being physically tamper-proof.

With the growing interest in IIoT, the system is providing a communication path with highly valuable information. These sensors may be running an application on the edge of the network, and many of these devices are using IP. When there are Ethernet and IP devices going out to edge devices in the field, each one of those devices has the potential to become a threat to the entire corporate network if they’re not secure. Operators in IIoT environments need to be concerned with everything that could be introduced to the network at every single connection point. Data protection data is a fundamental and extremely important element in determining the effectiveness of S2S communication. Technology vendors must be mindful of security in every step of the design and installation process, and operators must require security features that will protect their data and networks.

In addition to data security, the threat to physical infrastructures in very remote locations is driving the need for new security solutions such as intelligent video surveillance designed to maximize security and minimize cost. S2S solutions need to be physically capable of delivering the bandwidth to enable these new solutions.

Where Do We Go from Here?
Industrial communication is changing in the sense that IIoT enables the possibility for every device in a network to be connected – including those in the outer access layer. This has created a convergence of OT and IT operations in many instances or – at the very least – has brought the two departments to a closer working capacity. IoT and technology at the access layer enable the option for Sensor-2-Server, a form of intelligent communications that can move the sensor data to a specific server for detailed analysis. New data and technology are allowing operators to do things they’ve never done before, such as predictive analytics. As this shift continues, SCADA is not becoming an obsolete technology; rather it will become a piece in the bigger technology picture. Any operator choosing S2S technology, or any technology for that matter, must carefully consider the options and keep security as a top priority.

The post Sensor-2-Server: Benefits & Security for IIoT Communications appeared first on FreeWave WaveLengths.

More Stories By Scott Allen

Scott is an executive leader with more than 25 years of experience in product lifecycle management, product marketing, business development, and technology deployment. He offers a unique blend of start-up aggressiveness and established company executive leadership, with expertise in product delivery, demand generation, and global market expansion. As CMO of FreeWave, Scott is responsible for product life cycle/management, GTM execution, demand generation, and brand creation/expansion strategies.

Prior to joining FreeWave, Scott held executive management positions at Fluke Networks (a Danaher Company), Network Associates (McAfee), and several start-ups including Mazu Networks and NEXVU Business Solutions. Scott earned his BA in Computer Information Systems from Weber University.

IoT & Smart Cities Stories
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...