Creating hyper-aware industrial facilities

Issue 2 2021 Infrastructure

A hyper-aware industrial site is instrumented such that applications are cognisant of the contextual status of the environment, machines, occupants, inventory, service needs, security and safety. Industrial Internet of Things (IIoT) is collectively the eyes and ears of a cognisant plant and generates logical representations of physical data, i.e., temperature, flow, current consumption and speed, among many others. IIoT data are supplemented by contextual information generated by a plant’s data network, i.e., identity, location and applications in use.

The combination of data and context enables applications to be cognisant and plants to become smart enough to adapt to the environment, machines and workers. The richer the set of data and context, the more adaptive the site can become. Some plants have only limited cognisance, while others are fully instrumented and hyper-aware.

IIoT is characterised by devices and systems that are ruggedly designed and constructed, capable of operating in environmentally uncontrolled environments with high mean-time-between-failures, operated using a wide range of wired and wireless physical layers and communication protocols, often deployed in firewalled silos without access to the Internet and capable of deterministic operation in closed-loop control applications.

According to McKinsey, the total economic impact of IIoT in worksites and factories in 2025 will be between $1.3 trillion and $4.6 trillion. The top identified areas include operations optimisation, predictive maintenance, inventory optimisation, health and safety and human productivity monitoring:

Operations optimisation is expected to increase worksite productivity by 5-10% and lower costs by 5-12%.

• Predictive and improved maintenance are expected to yield 3-5% productivity gains and lower costs by 10-40%.

• Inventory optimisation is expected to lower costs by 20-50%.

• Health and safety are expected to reduce costs by 10-20%.

• Human productivity monitoring is expected to yield a 5-10% increase in productivity.

Tips for designing hyper-aware industrial sites

IIoT security: IIoT stands out as a category because in no other industry is the impact of a security breach so impactful or the defences so poor. Adhering strictly to a zero trust framework, IIoT devices should not be allowed on a network unless and until trust can be asserted to the same standard as it is with IT devices. The framework should leverage contextual information from a multitude of sources to scrutinise user and device security posture before and after they connect.

Business transformation enabled: Companies frequently rush headfirst into IIoT projects without clearly defining objectives, value propositions, or the suitability of tools. The first order of business in any IIoT project is to identify the strategic business goals to be achieved. Those should flow down into a series of specific objectives that rely on successfully delivered business moments. The IIoT architecture is the tool by which relevant context and data can be successfully extracted and exploited in favour of the strategic goals.

Building a contextually adaptive plant: Factory asset tracking systems feed real-time inventory and work-in-process data to analytics engines to more efficiently manage production lines. If inventory delivery is delayed, production lines can be slowed instead of stopped, reducing expensive scrap, rework and re-start expenses. The result is a contextually adaptive factory that automatically balances the speed of production with the availability of parts. Asset tags are an important building block of an adaptive factory.

Bridging IT/ OT plant-wide for uniform visibility and security: What do CIOs and COOs have in common? Both want uniform visibility into, and security of, OT traffic and device behaviour, with IT policy management supervision of crossover traffic. Bridging the IT and OT divide requires a recognition that both definitions of trust and both modes of operations, are important to achieving enterprise-wide data visibility and cybersecurity. One without the other would put an enterprise at risk financially and operationally.

Automating plant network access for service personnel and contractors: Enhancing human productivity necessitates making devices and the environments in which they work more cognisant of, and automatically adaptive to, the needs of employees, service personnel and contractors. On-boarding service personnel and contractors onto plant networks has historically been challenging because of network security concerns. The trick is to both simplify guest access so it doesn’t create an administrative burden and implement security policies that tightly control what guests can do and access while on the network.

Migrating from break/ fix to predictive maintenance: Addressing maintenance proactively to minimise downtime and maximise the utilisation and performance of assets, can reduce maintenance costs substantially. Juggling cost-asset performance management solutions and its security risks against the benefits of lower downtime and fewer disruptions is a challenging calculation. An optimal solution is to leverage secure, robust IT infrastructure that is already deployed in a plant to capture machine status from IIoT sensors. A dual-use IT/IIoT network is more economical to deploy and can eliminate gateways and the security threat they pose.

Physical distance monitoring and contact tracing: Workplace safety extends beyond physical and environmental hazards. Today, physical distance monitoring and contact tracing are essential for back-to-work and stay-healthy-at-work initiatives. While there is no single physical distance monitoring and contact tracing application that will work for all enterprises, real-time location services and identity stores have an essential role to play in every workplace infection control solution.

Conclusion

The digital transformation of IIoT is focused on delivering meaningful business value across all facets of local and remote operations. Aruba’s Edge Services Platform (Aruba ESP) addresses all the imperative industrial facilities. It is the industry’s first AI-powered platform designed to automate, unify and protect the edge for businesses of any size or type. Aruba ESP includes attributes of unified infrastructure, zero trust security, AI-powered operations (AIOps) and flexible consumption/financing models.

Working in concert with key technology partners, Aruba helps bridge the IT/OT divide and boost efficiency, productivity, reliability, safety, security and profitability. By enabling uniform visibility and uniform security from I/O to CEO and accommodating the different operating modes of both IT and OT, Aruba is able to address the needs of CIOs, COOs and CISOs at a price-point that checks the box for CFOs.

Find out more at www.arubanetworks.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.