Edge AI and managing risk in the cloud

Issue 4 2023 Industrial (Industry), Infrastructure


Charles Blackbeard.

As organisations see greater volumes of data generated from their operations. It is understandable and imperative that this data is leveraged to generate more value and insight that help operations and asset integrity managers ‘do more, better’.

The good news is that huge amounts of value can be generated by integrating information from assets (IT systems), sensors (OT systems) and design (engineering) systems. In a manufacturing environment, most of these systems are running in multiple networks/units. Even the ownership of this data varies from plant to plant and is also dependent on the user roles.

“In this context, you would need a centralised environment where you can integrate, validate, contextualise the cleaned data and make it accessible centrally – this is where the cloud presents great potential and can yield benefits,” says Charles Blackbeard, Business Development Manager, ABB Ability Digital.

Consolidating data and deploying via the cloud opens up a plethora of solutions and application possibilities, including business, asset and sustainability solutions, planning and logistics solutions, operation solutions, supply chain solutions, and advanced supervisory solutions. From an industrial point of view, it also empowers predictive, diagnostics and prescriptive analytics applications. This means that previously siloed information is now available across the entire enterprise.

“Concerns about security are, of course, front of mind when you increase the number of users across a system, more devices connected to the network, and more information being stored on the cloud,” says Blackbeard.

There are also a number of data and integration challenges when considering the deployment of cloud solutions:

• Proprietary controls.

• Multiple data formats.

• No contextual information.

• Quality issues.

• Designed for operations.

• Differences across industrial verticals.

• Directly coupled to applications.

• Isolated networks.

There are some powerful risk mitigation strategies, however. For example, deploying edge solutions – whether there is ‘lite edge’ – for secured communication from edge to cloud, or ‘heavy edge’ – for deploying application at the source of data and for enabling distributed computing, faster response time and cost optimisation.

There are several clear benefits to this approach:

• SAAS based business model: Enables customers to focus on operational efficiency.

• Building an integrated asset information model using operations, process control, assets and design systems based on a contextualisation engine.

• Empowering user personas: Solution positioning with a strong focus on controls or process - engineer, manufacturing system engineer, data engineer, integration engineer, system architect).

• Hybrid deployment: Enabling hybrid deployment of containerised solutions, thereby reducing data round trips and enabling faster responses.

• Cost reduction: Distribute data processing between edge and cloud by filtering and aggregating high-volume data at the edge.

• Operational resilience: Make the site operation resilient to unreliable networks by enabling hosting of managed application with data at the edge. Synchronise data with the cloud when the connectivity returns.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.