IT in Manufacturing


Industrial considerations for BYOD

May 2013 IT in Manufacturing

With the ‘Bring Your Own Device’ (BYOD) trend beginning to gain a toe-hold in the process industries, plant managers and IT groups are taking note. Not only do they have legitimate security concerns but, in refineries, chemical plants, mines, and other industrial facilities with hazardous areas, the field devices must be certified to operate in those environments; a requirement that excludes most consumer devices.

Mobility is the core value proposition of BYOD. Mobile computing is rapidly becoming the normal use-case for enterprise IT, rather than the exception. In the plant, most workers already own their personal mobile devices, which they often prefer to use. And in every industry workers dislike mandates forcing them to carry multiple devices.

Ubiquitous wireless Internet access enables BYOD. Carrier cellular coverage saturated the strategic areas in developed economies many years ago. However, in recent years, carriers have rolled out higher capacity, 4G networks capable of much greater data rates to support the growing numbers of smartphones served by their networks. These service levels compare well with what was provided by wire line enterprise networks only recently.

The huge volume of the consumer market has also revolutionised the price/performance of smart devices, especially smartphones. At the same time, there has been a convergence of the networks and platforms. Most smartphones support LTE carrier networks, Wi-Fi and Bluetooth local networking, and GPS. There has been a huge convergence in terms of operating platforms toward Android and iOS, with the former champions BlackBerry and Symbian both on the ropes and Windows volumes remaining almost invisible.

For industrial service, smartphones, tablets, and other mobility devices require enhanced ruggedness, hazardous location certification, and in some cases, dedicated higher performing interfaces for barcode scanning or other job-specific capabilities.

Management is now the biggest challenge

While ubiquitous connectivity and technological convergence have enabled the BYOD trend, it has been constrained by the limited capability of enterprises to manage the more complex demands represented by mobile consumer devices operating within the enterprise.

Like all management, network management involves the allocation of resources according to policies and rules in pursuit of enterprise objectives. Effective network management balances a number of objectives. One of these is to improve cost behaviour. Enterprise TCO will scale well when network management reduces the labour intensiveness of network operation as the network grows. But TCO is only one of the attributes of BYOD requiring management attention.

Other major factors are:

Policy – Organisations need to make policy decisions at the outset of BYOD. These decisions include a set of supported devices and platforms, (BYOD does not mean the same thing as bring ANY device). Likewise, a set of carriers must be selected and rules developed for network selection when multiple networks are available. A set of applications must be supported. Finally, the policies for cost sharing between employees and the enterprise need to be developed, with a view toward keeping the rules simple and comprehensible, yet comprehensive.

Device management – Dozens of companies offer solutions for mobile device management. This includes provisioning, configuring, and updating devices, and deactivating devices as they are retired as well as protecting/destroying (‘zapping’) the content on devices that are lost or stolen. Some level of security and protection from malware is involved. Billing and network policies need to be implemented. These solutions can come from either the carrier or from a third-party enterprise solution.

Mobile application management – Effective mobile application management is critical because the apps come from multiple sources. Besides managing the set of supported applications, distribution of apps must be managed via the major online stores or other means.

Mobile identity management – For BYOD, identity management requires more rigorous authentication, authorisation and accounting (AAA). Enterprises need an architecture for distributed systems that enables control over user access to services and resources. Multifactor user authentication is just the first step.

Mobile information management – The coexistence of enterprise and personal data on the same device is drawing attention to the concept of managing device data through various means such as tracking, sandboxing, encryption, and automated data timeouts.

Mobile expense management – This consideration is non-technical, but nevertheless a pain point for real-world implementations. Enterprises can hardly expect service providers to manage their costs optimally. They have to implement their own policies based on both cost and technical considerations.

BYOD in industry

One of the biggest challenges with respect to BYOD is that it puts enterprise IT onto the fastest of fast-paced consumer electronics platforms. This presents management challenges for the IT organisation as well as third-party software firms. The rapid churn in consumer electronics is a barrier to device certification for hazardous service. The certification process can take up to two years and by the time it is completed, a consumer device is likely at the end of its product life. Unless the certification process can be speeded up, this will remain a serious barrier. Repackaging of smart devices for extra ruggedness is generally available immediately. Also, due to the platform convergence, industrial versions of smart devices can be developed at more favourable price/volume tradeoffs than was possible with past handheld platforms. Examples of these new products are reaching the market now.

For more information contact Paul Miller, ARC Advisory Group, +1 781 471 1126, [email protected], www.arcweb.com





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Enhancing cyber security for industrial drives
Siemens South Africa IT in Manufacturing
The growing connection between production networks and office networks as part of IT/OT integration and the utilisation of IoT have many benefits for industrial companies. At the same time, they also increase the risk of cyber threats. Siemens ensures that your know-how and plants are protected at all times.

Read more...
Immersion cooling systems for data centres
IT in Manufacturing
The demand for data centres in Africa is growing. The related need for increasing rack densities brings with it escalating cooling requirements.

Read more...
Transforming pulp and paper with automation and digitalisation
ABB South Africa IT in Manufacturing
The pulp and paper industry in South Africa is undergoing a significant transformation from traditional manual processes to embracing automation technologies. Automation in pulp and paper mills aims to improve various production stages, from raw material preparation to final product creation.

Read more...
New world of process control: A completely web-based process control system
Siemens South Africa IT in Manufacturing
Control technology is crucial for gaining a competitive edge in the process industry. That’s why there’s SIMATIC PCS neo - the innovative ground-breaking process control system by Siemens.

Read more...
Protecting industrial networks with resilient defence
RJ Connect IT in Manufacturing
Network security is no longer just about preventing hacking or data breaches. For operational technology networks, resilient defence and consistent uptime are crucial. They are the core tenets that underpin Moxa’s guarded uptime and resilient defence (GUARD).

Read more...
The metaverse is now: are you ready to reimagine your business?
IT in Manufacturing
The convergence of the digital and physical worlds, driven by spatial computing and the metaverse, is rapidly reshaping business landscapes. This transformation extends beyond the mere novelty of virtual reality headsets and augmented reality filters, signalling a fundamental shift in how organisations operate, collaborate and innovate.

Read more...
AI and cyber security: South Africa’s next battleground
IT in Manufacturing
Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.

Read more...
Technology won’t save your business from cyber threats
IT in Manufacturing
Artificial Intelligence is reshaping the landscape of information security, presenting both unprecedented opportunities and significant new threats.

Read more...
Addressing the cooling needs of the modern data centre
Schneider Electric South Africa IT in Manufacturing
The rise in hardware density in data centres is gaining speed and is largely driven by the demands of artificial intelligence and machine learning, requiring more powerful servers and specialised hardware.

Read more...
South Africa’s next cyber security frontier
IT in Manufacturing
AI-powered agents are rapidly transforming how South African businesses operate, from chatbots managing customer inquiries to automated systems processing financial transactions. While these AI-driven assistants increase efficiency and reduce operational costs, they also present a new, and often underestimated, cybersecurity challenge: identity management.

Read more...