Ecosystm Snapshot: AT&T Joins Global Telco Security Alliance

5/5 (3)

5/5 (3)

AT&T became the first North American operator to join the ranks of the Global Telco Security Alliance formed by Singtel, Etisalat, Softbank, and Telefónica. The alliance which was formed last year in April 2018 in a pact to amalgamate the capabilities of telecommunications operators on security aspects and fight collectively against cyber attacks.

AT&T joined as an equal member with other founding members of the group. Over the past few years, AT&T has been building its cybersecurity capabilities and  has recently acquired AlienVault– a commercial and open source developer – to offer a platform that integrates and automates point security products to manage cyber attacks. AlienVault has been rebranded as AT&T Cybersecurity, and includes consulting and managed security services. Similarly, at the end of 2018, Singtel revealed the brand ‘Trustwave’ that combines the capabilities of partners such as Optus and NCS, to provide a comprehensive security suite and services to help organisations fight cybercrime.

With the rising risks of cyber-attacks, these initiatives are providing a synergistic front and helping organisations to analyse and act faster against cyber threats. The alliance plans to expand its global footprint and span across APAC, Europe, MEA and America.

Speaking about the alliance, Alex Woerndle, Principal Analyst Cybersecurity, Ecosystm says that, “Similar collaborations exists within other industries already – most commonly they use regular information-sharing sessions with the collective security teams to discuss what each is experiencing, what strategies and tactics have worked or failed, and provide details on the type and nature of attacks. The telcos – at a minimum – should be collaborating at that level. But given the global nature of this alliance, they will need to consider how they can aggregate threat information and share it in a more agile way on a day to day, hour to hour and minute to minute basis.”

The alliance accounts for a significant percentage of the overall traffic and is a tangible example of companies taking steps to fight cyber attacks. “As the threat landscape continues to expand there is an opportunity to broaden the intelligence – sharing what they collectively gather and analyse, to strengthen the defences of the broader market not just in their local geographies,  and to impact globally”, says Woerndle. “Think of the immense opportunities to share intelligence gathered collectively by all the major telcos, to proactively prevent attacks on their clients – from other enterprises down to small/medium businesses and consumers.  Law enforcement could benefit from the global telco collaboration, also”

2
Forget AR and VR, it’s a Game of Mixed Reality Now

4.5/5 (2)

4.5/5 (2)

We’ve been hearing about Augmented Reality and Virtual Reality for a  while now. The future of the virtual world is being built today and as AR/ VR become more mainstream and prices decrease, there’s a new technology trying to fit in somewhere, to perform its magic  – Mixed Reality.

What is  Mixed Reality, however? Is it just another marketing jargon for the same technology wrapped in new covers?

Before diving deep into mixed reality , let us revisit the fundamentals of the  virtual world technologies.

Virtual Reality

Virtual Reality replaces your world with a digital world and has been in the market from some time. VR is achieved through the use of a virtual headset which in combination with an image/video (either through phone or direct source connection) produces multi-projected environments with lenses to generate a virtual environment. It provides real-world experience and some of the use cases include driving and flight simulators, virtual tours, 360° videos, and in healthcare, training and more.  There are a variety of VR devices available today from known manufacturers such as Facebook ‘s Oculus, Samsung Gear, Google Cardboard, Sony’s PlayStation VR, HTC Vive and others, offering different features, and addressing  different requirements and comfort.

Augmented Reality

Augmented Reality is a direct or indirect view of physical world elements augmented through the digital environment. Basically, AR supplements the real world with digital objects of any sort. It is already being used in the Aviation industry, where data is displayed within the pilots’ helmet view as they fly.

An example of AR is Ikea’s mobile app developed specifically to showcase its furniture catalogue – A piece of furniture such as a dining table or a television cabinet can be virtually displayed as a digital image overlaid on top of the real image of your home space. This lets you easily judge the appearance or gauge how it will fit in your home space.

Some of the more well-know AR devices include Google Glass, Microsoft HoloLens, and Sony Leap. AR is also used in mobile gaming applications such as Pokemon GO, where virtual creatures are placed into the real world.

Where does Mixed Reality fit?

As an independent notion, Mixed Reality combines the best of both worlds and covers all the possible disparities of the physical and the simulated worlds.

Also known as hybrid reality, Mixed Reality covers the spectrum where physical and digital objects co-exist and interact in real time. Somewhere, between AR and VR, there is an overlap between the physical and the virtual worlds – that is where Mixed Reality comes in.

Both AR and VR require users to step out of their own reality – or to use another device (typically a smartphone) to access digital or “virtual” content. The experience is either all-encompassing (with VR – where the content overrides your current reality), or underwhelming (with AR – where the content is limited, does not understand your current reality and/or is at arm’s length on a relatively small screen).

AR-VR-MR

Mixed Reality is designed to add digital assets to your current environment. It adds to the current environment in a natural way that gives the user benefits that non-users would not have.

For businesses, Mixed Reality can offer the most benefit and potentially offer limitless opportunities. Defining the polar ends of AR and VR spectrum Microsoft introduced Hololens in late 2016 as a groundbreaking device and showcased capabilities blending the real and virtual world. Despite being a promising product, there have been hiccups such as a limited field of view (FOV) restricted to only 30°, scaling and sizing holograms and others.

Learning from the failures, Microsoft recently released a new version of its Mixed Reality device – the Hololens2. Microsoft’s Hololens2 takes Mixed Reality beyond niche use cases using more natural gestures, a larger FOV and a multi-user environment – powered by Azure  Mixed Reality services.

Mixed Reality in the Enterprise

The use cases of Mixed Reality are many and as the continuum builds, the testing, adoption and deployment cases will become wider. Microsoft’s device is not aimed  for the consumer market and is primarily targeted towards business use cases.

Tim Sheedy, Principal Advisor, Ecosystm, believes, “Most of the short and medium-term use cases are really suited to businesses. There are definitely some longer-term opportunities for consumers, but that will require substantial miniaturisation of the hardware and change of form factor. Current MR systems won’t become mainstream devices in the consumer market.”

With Mixed Reality in the play, organisations will be able to explore newer ways of doing things:

Training. Training is a perfect use case. If you can imagine taking a typical guided software where tips pop up on a screen (such as “click this button to personalise your experience, click here to see current leads, click here to add an opportunity) and move this training to the real world (this lever shuts down the machine, this valve reduces pressure etc) then you can get an idea of what is possible.

Engineering. This applies to any job that requires engineers or repairers to work on equipment, where they can be guided through a fix. Any sensor that sends information back to a computer can now be visualised – a mechanic may look at a car and see green for all the components operating within standard range and red for those that need attention or repair.

Construction. A construction worker or site manager can see the entire building or components of the building in advance and make plans for the location of materials, staff, safety etc.

Graphics Designing. A designer can picture how a new product might look in an environment and can design the product with respect to the actual surroundings.

Healthcare. A surgeon could have a CT or MRI scan overlaid onto the patient as they operate to ensure they are targeting the right area.

Anywhere that digital assets or information can assist a worker or drive a more effective, faster or safer outcome are all potential use cases for Mixed Reality services.

A Look at the Field

The theory behind Mixed Reality is that it adds to the user experience in a natural way. Organisations are exploring opportunities to leverage these technologies in the real world. Despite numerous use cases and de facto descriptors, the technology cannot be manifested until it comes to real use.

“Mixed Reality will be a success when it is seamless to use for the first line workers – when it doesn’t feel like a computer you wear on your head!” says Sheedy. “You should be able to interact with these assets in a standard way – and this is where Hololens2 is a big step above the first iteration – as it will allow more natural interactions with the digital objects – you push something or turn something and it moves, versus the “finger click” approach of the first version.”

Imagine your first day at work at a new employer, and instead of a person showing up to give you the tour, you put on a Mixed Reality device (standard or industrialised for those in mining, construction etc) and you are given a tour with virtual overlay and audio guidance.

Sheedy believes that “Mixed Reality may never be a mainstream technology – well not in our generation at least. But that doesn’t mean it won’t be a commercial success. If it is easy to deploy, manage, use, and code for and makes financial sense for businesses to deploy them then these devices will be used. The previous Hololens had commercial users – but Hololens2 should see more success as it is a better solution that can help businesses overcome even more challenges.”

The longer-term success of Mixed Reality will be how well it works with existing software platforms out-of-the-box. Support by SAP, Oracle, Salesforce, IBM and others will help to drive adoption.

How is it going to evolve in the future?

At present, the mobile device is the interface of choice for consumers and workers. But voice is quickly taking off (e.g. Google Home ). Mixed Reality adds an extra impetus to devices that are looking to supplant the smartphone as the interface to information, entertainment and data.

The longer-term future will likely see the emergence of standards that deliver the right information at the right time on the device of choice – whether that device be one with a screen, a microphone and a speaker (smart speaker like the Amazon Alexa), a screen and a speaker (such as a Hololens device), a smartwatch or another form factor.

“Mixed Reality devices will get smaller, smarter, faster, have better resolution, be more integrated (with cloud services and software platforms) and more integrated with another non-screen interface” says Sheedy.

“Access to the right information at the right time on the best device that drives the right outcomes will be the ultimate goal – and Mixed Reality will be one of the form factors that help consumers and businesses achieve that goal.”

It’s still too early to tell the direction this technology will take but the promises surely appear to be overwhelming. What do you think will be the future of Mixed Reality – is it another gimmick or will it really live up to its promise?

Let us know in your comments below.

2
Ecosystm Snapshot: Vodafone and Arm partner to drive Internet of Things deployment

4.6/5 (5)

4.6/5 (5)

Vodafone and Arm announced a strategic agreement at MWC19 to work on simplifying IoT services and reduce the costs confronted by the organisations on the implementation of IoT.

The Vodafone-Arm agreement expands on the previous collaboration which was on integrated SIM (iSIM) technology, a system on chip(SOC) design which can be reprogrammed with respect to the requirements. The iSIM allows customers to remotely provision and manage IoT devices across the globe which proposes reduced complexities and offers significant cost reduction.

To carry on the existing relationships this agreement is expected to bring Vodafone’s IoT global platform and Arm’s IoT software services to offer organisations a world of connected systems. This characterises a major initiative enabling a wide ecosystem of manufacturers to tap into the potential of trillions of connected devices.

Speaking on the subject, Ecosystm’s Executive Analyst, Vernon Turner thinks that “this announcement will help customers who look to and need a cellular-based IoT solution. Traditionally, mobile devices require a physical process to change their SIM (Subscriber Identity Module) card when there is a change of ownership or carrier, but in a world of trillions of connected devices, this is just not practical.”

Arm’s announcement of its iSIM is the latest in a series of announcements to resolve the size, cost, and scalability of SIM cards. SIM cards are critical for secure identity so the challenge has been to create a cost-effective IoT System On Chip (SOC) that has the SIM function embedded on it. Through its Kigen product family, Arm’s tech buyers will be able to build solutions on the latest cellular standards and specification suitable to run on 5G and backward compatible networks.

Vodafone’s customers will now be able to create a cellular-based IoT solution that can be continuously connected and deployed globally, giving them better investment protection and reduced operational costs. In addition, customers will have the choice of managing these devices through a ‘single pane of glass’ on either Vodafone’s IoT platform or Arm’s Pelion IoT Platform.

“Any time complexity is removed from an IT or mobile solution, customers respond by deploying and using that solution more” says Vernon. “ SoC-based solutions tend to have more functionality that allows for innovation, so we should expect to see an uptick in cellular-based IoT deployments”

2
Things you need to know about Cyber Attacks, Threats & Risks

4.7/5 (3)

4.7/5 (3)

The cyber world is ever growing and in this vast world, no business is 100% safe & insured against cyber attacks. With so many threats out there incurred every minute, it is hard to detect each one and prevent them all. In this world of disruptive technology if organisations want to remain competitive, keeping their IT infrastructure security up-to-date is a must.

The Government, cybersecurity experts & other groups are taking various initiatives to spread awareness on cyber attacks but despite these attempts, organisations fail to take their cybersecurity seriously, we may say this is due to lack of awareness, increase in expense or companies simply not wanting to take the pains to prevent breaches.

“When things are going well, it is hard to sell the message of security to stakeholders and get support from across the business. When things are not going so well (e.g. you’ve had a breach), it means high pressure and a lot of focus on your performance” says Alex Woerndle, Principal Analyst Cybersecurity, Ecosystm.

Cyber attacks happen without notice. While there are many cyber experts present to help and provide consultation to the organisations, knowing beforehand about the attacks and strengthening your cybersecurity will safeguard you against serious ramifications.

 

Let’s Understand – What is a Cyber Attack?

A cyber attack is a deliberate attempt by an individual or a community working together to tap into an existing or a newly discovered vulnerability in the system, network, firmware or software resulting in complete control or gaining information from the victim’s system. While measuring the ill-effects of a cyber attack, we can say that with access to critical data one can exploit sensitive information, identity and may cause serious damage to an organisation or personal identity. Sometimes, a cyber attack is also referred to as computer network exploitation (CNE) or a computer network attack (CNA).

The other common terms used in association with a cyber attack are threat, vulnerability, and risk. Often these terms are mingled together in our day-to-day usage, but they all mean something different. Let’s try to uncover the basic difference between a threat, a vulnerability, and a risk.

A threat can be explained as an activity to exploit a weakness in a system, to cause harm or reveal the underlying assets. It always involves a person responsible for performing threat actions to impact the system’s security known as a threat actor.

A vulnerability is an unknown system flaw or a known weakness that could potentially be exploited by a person also known as a hacker. In other words, it can be known or unknown issues within a system or its software that can be exploited by hackers.

Together, when a threat acts and exploits a vulnerability, this may result in the development of a situation known as a risk. A risk could lead to potential loss or damage to a business.

Understanding threats, vulnerabilities, risks and other components will help you to act against cyber attacks but this may raise another question on why someone would try to harm your business.

 

So Why do Cyber Attacks Happen?

The people behind a cyber attack could be hackers, a team or a dark web organisation who work with an ulterior motive to commit a digital crime or to gain access to one’s system through a cyber attack. Collectively we may refer to them as cyber criminals. Cyber criminals try to identify vulnerability to crackdown a system.Below are some of the common reasons why a cyber attack happens.

Financial Gain 
This is one of the most well-known types of cyber crime. The motive of cyber criminals here is to get easy access to money and the ways they make this happen is through frauds, demands, data breaches or direct attacks. What attackers try to steal are the business’ financial details or sensitive data/intellectual property, customer financial data or databases, staff or client credentials. By gaining access to these, the attackers get in a position to easily access a secured system and exploit it for their financial gains.

Hacktivism – Political or Social 
Hacktivism is an activity involving anonymous organisations breaking into an organisation’s IT infrastructure for political or social reasons. Hacktivists mount cyber attacks to access information that can damage the intended target or perform activities to hurt or lower the reputation of certain bodies. Government and political bodies are often the targets of hacktivism.

Intellectual Challenge
Cyber world experts are sometimes challenged by the thrill of hacking or may develop a personality living in a virtual world pushing them to hack into a network with an intention of identifying system vulnerabilities. Generally, hackers are referred to as people with bad motives but hackers are not necessarily criminals as some of them help organisations to test systems, recognise backdoors, loopholes or vulnerabilities in a system which is termed as ‘white hat’ hacking. Knowing the vulnerabilities in the existing IT infrastructure and services may protect organisations from some serious future consequences.

Espionage
Stealing classified information, sensitive data or intellectual property from a government entity or a competitive organisation is a common form of espionage attack. The examples of an espionage attack could be stealing trade and military secrets or technologies or potential system flaws which may pose an influential threat to a nation.

Organised Cyber Crime
Digital technology has empowered individuals with some serious fire-power. IMs and chat technology have made it easy for individuals to form teams or an organisation to commit crimes on the web. Sometimes several groups form communities to commit a serious cyber crime – planned, coordinated and conducted together at a macro level.

Disruption
Aiming to disrupt business, or the operations of critical infrastructure, can be undertaken just to demonstrate security weaknesses, the hacker’s general disapproval for the business, or even to cause extensive operational, financial and physical damage to their target.

 

The Vulnerabilities that a Business can Experience

Data breaches occur every minute and unknown threats and vulnerabilities always pose a risk for a business. To stay protected, it is always better to know and understand the types of threats or vulnerabilities that a business can experience rather than later raising questions on how the attackers got in.

Types-of-cyber-attacks

 

  • Malware . A malware is a type of cyber attack where malicious software is installed on the victim’s systems through executable files usually without the user’s knowledge. Malware includes malicious software, including spyware, ransomware, viruses, and worms. After installation, a malware can keep track of the user’s activity or can trigger codes resulting into access to sensitive information, login details, credit cards or intellectual properties by the hacker.
  • Phishing. Phishing refers to spoofing or deceptive communications activities performed by the attackers that appear to originate from a credible source such as emails, messages, legitimate websites that are disguised. Through phishing, attackers try to fetch sensitive information, user details, credit card numbers or make fraudulent attempts.
  • Man-in-the-middle attack. These attacks happen with relaying or altering the communication channels. This can be communication between organisations and cloud server or over unsecured networks.
  • DoS/DDoS. A DoS/DDoS attack aims at flooding the target website with overwhelming traffic to exhaust resources and bandwidth of the system. These are not to bring down a website but to breach a security perimeter and smoke out the online systems. This can reduce a user base or may bring down the entire network.
  • SQL Injection. This is injecting a nefarious code or statements into SQL queries or a database server to extract information from the database or to take a data dump of the complete database.
  • Zero-day exploit. Zero-day is a software security flaw which is known to the software developers. Attackers try to exploit a vulnerability before a patch or solution is implemented to capture the system with known weaknesses.
  • Cross Site Scripting. XSS attacks occur when a web app sends malicious code in the form of a side script to another user thus bypassing access controls of the site to same as the origin.
  • Business Email compromise. This is an attack to spoof business emails and gain illegal access to company accounts and ids to defraud the company or its employees.

According to Woerndle, “Nowadays, most of the reported attacks appear to be email-focused either with the intention to encrypt the infected systems to demand payment of a ransom for the keys (i.e. ransomware), to steal credentials (subsequently used for further attacks on other systems and applications) or to steal information that can be sold for profit on the black markets. “

 

Some of the World’s Largest Data Breaches

Cyber attacks have become a repeated theme every year and we hear quite often about the data breaches. Here’s a visualisation of some of the world’s largest data breaches that have occurred in the past few years.

 

World's Largest Data-Breaches

Source: Informationisbeautiful-worlds biggest data breaches hacks

 

How to Prevent Cyber Attacks?

To minimise cyber attacks, businesses can put some counter-measures in place. It is a smart move to be prepared for serious circumstances and act reactively with security measures.

Secure assets. It is always considered a security best practice to keep your systems and infrastructure updated with latest security patches and updates which are released from vendors or manufacturers on a regular basis.

Conduct threat assessment. Vulnerabilities can arise within your own system or potentially from other sources which are not directly under your control, but they can be identified if you are aware. Perform regular due diligence of your system or network security.

Stay informed on threats. News articles, software companies, cyber security organisations often release information on threats and vulnerabilities that can help you stay informed and act against threats.

Formulate steps to avoid threats. Training and regular information to organisations and employees can prevent many attacks from happening. If your users or employees are aware and informed they can escape the threats. Keep strong passwords, encrypt sensitive information, safeguard accounts, use firewalls to prevent attacks.

Plan an incident response. Create plans and approaches to react against a cyber attack to manage and limit the damage. Always keep your systems backed up online/offline and prepare your IT team to deal with it. You may also take advice or may hire experts to strengthen your infrastructure security.

It is rightly believed that prevention is better than cure. Speaking on the subject, Alex Woerndle, conveys that “the fundamentals are always the most critical starting points – focus on your system and application hardening and patching processes, deploy and actively maintain endpoint protections (e.g. anti-virus), restrict the permissions users have on their devices and invest in regular training and awareness for all staff. Beyond that, ensure all systems are backed up regularly, and deploy (and encourage all users to apply in their everyday lives) multi-factor authentication wherever possible.”

Considering the recent information security breaches, governments around the world are actively forming committees and taking measures to fight against cyber attacks. The governments of various nations have published some guidelines and measures to prevent cyber attacks.

The NIST Cybersecurity Framework, US, provides a policy framework of computer security guidance for organisations to assess and improve their ability to prevent, detect, and respond to cyber-attacks. The framework has been translated into many languages and is used by various governments and organisations across the world.

The Australian Government (via Australian Signals Directorate – part of Defence) has published some very good guidelines – called the ‘Essential 8’ and ‘Strategies to Mitigate Cyber Security Incidents’. The Essential 8 are a very user-friendly guide for businesses and provide protection against 80% of the most common cyber attacks

The UK Government has also come out with very useful information to help organisations.

Recently, Singapore opened a new cybersecurity school and the Ministry of Defence (MINDEF), is planning to hire security experts for their cyber defense strategy.

Cybersecurity is a challenging area and is a very broad discipline that requires skills across technology, forensics, business management, risk and compliance, education, communication, technical support, and others.
Negligence can impair reputation and lead to commercial losses but by understanding the security aspects, one can become aware of the potential threat and be in a better position to counteract it, or even preempt it.

This is just a glimpse to give you some insights into areas of cybersecurity and what goes under the surface. For specific details, you may get in touch with us or speak with a cybersecurity expert.


Ecosystm Cybersecurity Research

2
Ecosystm Snapshot: CBA, Telstra, Ericsson to trial 5G for banking sector

4.5/5 (2)

4.5/5 (2) Commonwealth Bank of Australia (CBA) has entered into a partnership kicking off trials of 5G and edge computing with telecommunication majors Telstra and Ericsson to explore the benefits of 5G in the banking sector.

The partnership agreement was signed at the annual Mobile World Congress (MWC) 2019, in Barcelona. The trials are projected to showcase what banking in the future might look like, and how 5G technology and edge computing can help to lower the requirements of the infrastructure presently required for banking operations.

Speaking on the subject, Ecosystm’s, Principal Advisor, Tim Sheedy, thinks that “this trial will help all parties better understand where the opportunities are for users of the mobile networks, and for the telco and equipment providers too. They will understand the potential demand for specific network slices and capabilities and get a better idea of what they need to deliver and whether or not there may be demand for these services”.

5G edge computing is still in nascent stages and there’s not much present in the market. Whether it minimises infrastructure or distributes it differently is yet to be seen. “The trials will likely determine what the shape of the new distributed architecture looks like (how close to the “edge” do the data centres need to be?)” says Tim, “There are unknowns of 5G at the moment – so the trials are invaluable to all parties to help them know where and what they need to invest in to make 5G services commercially viable.”

For a layman, 5G edge computing is all about delivering the reliability, speed, and latency that they need – or more likely – a sensor needs in order to get its job done. Once the technology becomes mainstream the end-users/banking customers will reap benefits from it. “5G is not just about delivering faster speed but it is about delivering them intelligently”, says Tim, “5G will help Telco’s to prioritise traffic AND network services – meaning that the end user can achieve their goals.”

While it’s too early to tell at this stage how will 5G benefit the banking sector, it should help banks offer their customers more reliable and relevant services – but what services need to be distributed at what times, and what can remain at the core are not yet understood.

2
IIoT and the Changing Ecosystem

5/5 (3)

5/5 (3) IoT, Industry 4.0, Industrial IoT (IIoT), odds are that you have heard these terms used around you recently. IoT in the consumer space is a pretty straightforward concept to understand. IoT is an interconnected world of computing, mechanical and digital devices such as in a smart home consisting of thermostats, webcams, smoke detectors, smart doorbells who can talk to each other and managed from the internet or a smartphone.

On the other hand, when we look at things at a larger scale or we can say, an “industrial scale” then it is a whole new IoT world. Industrial internet of things (IIoT) is an extension of IoT and is the use of IoT largely in manufacturing applications, and supply chain management. IIoT is driving the next wave of the industrial revolution or we can say it’s opening a gateway to ‘Industry 4.0’. The key idea driving Industry 4.0 is a connected world comprising humans, machines, sensors and data working together in real-time to transform business and manufacturing processes.

Industrial IoT Components

A traditional manufacturing environment application works by connecting machines to a centralised data centre. The pain points here are there isn’t any interconnection between machines, the latency rate is high and processes are manual and thus prone to errors. Contrary to this, IIoT puts a modern approach and makes processes decentralised. IIoT makes machine interconnection possible converting them into automated and smart processing units. With IIoT machines have the ability to talk to each other in their own Machine to Machine(M2M) language.

The basic components that drive an IIoT system are:

  • Secure intelligent assets such as sensors and smart controllers – that can sense, communicate, store and transmit information
  • Communication and data storage infrastructure – often cloud-enabled
  • Data analytics and smart business apps that generate information from the data
  • Skilled workforce

 

How IIoT Can Revolutionise an Industry

IIoT is transforming the manufacturing industry and other supply chain intensive industries by maximising efficiency, reducing downtime and increasing the overall production. While IIoT adoption is still in a nascent stage, there are some industries that have taken the first mover advantage and have started demonstrating readiness use cases.

The Smart Factory

The adoption of IIoT has reshaped traditional factories to create smart factories. The systems work with interconnected machines and real-time data exchange that merge the departmental communications along with unified operations and information systems.Industrial IoT Smart Factory

How is IIoT making factories ‘smart’?

IIoT has revamped how the traditional units worked. The slow and manual processes are now automated processes with M2M communication. This can be easily demonstrated through an example of how Smart Factories deal with preventive maintenance.

A smart factory has machines, sensors, databases, and humans all working in sync with each other. Sensors within machines can automatically notice a fault and the software logic sends an automatic alert to the right human to analyse the cause behind the fault. With Artificial Intelligence incorporated, machines determine the cause of the faults and go beyond predictive to prescriptive approach pre-empting problems before they exist. This in return reduces the maintenance cost and increases uptime of the factory by introducing parameters to fix machines with accuracy. In-return this leads to increased shelf-life of components and less-time involved in problem detection and rectification.

Energy & Utilities

The Oil & Gas industry is embracing IIoT with a multitude of benefits. Now the energy and utilities have an ability to easily sync data and simultaneously operate across multiple locations. This is made possible with the adoption of cloud, and installation of sensors that capture real-time data on the operating conditions of assets, monitor physical conditions such as temperature, pressure and humidity, and even environmental conditions. The practical scenario here is that Oil & Gas companies are remotely controlling their drills and monitoring the earth’s crust by remote control sensors and maintaining the flow of resources.

Logistics

With so many moving parts in a logistics system, from factories, collection points, and the transport network, it was difficult to maintain and manage a single view of the entire process. Through an ecosystem of sensors on the machines and vehicles covering the entire supply chain, it is now possible to access real-time data. It allows advanced functionalities such as virtually positioning hundreds of vehicles and optimising their route. In the process saving energy and reducing the time for delivery. The consequence is reduced costs for fuel, vehicle maintenance, and staff, plus increased customer experience through shorter and more accurate delivery times.

Other Industries – Promising the change

The adoption of IIoT will go beyond the early adopters and revolutionise several other industries. The Transportation industry is ripe for transformation given that infrastructure is being strained and margins reduced. The challenges of demand and aging infrastructure can be best handled by IIoT.

“The success of smart cars will eventually depend on how ‘smart’ the infrastructure is,” opines Vernon Turner, Executive Analyst, Ecosystm. “Several smart cities are already thinking along these lines, and adoption of IoT in Transportation is set to rise exponentially.”

Another industry that will benefit immensely from IIoT adoption is Healthcare. At the moment, asset management IoT systems have been adopted by several organisations, as in-patient remote monitoring systems that allow clinicians to monitor and analyse patient data remotely.

The real value of IoT will be realised when clinicians have a clear workflow that allows them to monitor patients outside the hospitals,” says Sash Mukherjee, Principal Analyst, Ecosystm. “In the past, healthcare organisations have been influenced by the Manufacturing industry – by Lean and Six Sigma. They will benefit from implementing Industry 4.0 technologies, that will transform not just the provider organisations, but healthcare in general.”

 

Turning IIoT into a Profit Engine

Given all of this information about IIoT you may be thinking about the ROI, associated costs, benefits and the industry-wide exposure of the Industrial IoT. It is imperative that companies large & small are embracing Industry 4.0 change. IIoT is benefitting businesses through differentiated offerings, a creation of newer revenue streams and increased monetisation of existing offerings.

The Ecosystm IoT Study, 2019 looks at the drivers of IoT adoption across industries.

Ecosystm-IoT-Study-2019

The data shows that the key drivers of IoT adoption can all affect the profit margin of an organisation.

  • Innovation. In today’s competitive world, innovation in product designing and service delivery is directly related to a positive impact on profit margins. Organisations are looking beyond cost savings through their investments in IoT and are using IIoT to bring new, innovative products and services to the market. They are looking at creating innovative businesses that can leverage technology and offer cost savings.
  • Workforce Optimisation. It is impossible to bring change without workforce optimisation. Organisations are working on the valuable insights offered by IIoT systems which further provide ways to optimise the workforce and accelerate productivity. Implementation of automated production units and the reduction of manual labour is bringing both productivity gains and increased profits. It is also boosting employee morale – happier employees impact the profitability of organisations, reduces turnover, improves customer interactions, and promotes more job ownership.
  • Customer Experience. Customer expectations have gone up and so have methods to improve customer experience. Organisations are taking IIoT seriously, as it’s unleashing capabilities to improve processes throughout the product life cycle while also improving product quality through better QCs. Feedback to product improvement time has reduced – customer features and product improvement requests can now be handled more efficiently, based on customer data.

Businesses that fully capitalise on IIoT systems are successfully building a competitive edge through their innovative products, optimised workforce, and differentiated products and service offerings to enhance customer experience.

What Lies Ahead?

As IIoT percolates into other industries, we will potentially see a new industrial revolution. This has obviously been attracting investment and technology companies quickly to offer related technology offerings that tech buyers would do well to consider along with IoT.

Cloud

Data management will become an obvious challenge with IIoT-driven data proliferation. Already the industry has been talking about going beyond cloud to “fog” computing.  The real value of IIoT will be realised when the solutions become able to operate on the Edge. This will see an increased uptake of SaaS offerings that will be required for quick and accurate data-driven decisions.

AI

AI will eventually go further than basic machine learning and incorporate deep learning for better predictive and prescriptive analysis. IoT devices with embedded AI will truly revolutionise industries. This is another technology area that tech buyers should keep an eye on, irrespective of the industry.

Security and Risk Management

An explosion of IIoT devices and data will bring new risks. Cybersecurity experts and teams will be required to constantly monitor vulnerabilities, follow security best practices and eventually predict breaches.

 

The Future

Industry 4.0 is very much a buzzword in certain industries, with several advanced organisations already following the business and technology practices. Naturally, there are still many companies that do not see the need for new technology or would rather invest in other areas.

For organisations that are looking to modernise, innovate and remain competitive, Industry 4.0 is a good benchmark of how technology can be leveraged. IIoT is a key enabler of Industry 4.0 and has the potential to deliver benefits to majority industries through increased intelligence and curated data – the question is how soon we can witness it on a scale.

Which are the other industries that you think will benefit from IIoT? Leave your comments below

2
Ecosystm Snapshot: IBM & HCL Join Hands to Gear up Hybrid Cloud

5/5 (6)

5/5 (6) IBM is aggressively pushing their products and services with multiple partnerships being announced over the last few months.

In the recent announcement, HCL Technologies and IBM stated that they were collaborating to assist organisations on their hybrid cloud journey. The joint services will offer seamless integration of their customers’ cloud across any private, public and on-premise environment. The hybrid cloud approach is aimed at eliminating the concerns of mixing the different cloud environments yet maintaining scalability and security. HCL will feature new refactoring and re-platforming services to allow organisations to migrate, integrate and manage apps and workloads on IBM’s cloud.

Speaking on the subject, Phil Hassey, Principal Advisor ,Ecosystm, thinks that “the most attractive aspect of this collaboration is that it will bring together the best of both vendors. IBM has such a long history in Infrastructure Management, whereas HCL has – most particularly in the past 5 years or so – built up capability in the space.”

The good news for tech buyers is that they will derive benefits from HCL’s customer knowledge and hands-on approach with the combination of IBM technology, cloud and – of course – Watson. HCL has acquired significant IBM assets that they could extract more value from. The infusion of AI into hybrid cloud will lead to increased automation, improved outcomes and effective investments by clients.

When we look at the individual benefits to IBM and HCL from this deal, Hassey says, “IBM needs new customer logos and HCL can provide that. Conversely, IBM can provide larger enterprise clients to HCL. However, it is not a straight customer swap, they will work to maintain relationships independently.”

IBM is pushing hard towards their plans to capture more market with many big deals announced recently – and undoubtedly many more yet to happen. It is well-documented that IBM has gone through many reinventions but is still deeply entrenched in many of the world’s largest organisations. “IBM is such a large machine that different aspects and offerings are always operating at different speeds”, says Phil. “It needs to accelerate the uptake of Watson, and Watson being available on any cloud will help this.”

The hybrid cloud is desperately looking for big scale integration and transformation capabilities, so this agreement between HCL and IBM will hopefully help kickstart that.

2
VendorSphere: IBM’s Roadmap for 2019

5/5 (6)

5/5 (6) Authored by attending Ecosystm Advisors and Analysts: Randeep Sudan, Amit Gupta, Tim Sheedy, Lokesh Tayal and Sash Mukherjee

IBM has been sending strong messages about their future business goals in Asia Pacific, to the analyst community and the larger market as a whole. Over the last 2 analyst briefings held in Melbourne (August 2018) and Singapore (November 2018), they have emphasised their focus on the ‘Hero Brands’, the multicloud, their Open-First policy, and their One IBM messaging.

Based on our analysis, it is clear that IBM is:

Consolidating their Portfolio into ‘Hero Brands’. IBM’s portfolio has been consolidated into IBM Services, IBM Watson, IBM Cloud, IBM Security, IBM Systems and IBM Research. This consolidation represents a holistic and cross-cutting approach to the market and is likely to give IBM an edge in implementing emerging technology solutions. As an example, the Technology Support Services (under IBM Services), leverages both Watson-enabled support and Blockchain-based billing and invoicing.

Ecosystm Comment. IBM Watson still remains a flagship brand for the organisation and should be integrated more within the stories of the other ‘Hero Brands’. While the penetration of Watson capabilities has grown, it is not what it should be, considering that IBM has first-mover advantage in the cognitive/AI market. IBM needs to actively play to their strengths and build further capabilities leveraging the Watson/ IoT/ Blockchain ecosystems.

Focusing on the Multicloud. IBM’s strong experience in cloud deployment, migration and management gives them a true understanding of the cloud adoption landscape. They are pushing the concept of the multicloud, leveraging their capabilities to manage other vendors’ clouds, acknowledging the reality that organisations are at disparate stages when it comes to cloud adoption, and that they all have their own unique journeys. While the public cloud with cloud native workloads, is the end-game, IBM understands that their clients run their workloads across public, private and hybrid clouds, and have developed a capability to support all of these environments.

Ecosystm Comment. For many of IBM’s traditional clients, this is the right approach to take – these are companies with typically highly complex environments where simple messages around “take it all to the public cloud” might be more easily said than done. IBM will work with these clients to help them modernise their business and make the most of their current on-premise and hosted applications. Moreover, data localisation requirements in some countries will also require a hybrid approach to the management of cloud assets. While the market implications of IBM’s Red Hat acquisition are being discussed at length, other initiatives such as strengthening their automation capabilities, extending their relationship with ServiceNow, and their Open-First policy will also benefit IBM and the market as a whole.  

Creating a Services Differentiation. The Managed Applications division under Global Technology Services (GTS) – that works closely with Global Business Services (GBS) acknowledges that managing SAP and Oracle applications on IBM Cloud is their fastest growing market. So, given the plethora of service providers, especially in the region, how do they create a differentiation? IBM’s response is to infuse ERP deployments with change management capabilities to help companies become truly digital. This is bolstered by their Industry Impact Solutions, and the One IBM messaging. GTS and GBS coming together to deliver an end-to-end solution, can potentially give their clients a better understanding of the technological requirements, change management, and TCO.

Ecosystm Comment. In the studies conducted by Ecosystm, IBM features as the vendor with the highest mindshare for IoT and Mobility and comes in at 2nd spot for AI. However, where they clearly lead the market is in being the services provider of choice when it comes to Digital Transformation (DX).

Top of Mind Services Providers for DX, Asia Pacific

As organisations make the transition to digital operating models, services providers that can provide scale and skill, will become significant partners in the journey. IBM indisputably has both scale and skill, and the One IBM messaging can further strengthen their market position as the service provider of choice for DX. However, this messaging should be far more consistent and run across IBM’s entire operations for better market positioning.

Improving their Customer Capabilities. Over the past few years IBM has invested in its delivery capabilities, with design thinking, ideation sessions and customer journey mapping, included in many of their client engagements. They have brought in experts from outside of IBM to provide many of these capabilities – uncharacteristically, many of the IBMers you meet who offer or drive these services are new to the organisation. They are also driving new technology processes and capabilities within many of their clients – moving beyond simple systems integration to helping their clients change their internal digital delivery processes.

Ecosystm Comment. In an era where change is constant, the ability to drive change within the business will be central to the ability to succeed in the market. Too many companies bring in external consultants and SIs and instead of leading the change, they let the SI lead the change. They do not take many – or any – learnings out of the engagement and are completely reliant on external consultants every time they need a big change. While this is a great opportunity for the SI and consultancy providers, many companies – IBM included – want their clients to succeed. So instead of selling them lemonade, more and more they are teaching them to make their own lemonade.

 

3