{"id":1022078,"date":"2021-07-27T13:24:02","date_gmt":"2021-07-27T17:24:02","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/managing-operations-technology-with-it-automation-world\/"},"modified":"2021-07-27T13:24:02","modified_gmt":"2021-07-27T17:24:02","slug":"managing-operations-technology-with-it-automation-world","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/technology\/managing-operations-technology-with-it-automation-world\/","title":{"rendered":"Managing Operations Technology with IT &#8211; Automation World"},"content":{"rendered":"<p><p>Its no secret that the worlds of OT  (operations technology) and IT (information technology) are becoming ever  closer. The growing connection of plant floor devices to enterprise networks  for Industry 4.0 and Internet of Things initiatives is driving this convergence  of OT and IT. Thats why these two technology groups cannot remain isolated  from each other in a world that increasingly requires operations visibility  across supply chains for manufacturers to stay competitive. <\/p>\n<p>To better understand how IT and OT are  merging, and the kinds of technologies enabling this, we connected with James  Destro of ServiceNow, a supplier of digital workflow software to connect  people, functions and systems across organizations, and Carey Blunt of Fujitsu,  one of the worlds largest IT services providers, for a recent episode  of the Automation World Gets Your Questions Answered podcast series.<\/p>\n<p>Beginning  with an exploration of how OT devices can be discovered, secured, and managed  with the same kinds of tools used by IT, we focused on the core plant floor  issues of asset management and security to understand why it benefits a manufacturer  or processing company to secure and manage operations technology in a similar  fashion to IT.<\/p>\n<p>James Destro of ServiceNowCompanies are  starting to look at how they can have a proactive stance toward plant floor  technologies that typically have been air gapped or disconnected from the enterprise  network, said Destro. To effectively manage this connection, companies are looking  for a better way to find and understand the current topology of OT systems on  their network and be able to manage them proactively to respond to  vulnerabilities and security incidents. IT tools have a long-standing framework  of doing just that for cloud systems and servers in data centers, as well as laptops  and distributed devices. This leveraging of IT best practices on the OT side promises  a lot of strength and value for industry.<\/p>\n<p>Explaining how this process of connecting IT  and OT can best be started, Blunt said, When  you're trying to get standardization between your IT and your OT teams, youre really  focusing on getting your processes, your people, and your technology working in  the same way. Most of our customers approach this by focusing on the technology  and process parts firstintegrating a little bit at the network level to find out  what assets exist on the OT network, linking those assets in the same place,  and keeping them there.<\/p>\n<p>Carey Blunt of FujitsuAs  you discover assets on the network, store them in a database, and map their  relationships, you need a tool that can help with your security responses and with  predictive and proactive maintenance for those assets. When youre pulling  these data points into your IT structure, that's where workflow technologies  like those offered by ServiceNow are important, said Blunt, because they've  got the CMDB (configuration management database) and the capability to exercise  the workflow for both the IT and OT worlds.<\/p>\n<p>In  both IT and OT, relationship mapping is considered one of the fundamental  pillars to understanding how IT and OT systems can be impacted by network  changes, incidents, or a vulnerability in any of these systems.<\/p>\n<p>Relationship  mapping happens across two different vectors, explained Destro. The first vector  involves understanding the data and communication relationships of the actual OT  system. This could mean an HMI (human machine interface) managing a SCADA (supervisory  control and data acquisition) system or a SCADA system controlling a PLC  (programmable logic controller) or exchanging data with a historian. The second  type of relationship mapping is understanding the context of the operational  technology as it's used for manufacturing. This means that we not only need to  understand if were dealing with a SCADA system, a PLC, an HMI or historian,  but also automating the process of how we interact with these technologies in  the manufacturing facility. This provides an overarching contextwhat we call a  manufacturing system dependencyso that whenever we're changing configurations,  doing configuration compliance, change management, or incident management, we  can understand the potential impacts of these actions on other operational  technologies, as well as what the potential impacts could be to the actual  production process.<\/p>\n<p>Beyond asset management, Destro noted that  relationship mapping is also an important aspect of cybersecurity.  Relationship mapping is critical to  cybersecurity, especially around vulnerability response, incident response, and  understanding how things are connected to the network, what relationships they  should have by default, and what relationships might be established if an  incident occurs, he said. This knowledge helps identify what systems may need  to be taken offline when applying a patch, for example.<\/p>\n<p>As  the concept of predictive maintenancewhere sensors on equipment feed data into  analytics software to provide advance warning of failures so that unplanned  downtimes are mitigatedgains ground across manufacturing and processing  companies, its application predominantly applies in the OT arena. But when OT  assets are connected to IT systems, you can also apply the IT concept of  predictive outage avoidance.<\/p>\n<p>Having a comprehensive OT change management systemand all the metadata it provides about systems and their relationshipsenables manufacturers to apply incident management. This occurs when there's an upset to a process, asset, or to the systems management technology itself.<\/p>\n<p>Blunt  explained that once an asset is connected to the enterprise network and you  have access to operational data about that asset and how its interacting with  other devices, that datalike event and error messagescan be used to see  patterns. These patterns give you something more thorough than a time-based  prediction of roughly when these components are going to wear out.<\/p>\n<p>Transferring  asset data into action on the plant floor is the core function of field service  management applications, which helps direct engineers to the right place at the  right time with the right parts, said Blunt. Field service management is about  making a better experience for the engineers, because their time is used more  productively, and it provides a better experience for the operations team  because downtime is reduced and they're able to plan better, he said. Ultimately,  this translates into a better experience for the companys customers, employees,  and board because you have fewer outages and your production time is working to  its optimum efficiency.<\/p>\n<p>As manufacturers focus on the management and  governance of OT systems, change  management becomes a critical capability. Its importance stems from the fact  that having a managed workflow process for changes helps the manufacturing  workforce better understand numerous applicationsfrom attaching a new sensor  to the system, upgrading or changing configurations and bridging these changes across  the engineering network, to applying patches and ensuring that all the  appropriate approvals to make any change have been received.<\/p>\n<p>Having  a comprehensive OT change management systemand all the metadata it provides  about systems and their relationshipsenables manufacturers to apply incident  management. This occurs when there's an upset to a process, asset, or to the systems  management technology itself.<\/p>\n<p>Destro  said incident management can come in two forms. It could be one of the systems  is not respondingdue to a device or electrical failureand in response we're  driving workflows towards solving that particular challenge. Or it could be a  security or operational incident that triggers security workflowswhat we call a  security incident response, he explained. Both of these are critical  incidents that need to be handled in in different ways with particular  workflows. One towards solving the problem and returning the system to normal,  and the other towards mitigating the impact of this incident moving forward. In  either case, the technology will help you determine which systems need to be isolated,  what mitigation factors need to be put in place, and what actions need to be  completed as part of the response workflow.<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.automationworld.com\/factory\/plant-maintenance\/article\/21577595\/managing-operations-technology-with-it\" title=\"Managing Operations Technology with IT - Automation World\">Managing Operations Technology with IT - Automation World<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Its no secret that the worlds of OT (operations technology) and IT (information technology) are becoming ever closer. The growing connection of plant floor devices to enterprise networks for Industry 4.0 and Internet of Things initiatives is driving this convergence of OT and IT <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/technology\/managing-operations-technology-with-it-automation-world\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187726],"tags":[],"class_list":["post-1022078","post","type-post","status-publish","format-standard","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1022078"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1022078"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1022078\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1022078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1022078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1022078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}