<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

7 Challenges for Industrial Internet of Things (IIoT) Adopters

July 20, 2017

Garland Technology Industrial Network Security IIOT Network Monitoring

Businesses are in a constant battle to balance the benefits of new technology with the risks of increasingly sophisticated data breaches. But things are a bit different for those responsible for critical infrastructure.

The pressure to make everything “smart” keeps heating up. However, adopting the Industrial Internet of Things (IIoT) won’t do you much good if “smarter” control machinery doesn’t prove reliable.  There’s no denying the benefits (and inevitability) of IIoT technology, but don’t get lost in all the hype. Before adopting smarter critical infrastructure components, think about how you’ll overcome these 7 Industrial Internet of Things challenges.

Security - The Major Concern

Cyber attacks against critical infrastructure are much higher stakes than typical IT networks. This is why operational technology teams are so cautious with technology. But we can’t run closed networks on legacy operating systems forever.

Implementing IIoT technology means introducing new security tools to the network—but even industrial control systems are proving insecure. Resist the IIoT hype until you have a solid security plan in place.

Maintaining Visibility of Your "Things"

Until the age of Industrial Ethernet, OT professionals didn’t have to worry about IP addresses and network visibility. But now, your network could go from zero to potentially thousands of connected sensors and devices.

It’s hard enough to manage visibility for a single factory floor—but the Industrial Internet of Things will add additional challenges as you scale it globally.

The New Frontier of Connectivity Outages

Internet connectivity makes 100% availability nearly impossible. Even if the network isn’t going down unexpectedly, you might expect to go offline for maintenance.

You can’t assume you’ll never experience intermittent outages. As you implement IIoT technology, make sure you’re using the proper cables and set yourself up to guarantee zero data loss—even in case of connectivity issues.

Blending Legacy and IIoT Infrastructure

Private networks and legacy protocols have given OT infrastructure an opportunity to focus less on security and more on optimizing operations and third-party integrations. But things are changing with IIoT.

Modernizing your entire infrastructure won’t be feasible—you’ll inevitably end up with legacy infrastructure mixed with some IIoT technology. To make the most of your 20-year manufacturing investments, take the time to properly assess legacy infrastructure before adding new “smart” technology.

>> Download now: Learn how to secure your industrial network
[Free Whitepaper]

Welcome to the Edge of the Network

Your IT partners are very familiar with the edge of the network—opening more of your business to the outside world means having more important tasks processed at the edge.

As Industrial Ethernet and IIoT technology come into play, your traditional OT network will also move to the edge. The source of your data will come from cloud/edge communication, bridging the gap between your network and the IT network. Partnering with your IT colleagues will become more of a necessity as you implement more IIoT technology.  

Data Storage is a New Concern

Data storage is a complete departure from traditional industrial operations. In the past, you would take high frequency data, analyze it, and promptly throw it away.

With the Industrial Internet of Things, you’ll collect thousands of data points that have critical relevance to other aspects of the business outside of the OT network. To make this data available across the organization in real time, you’ll need to plan for secure short-term storage.

Choosing the Right Tools for the Job

The previous IIoT challenges listed all focus on implementation and operation of IIoT technology. Another part of the problem will occur before you ever have IIoT in place. There’s a large (and growing) market for IIoT devices—which is right for your needs?

Just because you’re adopting more characteristics of IT networks doesn’t mean you can just throw a firewall onto the IIoT network. Evaluate any new “smart” devices for their ability to operate in hazardous areas and harsh conditions without sacrificing reliability.

Don’t let these 7 challenges dissuade you from moving forward with the Industrial Internet of Things. Avoiding the inevitable for too long will give your competitors time to gain an edge over you. And if you wait too long, you might rush into implementation and leave yourself open to cyber attacks. Moving beyond these challenges requires proper planning for connectivity and security before you start investing.

Looking to add a visibility solution to your industrial deployment, but not sure where to start? Join us for a brief network Design-IT consultation or demo. No obligation - it’s what we love to do.

Defending Industrial Ethernet Network Security Garland Technology

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES