Menu

M2M FEATURE NEWS

M2M Evolution: The Seven Golden Rules for a Successful SCADA Implementation and Operation

By Daniel Brecht April 14, 2014

The evolution of M2M continues at a rapid pace; in fact, another option now available to businesses is the implementation of SCADA (supervisory control and data acquisition) systems that have made it possible for machines and devices to be connected. It might seem that there are no differences between M2M and SCADA, so some might wonder if M2M is just SCADA under a different name. According to a Novotech post, they are similar under many aspects, but M2M is applied and used in a larger variety of industries.

As explained in a Control Global post, SCADA is a system that monitors and controls industrial-, infrastructure-, or facility-based processes. It uses human–machine interface (HMI) and open and non-proprietary communications protocols; a technology that allows clients to access data from two field devices/subsystems, remote terminal units (RTUs) and programmable logic controllers (PLCs) that connect to sensors and convert sensor signals to digital data. Servers and software are responsible for communicating with the field equipment (RTUs or PLCs) to display info to remote stations; thus, allowing individual operator workstations to obtain detailed schematics for a particular sensor or machine.

SCADA products are easy to use and run on multiple device platforms to perform a wide range of data collection services; in recent times, the technology has undergone developments, involving continued advancements, for monitoring and managing distributed equipment and facilities. SCADA technology appears to have bright future ahead as it is able to give users a unique perspective and insight into new data visualization possibilities with emerging technologies. “Because of its immeasurable benefits, many organizations now have their own SCADA systems in place,” explains The Modern Leader, the official blog of IQPC Asia, which listed The Seven Golden Rules for a successful SCADA implementation and operations; here they are:

Golden Rule #1: Choose your system wisely when purchasing a SCADA system. It is key to know which provider to opt for that has a legacy, historical reputation and peer preference; it is important to go with a provider that can meet sector-specific needs—i.e., is best aligned to the requirements of an organization.

Golden Rule#2: Get network integration right and make sure that it is carried out efficiently and with contingency planning in mind.

Golden Rule #3: Prepare for environmental hazards; extreme weather conditions take a toll on the durability of SCADA equipment, such as RTUs, and that could jeopardize its performance.

Golden Rule #4: Plan for replacement of obsolete units; this is necessary to prevent loss of money and time when having the need to improve usability, maximize flexibility and provide for future expansion.

Golden Rule #5: Keep security threats at bay and ensure SCADA systems are up to the task by continuously auditing to make sure that security threats are always in check.

Golden Rule #6: Assess vulnerability regularly to mitigate a SCADA system being susceptible to an attack. Assessments can be made to reduce the causes of vulnerability also through threat simulation.

Golden Rule #7: Ensure interoperability without sacrificing security. Because of the importance to find a solution that allows different systems and various devices to operate together, often open protocols are used. This might make the system susceptible to threats that cybercrime poses. Therefore, it is paramount to find a balance between the need for flexibility and proper security.

Further details of each of the seven golden rules, which came part of the SCADA Asia 2013 event, can be found at the IQPC site, a source that provides business executives around the world with tailored practical conferences and large-scale events. The conventions bring together top industry thought leaders and expert speakers from Power & Electricity, Water, Gas, Railways and Oil & Gas Sectors.




Edited by Maurice Nagle
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Contributing Writer

SHARE THIS ARTICLE
Related Articles

Beyond the Closet, Connecting to IoT

By: Gary Audin    11/11/2020

Two challenges arise when considering cable based IoT.

Read More

Banyan Security Enhances Secure Remote Access for Engineering Resources

By: Ken Briodagh    10/27/2020

Banyan's Continuous Authorization Can Grant or Revoke Access to Sensitive Engineering Environments and Applications in Real-time Based on TrustScore

Read More

Senet Eyes RAN Partnerships as Key to Delivering Network Services for Massive IoT

By: Arti Loftus    10/21/2020

To meet the challenges that come with providing network connectivity for IoT solutions, Senet is executing a strategy for massive IoT that will be bui…

Read More

mimik Selected by 5G Open Innovation Lab to Drive Early Adoption of 5G

By: Ken Briodagh    10/15/2020

mimik's patented Hybrid Edge Cloud platform will boost the performance and reduce the cost of 5G Networks

Read More

5G Sets New Standards for Vertical Industries' IoT Connectivity

By: Special Guest    10/13/2020

As 5G rolls out across the world, vertical industries across IoT are working on additional standards to make the technology suitable for their industr…

Read More