Operations Performance Analytics

Introduction

Pairing physical assets with intelligent sensors to gather, analyze, and communicate data is driving enormous new efficiencies in manufacturing and business operations. Just as in the consumer markets, where the first generation of personal fitness monitors and smart home devices leverage data sets to influence and shape events in the physical world, so too are operational efficiencies borne by the Internet of Things (IoT) generating new returns in manufacturing.

According to McKinsey in 2014, “business-to-business applications will account for nearly 70 percent of the value…from IoT in the next ten years.” The firm estimates that of the nearly $11 trillion a year in economic value generated globally, ‘nearly $5 trillion [will] be generated almost exclusively in B2B settings, including factories, such as those in manufacturing, agriculture, and even healthcare environments; work sites across mining, oil and gas, and construction; and, finally, offices.’

More informed decision-making and cost-optimized operations across the extended supply chain are only some of the benefits. Wireless sensors, whether measuring hydrogen levels in soil or temperature variables on the production line, are eliminating blind spots in traditional manufacturing processes and delivering a constant flow of usable data. And while manufacturers have leveraged data in discrete applications for Manufacturing Execution Systems (MES) and Enterprise Manufacturing Intelligence (EMI) systems for years, the growth of sensors, real-time dashboards, cloud-applications, and mobile technologies are delivering new degrees of actionable intelligence to precise locations at precise times for improving productivity and reducing costs.

Critical Technology Issues for Operations Performance Analytics (OPA)

BREAKING DOWN TRADITIONAL IT/OPERATIONS SILOS

Seamlessly moving data across plant and business functions, and applying analytical tools to enable new insights, requires a new approach into managing applications, networks, and systems. Tradition monitoring tools in factory environments were often isolated, closed-end systems, offering only a keyhole view of IT and operations performance. Additionally, the proprietary and separate nature of traditional networks in factory and business environments reduced shared visibility and added management complexity, resulting in either incompatible data sharing models or diffused responsibilities between the IT and Operations Technology teams.

These challenges are driving innovative manufacturers to increasingly leverage their wired and wireless networks as the focal point for reliably and consistently collecting data about applications, devices, users, geo-locations, bandwidth utilization, and much more. This “from the source” data can then be leveraged not only to track traditional network connectivity performance, but also deliver deep mission-critical insights into manufacturing application performance, real-time interactions, security postures, compliance metrics, and IT-driven business intelligence, as well as myriad other performance indicators.

GAINING CONTEXTUAL VISIBILITY INTO OPERATIONS

By capturing granular and contextual data traversing the network, manufacturers traditionally impeded by a lack of interoperability are now able apply network policies throughout the extended production process, track application performance across edge, data center and cloud environments, and share actionable data with vendors, partners, and business leaders to inform and improve decision-making. For example, a biotechnology firm investing in a cloud-based Manufacturing Execution System (MES) can now view application and location based wired/wireless network data to proactively identify performance issues on the plant floor, and ensure more reliable application response while ensuring that compliance and regulatory requirements are met and recorded. Predictive features can also automatically identify, report, and handle issues before they become problems and cause costly downtime to plant operations.

PROTECTING DATA ACROSS THE SUPPLY CHAIN

With each of the millions of connected sensors, devices, applications, and users in today’s extended manufacturing ecosystem serving as a prospective entry point for a security breach, managing the threats present in the new data driven manufacturing environment is paramount. The consequences of a breach can be devastating, not only for the business, but also for consumers ultimately at the end of the supply chain.

Yet in the drive to increase efficiency, transparency, and connectivity, traditional approaches centered solely on firewalls and mobile device management lack safeguards against threats originating internally, across interconnected production facilities, and from newly converged business networks.

Rigorous security compliance standards in manufacturing operations are needed to protect access to the network and maintain real-time protection against evolving threats – beginning with visibility into the profile and architecture of approved applications, devices, and users, and the creation of a universal threat prevention posture that adapts to both functional challenges and the inevitable modifications to the IT/OT environments.

To learn more visit Extreme’s Manufacturing Solutions site: http://extremenetworks.com/manufacturing

REQUIRED CAPABILITIESRECOMMENDED SOLUTIONHOW WE DO IT BETTER
Granular visibility into the context of both plant and business operations, including applications, users, role, location, time, deviceExtremeAnalyticsBridge IT operations with business analytics into a single integrated tool without requiring overlay networks
Accelerated management and troubleshooting of application and network response times, as well as users, devices, and wired and wireless infrastructuresExtremeControlSingle pane of glass management system provides centralized visibility and end-to-end granular control of wired and wireless network
Universal network threat management across wired and wireless networks from the edge to the data centerExtremeSecuritySecure provisioning and access control of standards-based devices accessing the wired and wireless network
• Validated Solution Architectures for Manufacturing
• Best in Class Technology Partnerships with industry-leading Data Center, Analytics, Security, and Convergence
Professional Network Design Services• Open Standards-based Networks adapted to your unique requirements
• Eliminate operational compromise characteristic of a Maintenance monolithic one-sized fits all network approach
Global 24/7 Operational SupportMaintenanceGlobal Technical Assistance Center (GTAC) that provides technical support 24 hours day, 365 days a year

Download the Solution Brief