Remote access opens opportunity, concern

In yet another fight in the supposedly shrinking space between IT and OT, remote access and monitoring are beginning to gain traction.

Oem 831542 Screen Shot 2017 07 26 At 3 50 54 Pm

Remote access to operational industrial equipment is a thorny topic. General adoption is slow, but some end users—usually smaller, flexible, and less IT-heavy CPGs—are beginning to take advantage of what’s available with remote dashboards and uptime trackers. A few have gone a step beyond, allowing OEM partners past the firewall for one-time troubleshooting, or ongoing machine monitoring and data collection.

This recent traction is notable because, despite being available for some time, there hasn’t been much end-user pull. Safety was a huge concern. And early on, OEMs themselves looked at remote monitoring as a conflict, potentially reducing aftermarket revenues with real-time troubleshooting.

But recently, OEMs shifted the remote focus from active access to more benign monitoring from afar, a baby step forward on the path to adoption. Trade show attendees tend to consist of the functional people who look at the bottom line, not the maintenance and operations people on the machines. So remote troubleshooting became less of a push than remote monitoring for predictive maintenance and improved OEE.

The resulting output of dashboards and OEE monitors was a one-way, outbound street of data without much in the way of physical safety concerns for operators. Those end user engineers and operators tasked with increasing uptime, limiting unplanned downtime, and improving OEE immediately saw value, and continue to see value.

But with safety fears allayed, the focus swiftly changed to security—data pushed out of the facility’s four walls is less safe, and anything coming back in isn’t to be trusted at all. Of course, data could stay in-network, allowing IT folks at least some buy-in. But now that the remote monitoring toothpaste is out of the tube, and the benefits are apparent, opportunity-seeking OEMs are demonstrating their capability with a full complement of remote capabilities—ongoing remote monitoring, in-bound remote troubleshooting, even potential e-commerce and part ordering. It’s making end-user IT departments uncomfortable.

What’s not to love?
“It doesn’t take much effort to turn up plenty of stories about how improper use of network layering can cause catastrophic results,” says Rick Rice, application engineer, Crest Foods, Ashton, Ill. “While I had my own reservations about opening our actual packaging equipment to the risk of cyber intrusions, our IT department had major concerns. With any attempt to connect our assets to higher level communications, there is a fear of outside parties gaining access your critical operations.”

For all the potential upside that remote access or monitoring may hold for machine operators and their OEMs, it’s the opposite for the IT warriors charged with defending their company’s network turf. For them, there is no upside.

But that’s not to say that end users don’t see the potential. They understand the theoretical value of remote monitoring, diagnostics, access, maintenance, and improvements to facilitate uptime. The problem is that there are a lot of different ways to skin the remote access cat, and so many colloquial ways to describe the technology, that it becomes complex. Add to that the many different voices within the CPG community that are championing or objecting to each potential methodology.

It’s up to OEMs to clearly articulate, in a common language, the type of remote access that they propose, and how they plan to accomplish it.

Personas, transparency, and indemnity
OEMs that have successfully made their case recommend getting all stakeholders into the same room to lay bare the spectrum of potential positive to potential negative consequences. In this environment, an OEM should be able to demonstrate that it’s not a matter of equal but opposite forces. The good can, in fact, outweigh the bad.

According to Dr. Mohan Sawhny, the McCormick Foundation Chair of Technology at Northwestern University’s Kellogg School of Management, understanding the different personas involved is key to encouraging adoption of any technology, and remote access is no different. The globally recognized expert in business innovation and disruptive technology sketched a mental template of four stakeholders at the CPG/brand owner level whom remote might affect.

One might be a maintenance engineer responsible for mitigating downtime. Another might be a shift operator, responsible for actual production. A third would be an IT person, responsible for security and integration of the shop floor to the top floor. A fourth persona might be the sales person.

“You must understand what motivates each of these players, what they stand to gain, what their KPIs and biases are, and where they line up on a continuum of active support to active opposition to a new technology,” Sawhny says.

In this case, the ratio of support to opposition might be three to one. The IT persona, with his “do no harm” mentality, is not paid in the potential upside, but in protecting against possible downside.

“The second thing is that the actual risks need to be quantified and weighed against potential good, because the perception of risk often exceeds the actual risk,” he says. “And on the flip side, you should be able to quantify the benefits of reduced downtime and reduced maintenance, to make the economics more transparent. That can be very compelling.”

Another approach that Sawhny suggests is indemnification, a known dirty word among OEMs. But he points to the consumer world and the rise of Hyundai, with its 10-year, 100,000-mile warranty, as an example of it working. If OEM security protocols are up to the task, then some sort of risk-sharing program could go a long way, according to Sawhny.

Early adopters
Larger companies are known to be hesitant to be offloading their production and equipment data to outside servers and to open it up on the internet. In many cases, the dictate is that information isn’t leaving the four walls, and if it absolutely must leave, it will be on their network. Meanwhile, some smaller, more agile companies, often with smaller IT departments and less red tape to clear, have taken advantage of what’s available.

One such early adopter end user is Barrie House Coffee, Elmsford, N.Y. The full-line coffee and tea business worked with Israeli OEM Pack Line, Ltd. to develop a packing system around a patented new coffee capsule format. The line incorporates Canadian OEM Nuspark’s secondary and tertiary packaging systems and All-Fill Inc. auger fillers.

 “We’ve given them 100 percent access to all the cameras in the production areas,” says Shay Zohar, Barrie House director of sales and marketing. “They have full access into software, they see our workflow, our work volume, our efficiency, our alarms. Everything we have is fed live to them. By our sharing information this way they can really understand what’s happening on their machines. Only by seeing it in real time can they have this kind of deep understanding. It’s an approach that allowed all of us to do amazing things.”

A big part of the real-time visibility he speaks of is delivered by an industrial M2M router and data gateway from eWON called Flexy. All connections run through industry standard VPN protocols to guarantee a safe and secure connection that prevents network intrusions. OPC UA technology offers interoperability between platforms from multiple vendors and enables new machines, as well as legacy PLCs for IoT integration.

List: Digitalization Companies From PACK EXPO
Looking for CPG-focused digital transformation solutions? Download our editor-curated list from PACK EXPO featuring top companies offering warehouse management, ERP, digital twin, and MES software with supply chain visibility and analytics capabilities—all tailored specifically for CPG operations.
Download Now
List: Digitalization Companies From PACK EXPO