New Tools Optimise Use Of Existing Data

Several sectors, including oil and gas, broadcast, transportation, power and process, are under pressure to make operations more efficient, but often their ageing IT systems are halting progress. With budget constraints, meaning the replacement of all legacy systems is not an option, advances in cloud-based analytics tools are providing cost-effective operational enhancements in areas like alarm systems.

Technology provider Ovarro is working in partnership with several companies across a range of sectors to develop software tools that enables them to gain clearer insights into what is happening in their processes and internal networks.

Cloud-based applications are providing opportunities for more resilient and flexible network management options, enabling them to make better use of existing data, writes Alan Cunningham, subject matter expert at Ovarro. In many cases the new tools are using data that has already been captured, but has not been streamlined or managed effectively. 

“A lot of our clients talk about being data rich, information poor,” explains Alan Cunningham. “They’re collecting vast amounts of data out in the field from various devices, such as remote terminal units, but they do not have the tools to allow them to see the wood for the trees.

If they can better use what is already being collected, they will be able to manage their operations far more efficiently without the expenditure of replacing legacy assets.

 “A supplier could launch a fantastic piece of technology, but if a customer needs to invest heavily in Capex products to see the benefits it might not be a big seller. If they can take information that already exists and see historical patterns, it becomes more powerful.”according to Cunningham

One example of this is AlarmVision, a software-as-a-service (SaaS) application that presents real-time dashboards, which analyses the stream of alarms coming into a company’s control room from its telemetry system.

SaaS applications are cloud-based and can be accessed via any device with an internet connection, as opposed to a software product that is entirely installed on a device or network.

AlarmVision dashboards give a measure of control over alarms, based on internationally recognised key performance indicators, and allow action to be taken to help operators maintain or gain control. The ability to gain real-time, or backwards-looking, analysis of how the control room is operating against the standards provides an insight into whether there is a risk of critical alarms being missed.

Users can also identify the root cause of the largest proportion of alarms being generated on their system – for example, a faulty piece of equipment could be causing 10 per cent of total alarms on a given day. For instances like this, it gives companies and municipalities insight to action and prioritise resources. However, missing any of these alarms, because they are swamped by the nuisance alarms, could be catastrophic for customers, the environment and the company. In fact, in the worst-case scenario, this could also lead to penalties or even prosecutions which must be avoided.

If these insights, provided by AlarmVision, have enabled a control room to act on the network to reduce the noise, the nuisance alarms, they are far less likely to miss the most important alerts. And when the noise goes quiet, there is a chance to see what is real versus what is nuisance.

Looking ahead, Ovarro’s next-generation analytics tools are also being designed as SaaS programmes to reduce customer costs in configuration, maintenance, support and upgrade. While additional functionalities are currently being developed to add to AlarmVision, Ovarro’s end goal is to completely remove alarms from the equation.

Ovarro wants to enable companies to be fully predictive and to be looking at how an alarm can be predicted before it becomes an alarm, moving companies from a reactive model to a proactive model.This is where Ovarro wants to take its alarm management system, as this is the direction the oil and gas, broadcast, transportation, power and process sectors need to be moving in.

Ovarro

You Might Also Read:

TeamViewer Remote Control App Gets A Security Upgrade:

 

« 2021 Global Cyber Security Event
Home Working Creates More Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XenArmor

XenArmor

XenArmor products include NetCertScanner, an enterprise software to scan & manage expired SSL Certificates on your local network or internet.

Hewlett Packard Enterprise (HPE)

Hewlett Packard Enterprise (HPE)

HPE is an information technology company focused on Enterprise networking, Services and Support.

Data Security Council of India (DSCI)

Data Security Council of India (DSCI)

DSCI is a premier industry body on cyber security and data protection in India, committed to making the cyberspace safe, secure and trusted.

Swiss Re

Swiss Re

Swiss Re Group is a leading wholesale provider of reinsurance, insurance and other insurance-based forms of risk transfer including cyber risk.

CyberInt

CyberInt

CyberInt’s Managed Detection and Response services span globally and include some of the top finance, retail and telecommunication organizations.

Digital Hands

Digital Hands

Digital Hands is an award-winning managed security services provider.

IAC

IAC

IAC is a specialist Irecruitment consultancy covering Internal Audit, Risk, Controls, Governance, IT Audit, and Cyber Security roles.

Penningtons Manches Cooper

Penningtons Manches Cooper

Penningtons Manches Cooper is a leading UK law firm providing high quality legal advice in areas including Data Protection, Cyber Security and Cyber Crime.

Jazz Networks

Jazz Networks

Jazz Networks provides user behavior analytics (UBA UEBA) and data loss prevention (DLP) cybersecurity software to prevent the insider threat.

Consistec Engineering & Consulting

Consistec Engineering & Consulting

Consistec Engineering & Consulting GmbH is an information technology and services company offering solutions for monitoring the security of IT and OT infrastructure.

SecureStream Technologies

SecureStream Technologies

SecureStream Technologies have built the IoT SafetyNet - the Network Security Analytics platform to Eliminate Security Threats, Guarantee Privacy, Ensure Compliance, Simply & Easily.

Persona

Persona

At Persona, we’re humanizing online identity by helping companies verify that their users are who they say they are.

Topsec Cloud Solutions

Topsec Cloud Solutions

The Topsec Managed Email Security Platform eliminates Spam, Viruses, Malware, and Phishing.

LayerX Security

LayerX Security

LayerX's user-first browser security platform turns any browser into the most protected & manageable workspace, by providing real-time monitoring and governance over users’ activities on the web.

Schillings

Schillings

Shillings defends your rights to privacy, reuptation and security. We fight passionately against breaches of your privacy, attacks on your reputation and threats to your security.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.