Remote - Spring 2014 - (Page 30)

Industry News M2M Revenues Opportunities Will More Than Double Over the Next Five Years Although M2M technology is a bright spot in the rapidly maturing mobile industry, operators will not realize its full potential without strategic partnering, says Ovum Research. Forecasts from the global analyst firm show that over the next five years, M2M revenues will grow to reach $44.8 billion, with more than a third coming from Asia-Pacific. Forecasts from Ovum reveal that revenues will grow slightly more slowly than connections, reflecting the increasing competitiveness of the market and the extension of M2M into lower-value applications. Total global M2M connections will more than double from 106.4 million in 2012 to 360.9 million in 2018, at a CAGR of 22.6 percent. There will be growth across all regions, but it will be fastest in Asia-Pacific and the Middle East and Africa. Revenues in Asia-Pacific will grow to almost $15 billion, at a CAGR of 26.5 percent, between 2012 and 2018. The most important industry verticals in 2018 will be healthcare, manufacturing, and energy & utilities, which are forecast to generate revenues of $7.9 billion, $7.1 billion, and $7.0 billion respectively by 2018. "This is not a forecast of the 'Internet of Things' but rather of managed and paid-for connections over public mobile networks, "said Jeremy Green, Principal, analyst, Industry Communications and Broadband at Ovum. "For telcos there are really two opportunities: to stand back and provide the connectivity for M2M services, or to roll up their sleeves and get involved with the end-to-end provision of solutions." The first is a smaller opportunity but is much more straightforward for telcos to address, according to Ovum. The second is much bigger, but involves new skills and competencies, and defining new kinds of relationship with systems integrators (SIs) and software development. ISA Introduces Cyber Security Certificate Program Based On its ISA99/IEC 62443 Series of Standards The International Society of Automation (ISA) has developed a knowledge-based industrial cybersecurity certificate program. Through the work of the ISA Committee on Security for Industrial Automation & Control Systems (ISA99), ISA has developed the ANSI/ISA99, Industrial Automation and Control Systems Security standards (known internationally as ISA99/IEC 62443). ISA's new certificate program, the ISA99/IEC 62443 Cybersecurity Fundamentals Specialist Certificate, is designed to help professionals involved in IT and control systems security improve their understanding of ISA99/ IEC 62443 principles and acquire a command of industrial cyber security terminology. Developed by a cross-section of international cyber security subject-matter experts, the series of ISA99/IEC 62443 standards apply to all key industry sectors and critical infrastructure, providing the flexibility to address and mitigate current and future vulnerabilities in industrial automation and control systems. The ISA99/IEC 62443 Cybersecurity Fundamentals Specialist Certificate will be awarded to those who successfully complete a designated, twoday ISA classroom training course, Using the ANSI/ISA99 (IEC 62443) Standards to Secure Your Industrial Control System (IC32), and pass a 75-question, multiple-choice exam. While there are no required prerequisites to register for the certificate program and an application is not required to take the exam, it is helpful if interested professionals possess at least three to five years of experience in the IT cyber security field, with at least two of those years in a process control engineering environment in an industrial setting. Because the ISA99/IEC 62443 Cybersecurity Fundamentals Certificate Program is a certificate and not a certification, certificate holders are not required to renew the ISA99/IEC 62443 Certificate.However, once obtained, the certificate will only be considered current for three years. After the three-year expiration date, a certificate holder will no longer be able to claim that he or she holds a current/active ISA99/IEC 62443 certificate. In order to extend the current status of an expired certificate, a certificate holder must register for and take the related ISA99/IEC 62443 Certificate Knowledge Review. 30 www.RemoteMagazine.com Critical Infrastructure Helps Stabilize Perimeter Security Industry Although most critical infrastructure sites are target applications for electronic perimeter security, electrical utilities and oil refineries are projected to have the most growth opportunity. The global market size for electronic perimeter security sensors and video in electrical utilities and oil refineries is forecast to top $160 million in 2014. Electrical utilities have experienced strong growth despite the economic slowdown in 2011 and 2012. Part of this growth is resulting from the trend to use remote video and networked sensors in order to configure and maintain sensors from remote locations. For example, there has been demand to integrate video with detection sensors and network these back to a central monitoring station. This has helped increase demand for applications and locations where sensors couldn't be monitored in the past. Another driver is the updates to the NERC CIP standards which are mostly concerned with cyber security and classifying / identifying critical assets, which could lead to a change in the security requirements for transmission substations. For example, NERC CIP Version 4 states any substation that maintains transmission lines at a capacity of 500 kv or higher are now considered a critical asset. Solar power plants, oil refineries and LNG plants are also expected to be strong markets to sell perimeter security equipment. The capacity of solar power is expected to increase dramatically, especially in the Americas. This will increase the demand for remote sensors as well as sensors which can cover long distances cost effectively, namely fiber optic cables. As of October 2013, the US was on pace to top Russia as the world's largest producer of oil and natural gas. This presents a good opportunities for thermal imaging, ground based radar, VCA and fence sensors. Moreover, from 2013 through 2017, globally more than 200 oil refineries are planned for construction. Overall, critical infrastructure sites are projected to be the fastest growing end-user applications for electronic perimeter security because of the strong construction growth, regulations and more advanced security sensors and solutions which allow for proper surveillance, maintenance and configuration of the sensors. While these factors impact the short term, the future outlook will reside with new technology developments and changes to end-user demand. Berg Insight Says Europe Risks Failing to Meet 2020 Smart Metering Targets According to a report from the research firm Berg Insight, Europe is likely to fail in meeting the target of covering 80 percent of the electricity customers with smart meters by 2020. Germany's decision not to deploy smart meters and delays in the rollouts in a number of countries including France will result in a penetration rate in the range of 60 to 70 percent by the end of this decade. While lower than anticipated when the EU first announced its energy efficiency goals for the 2010s, the rate of adoption is nevertheless impressive. Berg Insight forecasts that the installed base of smart electricity meters will grow at a compound annual growth rate of 18.5 percent in the next six years from 61.5 million units at the end of 2013 to 170.1 million units in 2019. "Until 2019, more than 100 million European households are set to receive intelligent metering devices, capable of communicating with smart grids", says Tobias Ryberg, Senior Analyst and author of the report. Berg Insight's projections are based on the current official timeframe for smart meter rollouts in the EU member states. However, a significant risk that some of the projects will be further delayed. The process of defining functional and technical requirements for the new solution in a manner that satisfies the various stakeholders involved has many potential pitfalls, ranging from technical issues to financing and public opinion outbreaks. Smart meters are easily perceived by consumers as driving costs and potentially threatening privacy. Berg Insight believes that the best approach for addressing these issues is for the governments to step in and establish independent platforms for smart metering, as well as other smart grid applications, which are trusted, neutral and jointly financed by the stakeholders for whom they create benefits. http://www.RemoteMagazine.com

Table of Contents for the Digital Edition of Remote - Spring 2014

Editor's Choice
Top 10 Security Tech Trends for 2014
Facility Realities: An Inevitable Trend - Centralized Facility Management (CFM)
Unified Push-to-Talk: The Future of Remote Site Communications
Using PAS 55 to Manage Oil & Gas Assets
Wireless Field Area Communication Networks for Digital Oil & Gas Fields
100 Tunnels Under Control
Unique Spacer Cable System Powers Renewable Energy Plant Pipeline
Internet of Things North America
SCADA
Networking
Security
Onsite Power
Industry News

Remote - Spring 2014

https://www.nxtbook.com/nxtbooks/webcom/remote_2016winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2016fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2016
https://www.nxtbook.com/nxtbooks/webcom/remote_2016spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2015fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2015m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2015spring
https://www.nxtbook.com/nxtbooks/webcom/remote_industrialnetworking2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2014fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2014m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2014spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2013winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2013m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2013fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2013summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2013spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2012winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2012m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2012fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2012summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2012scada
https://www.nxtbook.com/nxtbooks/webcom/remote_2012spring
https://www.nxtbook.com/nxtbooks/webcom/remote_201112
https://www.nxtbook.com/nxtbooks/webcom/remote_201110
https://www.nxtbook.com/nxtbooks/webcom/remote_201108
https://www.nxtbookmedia.com