Remote - Spring 2014 - (Page 30)
Industry News
M2M Revenues Opportunities Will More Than Double
Over the Next Five Years
Although M2M technology is a bright spot in the rapidly maturing
mobile industry, operators will not realize its full potential without strategic
partnering, says Ovum Research. Forecasts from the global analyst firm
show that over the next five years, M2M revenues will grow to reach $44.8
billion, with more than a third coming from Asia-Pacific.
Forecasts from Ovum reveal that revenues will grow slightly more slowly than connections, reflecting the increasing competitiveness of the market
and the extension of M2M into lower-value applications. Total global M2M
connections will more than double from 106.4 million in 2012 to 360.9
million in 2018, at a CAGR of 22.6 percent. There will be growth across all
regions, but it will be fastest in Asia-Pacific and the Middle East and Africa.
Revenues in Asia-Pacific will grow to almost $15 billion, at a CAGR of
26.5 percent, between 2012 and 2018. The most important industry verticals
in 2018 will be healthcare, manufacturing, and energy & utilities, which are
forecast to generate revenues of $7.9 billion, $7.1 billion, and $7.0 billion
respectively by 2018.
"This is not a forecast of the 'Internet of Things' but rather of managed
and paid-for connections over public mobile networks, "said Jeremy Green,
Principal, analyst, Industry Communications and Broadband at Ovum. "For
telcos there are really two opportunities: to stand back and provide the connectivity for M2M services, or to roll up their sleeves and get involved with
the end-to-end provision of solutions."
The first is a smaller opportunity but is much more straightforward for
telcos to address, according to Ovum. The second is much bigger, but involves new skills and competencies, and defining new kinds of relationship
with systems integrators (SIs) and software development.
ISA Introduces Cyber Security Certificate Program Based
On its ISA99/IEC 62443 Series of Standards
The International Society of Automation (ISA) has developed a
knowledge-based industrial cybersecurity certificate program. Through
the work of the ISA Committee on Security for Industrial Automation &
Control Systems (ISA99), ISA has developed the ANSI/ISA99, Industrial
Automation and Control Systems Security standards (known internationally
as ISA99/IEC 62443).
ISA's new certificate program, the ISA99/IEC 62443 Cybersecurity Fundamentals Specialist Certificate, is designed to help professionals involved
in IT and control systems security improve their understanding of ISA99/
IEC 62443 principles and acquire a command of industrial cyber security
terminology. Developed by a cross-section of international cyber security
subject-matter experts, the series of ISA99/IEC 62443 standards apply to all
key industry sectors and critical infrastructure, providing the flexibility to
address and mitigate current and future vulnerabilities in industrial automation and control systems.
The ISA99/IEC 62443 Cybersecurity Fundamentals Specialist Certificate will be awarded to those who successfully complete a designated, twoday ISA classroom training course, Using the ANSI/ISA99 (IEC 62443)
Standards to Secure Your Industrial Control System (IC32), and pass a
75-question, multiple-choice exam.
While there are no required prerequisites to register for the certificate
program and an application is not required to take the exam, it is helpful
if interested professionals possess at least three to five years of experience
in the IT cyber security field, with at least two of those years in a process
control engineering environment in an industrial setting.
Because the ISA99/IEC 62443 Cybersecurity Fundamentals Certificate
Program is a certificate and not a certification, certificate holders are not
required to renew the ISA99/IEC 62443 Certificate.However, once obtained, the certificate will only be considered current for three years. After
the three-year expiration date, a certificate holder will no longer be able
to claim that he or she holds a current/active ISA99/IEC 62443 certificate.
In order to extend the current status of an expired certificate, a certificate
holder must register for and take the related ISA99/IEC 62443 Certificate
Knowledge Review.
30
www.RemoteMagazine.com
Critical Infrastructure Helps Stabilize Perimeter
Security Industry
Although most critical infrastructure sites are target applications for
electronic perimeter security, electrical utilities and oil refineries are
projected to have the most growth opportunity. The global market size for
electronic perimeter security sensors and video in electrical utilities and oil
refineries is forecast to top $160 million in 2014.
Electrical utilities have experienced strong growth despite the economic
slowdown in 2011 and 2012. Part of this growth is resulting from the trend
to use remote video and networked sensors in order to configure and maintain sensors from remote locations. For example, there has been demand to
integrate video with detection sensors and network these back to a central
monitoring station. This has helped increase demand for applications and
locations where sensors couldn't be monitored in the past.
Another driver is the updates to the NERC CIP standards which are
mostly concerned with cyber security and classifying / identifying critical
assets, which could lead to a change in the security requirements for transmission substations. For example, NERC CIP Version 4 states any substation that maintains transmission lines at a capacity of 500 kv or higher are
now considered a critical asset.
Solar power plants, oil refineries and LNG plants are also expected to
be strong markets to sell perimeter security equipment. The capacity of
solar power is expected to increase dramatically, especially in the Americas.
This will increase the demand for remote sensors as well as sensors which
can cover long distances cost effectively, namely fiber optic cables. As
of October 2013, the US was on pace to top Russia as the world's largest producer of oil and natural gas. This presents a good opportunities for
thermal imaging, ground based radar, VCA and fence sensors. Moreover,
from 2013 through 2017, globally more than 200 oil refineries are planned
for construction.
Overall, critical infrastructure sites are projected to be the fastest
growing end-user applications for electronic perimeter security because of
the strong construction growth, regulations and more advanced security
sensors and solutions which allow for proper surveillance, maintenance and
configuration of the sensors. While these factors impact the short term, the
future outlook will reside with new technology developments and changes
to end-user demand.
Berg Insight Says Europe Risks Failing to Meet 2020 Smart
Metering Targets
According to a report from the research firm Berg Insight, Europe is
likely to fail in meeting the target of covering 80 percent of the electricity
customers with smart meters by 2020. Germany's decision not to deploy
smart meters and delays in the rollouts in a number of countries including
France will result in a penetration rate in the range of 60 to 70 percent by
the end of this decade.
While lower than anticipated when the EU first announced its energy efficiency goals for the 2010s, the rate of adoption is nevertheless impressive.
Berg Insight forecasts that the installed base of smart electricity meters will
grow at a compound annual growth rate of 18.5 percent in the next six years
from 61.5 million units at the end of 2013 to 170.1 million units in 2019.
"Until 2019, more than 100 million European households are set to
receive intelligent metering devices, capable of communicating with smart
grids", says Tobias Ryberg, Senior Analyst and author of the report.
Berg Insight's projections are based on the current official timeframe for
smart meter rollouts in the EU member states. However, a significant risk
that some of the projects will be further delayed. The process of defining
functional and technical requirements for the new solution in a manner that
satisfies the various stakeholders involved has many potential pitfalls, ranging from technical issues to financing and public opinion outbreaks.
Smart meters are easily perceived by consumers as driving costs and
potentially threatening privacy. Berg Insight believes that the best approach
for addressing these issues is for the governments to step in and establish
independent platforms for smart metering, as well as other smart grid applications, which are trusted, neutral and jointly financed by the stakeholders
for whom they create benefits.
http://www.RemoteMagazine.com
Table of Contents for the Digital Edition of Remote - Spring 2014
Editor's Choice
Top 10 Security Tech Trends for 2014
Facility Realities: An Inevitable Trend - Centralized Facility Management (CFM)
Unified Push-to-Talk: The Future of Remote Site Communications
Using PAS 55 to Manage Oil & Gas Assets
Wireless Field Area Communication Networks for Digital Oil & Gas Fields
100 Tunnels Under Control
Unique Spacer Cable System Powers Renewable Energy Plant Pipeline
Internet of Things North America
SCADA
Networking
Security
Onsite Power
Industry News
Remote - Spring 2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2016winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2016fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2016
https://www.nxtbook.com/nxtbooks/webcom/remote_2016spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2015fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2015m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2015spring
https://www.nxtbook.com/nxtbooks/webcom/remote_industrialnetworking2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2014fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2014m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2014spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2013winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2013m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2013fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2013summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2013spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2012winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2012m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2012fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2012summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2012scada
https://www.nxtbook.com/nxtbooks/webcom/remote_2012spring
https://www.nxtbook.com/nxtbooks/webcom/remote_201112
https://www.nxtbook.com/nxtbooks/webcom/remote_201110
https://www.nxtbook.com/nxtbooks/webcom/remote_201108
https://www.nxtbookmedia.com