entrez dans l'usine du futur
TRANSCRIPT
Vendredi 2 juin 2017
Evénement Cisco pour l’Industrie 4.0
“Entrez dans l’usine du futur”
#IoTforBusiness @CiscoFrance
Head of IoT – Cisco France02/06/2017
Agenda & Introduction
Fabien MEDAT @fmedat
#IoTforBusiness @CiscoFrance
“Entrez dans l’usine du futur”
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Agenda • 09h00 – 09h15 : Introduction
• 09h15 – 09h45 : Démonstration live : qu’est-ce qu’une usine connectée ?
• 09h45 – 10h15 : Prendre de meilleures décisions grâce à l’IoT industriel
• 10h15 – 10h30 : Pause networking
• 10h30 – 11h00 : Eliminer les temps d’interruption grâce à la maintenance prédictive
• 11h00 – 11h45 : Cybersécurité & Industrie 4.0
• 11h45 – 12h15 : Collaboration BEL & CISCO : Mise en place d’un pilote autour de l’usine d’Evron, dans un environnement multi-constructeurs
• 12h15 – 12h30 : Conclusion
• 12h30 : Cocktail déjeunatoire
Ce matin, partagez votre expérience sur Twitter
#IoTforBusiness @CiscoFrance
Invisible Things and Devices
Siloed OT and IT
Unsecured Access
INDUSTRIAL DATA CENTER
IT
THINGS AND DEVICES
ERP/MRP
LOB
EDGE
OPEN ANALYTICS
USERS
CLOUD
SUPPLY CHAIN
Old Factory ModelSiloed, Slow, Unsecure, Expensive, and Complex
Changing Trends Are Driving Changing Priorities
How canI better
manage my
globalsupplychain?
How can Ireduce
downtime?
I need toimprove
productquality
How do Iimprove
workforceproductivity?
How caninnovation
drive profits?
I need to achieve
real-time visibility
How can Iintroduce
new products faster?
What IoT Technologies Support Digital Manufacturing?
77%
Data
Analytics
69%
Factory
Automation
67%
Connectivity
Technologies
55%
Mobile
Devices
53%
Location
Technology
Source: SCM World/Cisco “Smart Manufacturing & the Internet of Things 2015” survey of 418
Manufacturing Business Line Executives and Plant Managers across 17 vertical industries.
Reduction in
Defects
49%Defect rate
down from
4.9%
to 2.5%
Reduced
Downtime
48%Unplanned
downtime down
from 11%
to 5.8%
OEE
Improvement
16%Average OEE
improved
from
74% to 86%
Improved
Inventory
35%Inventory
turns increased
from
14 to 19
Reduction in
Energy Use
18%Annual energy
cost down from
$8.4M
to $6.9M
The Real Economic Value is Immense
New Product
Introduction
23%New product
introduction cycle
time reduced from
15 to 11
Source: SCM World/Cisco “Smart Manufacturing & the Internet of Things 2015” survey of 418
Manufacturing Business Line Executives and Plant Managers across 17 vertical industries.
Digital Manufacturing Driving Business Outcomes
http://www.infodsi.com/articles/169017/usines-
intelligentes-contribueront-500-milliards-dollars-
economie-mondiale-cours-cinq-prochaines-annees.html
A Digital Factory CoreTap into the Power of Data with Cisco
itIT OT
Turn Data Into InsightsOrchestrate &
Manage Data Flow
Manage Intelligent Edge
Protect with End to End Security
Connect with Industrial Infrastructure
Turn Insights into Action with Collaboration
Digital Manufacturing Challenges & Cisco Solutions
Siloed Networks
Data Overload
Need to automate extraction of insights and resulting actions
Complex Integration
Expanded Security Vulnerability
Business
Processes
Manage Data
from Edge to Cloud
End-to-End Security
Unified Connectivity
Analytics
and Applications
Purpose-built, simply
managed network
Network as an Enforcer
Compute from Fog
to Cloud
Edge & Cloud-based
Visibility
Validated Designs
Partner Eco-System
+
Experience coordinator02/06/2017
Démonstration live
Qu’est-ce qu’une usine connectée ?
Craig TRANTER @c_tranter
#IoTforBusiness @CiscoFrance
Manufacturing advisor - Cisco02/06/2017
Prendre de meilleures décisionsgrâce à l’IIoT
Pierre GUILLEMAUD
#IoTforBusiness @CiscoFrance
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Manufacturing Digital Business Imperatives. . . where manufacturers are focusing today
Protect and Enhance Brand Value
Drive Operational Excellence and
Productivity
Global and Collaborative Product Development
Accelerate Development
and Scale of New Products and Services
Real time data exchange
Paperless
Augmented reality
Integrated ManufacturingSupply Chain
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
What’s On Your Plant Manager’s Mind?
• Accelerate time to Volume or Project Completion
• Manage Volume and Variability (Supply Chain)
• Reduce Downtime
• Reduce Shrinkage ?
• Improve Scheduling & Capacity utilization
• Manage OEE
• Improve Safety & Auditability
• Comply with legislation
• Guarantee Security
Typical Manufacturing Challenges
NPI & Re-tooling CyclesAssembly tooling is fixed & hardwiredProduction line optimization and sizing painful
Un-Planned outageRobot
Machine
Material Logistics and PlanningLocation based servicesMaterial flow for production
Total QualityCasting issues found in maching
re-call resolution is poor re-work is costly
Fabrication & MachineNo visibility
No OptimizationNo Efficiency
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
ConnectedMachines
FactoryNetwork
FactoryWireless
Analytics & Big Data
Collaboration
Security
FactoryCompute
Compute & Virtualization
Connected Factory Solutions
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
of the Digitization potential
Value at Stake can be driven
by improvements in
Manufacturing
35%398
94
142
87
123
107 19 14
0
150
300
450
600
Sm
art
Manufa
ctu
ring
Supply
Chain
Em
plo
yee
Pro
ductivity
Pro
duct
Develo
pm
ent
Security
& S
afe
tyand A
sset
utiliz
ation
IT T
CO
IoE
Investm
ent
Tota
l
Contr
ibution to E
BIT
(€
mn)
Source: Cisco Consulting Practice
• Lower Waste and Rework Costs €59M
• Higher Yield of Raw Materials €28M
• Energy Consumption Savings €5M
• Lower Unplanned Downtime €50M
Smart Manufacturing sources of €142M value:
Capturing New Value Potential from DigitizationBack of the Envelope & Outside-In Estimate for a Manufacturer
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
“ Data is the Value ”
“ Network is the Platform ”
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Manufacturing Digitization Across the Value Chain
Connected R&D
Connected factory
Connected customer
Connected products providing innovate insights
Global, virtual, 3D, collaborative
Plant-floor platform providing converged connectivity
Advanced capabilities to streamline process
Visibility enabling informed and fast decision making
Security to enable traceability and confidence
Intelligent customer care through connected products
Empowered sales to reach the right customer at right time
Protect and enhance brand value
Drive operational excellence and productivity
Global and collaborative product development
Accelerate development and scale of new products and services
Connectedassets Connected
Supply Chain
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Manufacturing: Digital Paperless Factory IT intensive, top-down !
Capteurs
A
EERP
ManufacturingExecutionSystem
Automation, PLCs
I/Os, Sensors
Historian
TMS
QMS
BPLM
Cloud
CAMS
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Invisible Things and Devices
Old ModelSiloed, Slow, Unsecure, Expensive, and Complex
OPEN
ANALYTICS
USERS
INDUSTRIAL
DATA CENTER
IT
EDGE
LOB
THINGS AND
DEVICES
SiloedOT and IT
CLOUD
Unsecured Access
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Enable IoT:Thing to User
Machine/User Collaboration (Spark)• Data to action with m-to-p • Instantly connect right teams and remote
experts
Intelligence at Edge (IOX)Network as computer and security device
High Density Wireless• OT things that move• Location services• In plant communications
Remotely Manage Data Fabric • Remotely install, update, manage IoT gateways & apps• Secure, high speed, flexible data pipe (multi-hop) • Interoperability layer & connectors
Dashboards to monitor assets & plants (CAM) • Monitor and track
sensors, things, machines, people
• Two-way policy/control
Virtualized Compute• Plant server room• Plant floor workstations• Cloud (Hadoop etc…)
Securely connect horizontally & vertically (Connected Factory)• Best in class OT and IT connectivity• Inbuilt security, identity, & access control• Threat monitoring & deep packet inspection
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IoT Value Chain and Cisco’s Role
Networking
Layer
Dashboards
&
Application
Enablement
Operational
Applications
Secure IP Fabric
Protocol Normalization & Edge Processing (IOx)
Ethernet Wi-Fi LoRaMesh(Wi-Fi & 6LoPAN)
Serial (CAN, USB,
Modbus)
3G/LTE
DNA-Center, Prime
Infrastructure
IndustrySpecific:
INDFND
Established: Amazon, Microsoft Azure, IBM, GE, PTCStart-ups: Davra, Relayr, Fog Horn, Telit, PubNub
CAM (Cisco Assets Mngt)
Data Delivery
Itron, Rockwell, Siemens, Emerson, Honeywell, GE, Oracle, ABB, SAP
Jasper Control Center
Things
IoT Ready
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
EtherNet/IP, Profinet
Real–Time Control (Profibus DP, PA, Foundation Fieldbus)
Fast Convergence
Traffic Segmentation and Management
Ease of Use
Site Operations and Control
Multi-Service Networks
Network and Security Management
Routing
Application and Data share
Access Control
Threat Protection
Enterprise/IT Integration
Collaboration
Wireless
Application Optimization
Cell/Area ZoneLevels 0–2Layer 2 AccessField Bus
Production ZoneLevel 3Distribution and Core
Demilitarized Zone(DMZ) Firewalls
Enterprise NetworkLevels 4–5
Converged Plantwide Ethernet Architecture
Firewall(Active)
Firewall(Standby)
DCSMES
CiscoASA 5500
CiscoCatalyst Switch
Network Services
Cisco Catalyst6500/4500
Cisco Cat. 3750StackWiseSwitch Stack
Patch ManagementTerminal ServicesApplication MirrorAV Server
Cell/Area #1(Redundant Star Topology)
Drive
Controller
HMI Distributed I/O
Controller
DriveDrive
HMI
Distributed I/O
HMI
Cell/Area #2(Ring Topology)
Cell/Area #3(Linear Topology)
Cisco Layer 2 Access Switch
Controller
Web Apps DNS FTP
Internet
Gbps Link for Failover Detection
25© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
INTERNET OF THINGSINTERNET OF THINGS
APPLICATIONS
Fog Computing
Management and Automation
Network Connectivity
SecurityCyber and Physical
Data Analytics
Application Enablement
Platform
APPLICATIONS
CloudFog
The Cisco IoT System
Cisco Secure Ops Capabilities
Behavioral Intelligence
3rd Party Patching
Threat/Anomaly Detection
Secure Remote Access
Critical Asset Discovery &
Inventory
ProcessPeople Technology
Delivered and Managed by Cisco or Cisco+Customer or Partner
Digital Manufacturing Drives New Partnerships
Marketplace / EcosystemManufacturing IT
Business alignment
Security
Integration / Connectivity
Platform / Applications
Cloud ServicesA New Way of ThinkingFactory Services
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
101001001
Machine Cloud
001101001 00110100101011
Factory
Analytics
MES
QMS
LMS
RTLS
Historian
OEM X
OEM X Cloud
Service
Manufacturers Dilemma N - number of Proprietary Systems
B
B
001101
D
D
001101
C
C
001101
A
A
001101
5ME
FORCAM101001001
N# of API Level IntegrationHard coded IP AddressesN# of Data StructuresN# of Semantic structuresForensics extremely HardN# of Policy InterfacesNo Centralized data control & Gov
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
101001001
Machine Cloud
001101001 00110100101011
Factory
AnalyticsMES
QMS LMS
RTLS
Historian
OEM X
OEM X Cloud
Service
B
B
001101
D
D
001101
C
C
001101
A
A
001101
Central MessagingPolicy & GovernanceMachine Obscurity
Producer/ConsumerFine Grain ControlBoundry Control
NEW DATAMachine Data
Parametric DataProcess DataTooling DataEnergy Data
The answer is a Data Delivery Infrastructure provided by DDP Fog
Factory
Data Collector
Factory
Connected Machine ServicesLarge Factory Point of View
OEE
Analytics
MES
DNC Local
Applications
OEM 1
Cloud
OEM’s Innovate through
Software and Services
On top of Cisco IOT Platform
Manufactures get control of
their Data
Factory Controls
Data, Access, Security
• Centralized Data Collection
• One Platform
• Common Management
• Multi-tenant
• Common Data Model(MTConnect)
• Automation(Discovery & Provision) is Key
IOT Cloud
Distribution
Factory Control
Data control
Data Visualization
Management
Governance
OEM 2
Cloud
OEM 3
Cloud
Factory
Data Collector
Factory
Cisco IOT
Cloud
Distribution
Connected Machine ServicesOEM Point of View - Large Factory
OEM Cloud Service
Scaled, Automated, Secure
Data, Analysis, Insight
OEE
Analytics
MES
DNC Local
ApplicationsFactory Control
Data control
Data Visualization
Management
Governance
OEM Offers
Standard Digital Interface & Data
Model to the Factory
OEM
Clou
dPredictive
Digital MRO
Secure Access
Manufacturing Customer will
Use Factory Data Collector to
Control Data and support
multiple OEMs
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Need for DDP Fog (Factory Data Platform)
DNC
Factory ControlData controlData VisualizationManagementGovernance
OEE
Analytics
MES
Local Applications
Facto
ry Data
Colle
cto
r
Factory
Data Transformation• Analysis & Streaming analytics• Filtering & Reduction• Reporting / Dashboard• Protocol Translation
Data Storage• High Speed• Application Integration
ParstreamODBCJDBC
DDP Fog (EFF)
DDP Cloud Gateway
3rd PartyMicro -services
OEM X OEM Y OEM Z
Message Routing• GUI Based Control over data• Machine to Cloud, Data Base, Application• Fine Grain Pub/Sub w/ Topics• Reliable Message Delivery• Data Governance
Cloud Ready• Security• Data Path Automation• 3rd party micro-services• One touch to deploy• Management and Monitoring
IOX
UCS-C
DATA DATA
Fog NodeEdge Node
DATA
AnalyticsIoT Devices
IoT Devices Analytics
DATA
Distributed Analytics (For High Volume, Time Critical, Regulated Data)
Cloud Based Analytics (Low Volume, Non Perishable, Non Regulated)
Analytics Analytics
Distributed Real Time AnalyticsBring Analytics to the Data
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
IE4000 Switch Cisco Streaming Analytics
Software Inside
• Offshore; can’t get data to the cloud or network easily
• Mission critical decision processes
• Split second timing to improve operations
What to look for: Customer Situation
• 2-5 minute turnaround time for outage notification
• Lower operating costs
• Faster decision making, better analytics
Customer Goals
• Distinct industry approach
• Existing customer relationship/trust
• Ability to work with IBM for router to cloud approach was key
Why We Were choosen
Chevron
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Innovation Centre
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
• https://www.youtube.com/watch?v=XpkZQHiTClM
Large Aircraft Engines manufacturer
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Asset Management Use CasesAsset Utilization
• Track supply chain - parts in transit
• Inventory - Accuracy of receivables
• Retrieve misplaced components, subassemblies, etc.
• Locate missing tools, test harnesses, etc.
• Vehicle location for smarter dispatch
• Preventive maintenance alerts
• Proof of tool/jig calibration
Material Flow Efficiency
• Wireless restocking trigger E-Kanban
• Choke point recording
• The right supplies get to the right place
• In-line rework
• Bar Code replacement
Business Outcomes
Production throughput increase
Improved equipment utilization
Reduced scrap
Labor efficiency
“82% improvement in retrieval time results inincreased throughput, and “on time delivery” wasimproved 13%” – Ops Manager, Semiconductor
IoT& Digitisation
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Categories of Use Cases With
Attractive ROI(A) Track High Value Assets in Large Areas (B) Integrate to Business Processes To
Improve Efficiency
Heavy Equipment Manufacturer
• 5% improvement in cycle time
• 40% improvement in replenishment times
Track valuable subassemblies
Locate chassis for rework
Smart dispatching of tugs
Identify underutilized fork trucks
Locate forming dies & track utilization
Wireless read of work order instructions
Automate pull signals for restocking
Replace inefficient bar code scanning
Manage FIFO inventory requirements
Automate inventory accounting
Glass Manufacturer
• 65% reduction in scrap
• Increased throughput and decreased cycle time
RTLS Architecture
Open Ecosystem
Scalable
Infrastructure
Leverage Common
Wireless
Infrastructure
Track Any Wi-Fi
Device or Tag
Chokepoint
Integration
Applic
ations
and M
anagem
ent
Wirele
ss
Infr
astr
uctu
reD
evic
e
AccessPoint Access
Point
Access Point
Wireless LAN Controller
Mobility Services EngineEnterprise
NetworkCisco® Identity Services Engine (ISE)/ Cisco PrimeTM Network
Chokepoint
CAM 6.0 for RTLS
Partner Applications
Single Pane of
Glass for Cockpit
Dashboard
Challenge
Long Tire Assembly Search Times by Operators Increased Cycle Times, Decreased Labor Optimization, and Noncompliance with Production Schedules. High Scrap Rate Associated with Lost Carriers.
SolutionImplement LBS Solution to Track All Carriers in Real-time Using T2 Tags and Cisco Unified Wi-Fi network
Allow Material Handlers/Truckers and Managers to Search for Component by ID, Tread Number, Material Code (FIFO))
Business Outcomes
Continuous Real-time Visibility Across Entire Plant
20% Reduction of Breaker Component Tire Loss
Increase in tire machine utilization ensuring increased production and overall equipment efficiency (OEE)
Factory Wireless at Continental Tire
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Continental realize immediate gains with
Active Asset Tracking
“We are confident that this project will result in a high ROI, and that this technology will help us to boost production from 33,000 to 37,000 tires per day.”
Christian Matejicek, IT Manager,
Continental Tire
42
Documented customer results:• 6.8% throughput increase
• 13% on-time delivery improvement
• 40% cycle time reduction
• 65% scrap reduction
• 5% Takt time improvement
• 99% find rate (in first minute)
• Typical 6-month investment payback
AeroScout Confidential
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Flexible
Manufacturing
Digital Dashboard to
see entire value
chain
1faster production
(TAKT time)
11%Faster Reconfiguration
(2 Weeks 4 Hours)
20x
Unified
Network
HQ
Factory Workers
“What used to take hours or
days to triage and troubleshoot
problems now takes seconds.”
- David Gutshall,
Harley-Davidson Motor Company
1200 possible BTO
configurations
A new
motorcycle
produced
every
79seconds
Factory Network at Harley
Watch Video
Industry Insights Buyer Intelligence Solutions Overview Sales Resources Additional Resources
Network Wireless Security Connected Machines
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Yet in the IoT world, smooth sailing is rare
26%
of all surveyed companies are successful with their IoT Initiatives
Only…
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Among the most successful, key best practices emerge
Collaboration between IT and
the business
IoT expertise: internal & external
partnerships
Technology-focused culture
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Cisco’s Place in the Solution Stack - Partnerships
Ecosystem
IP Connectivity
Enablement
Wireless
1550 SeriesRuggedized Wireless AP
Embedded
5915 Embedded Services Router
Switching
IE 2000IE 3000CGS 2520
Routing
819CGR 1120
Video & Analytics
IPICS, VSM, Cameras
Field Networking
CGR 2010, NMS
Endpoint SW, CGR
Solution Archetypes: Rugged Plant Network, Field Area Network, Fleet Mgmt, Surveillance, Incident Response
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Business and IT Must Work Together
Must Come Together
…while being disrupted by digitization
Value drivers
Services
Resources
Asset utilization
Time to Market
Supply-Demand matching
Big data
analytics
IoT
Digital
Cloud
Cyber Security
Mobility &
Collaboration
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Pause networking
#IoTforBusiness @CiscoFrance
CEO – Tell Me Plus02/06/2017
Eliminer les temps d’interruptiongrâce à la maintenance prédictive
Benoît GOURDON @TellMePlus
#IoTforBusiness @CiscoFrance
Eliminer les temps d’interruption grâce à la
maintenance prédictiveBenoit Gourdon, CEO Tellmeplus
2
Vision
INDUSTRIAL
DATA
AI
AUTOMATION
AI
EVOLUTION
3
INDUSTRIAL
DATA
4
Industrial data
Format
Volume
Connectivity Real-time
Security
Privacy
5
AI EVOLUTION
6
AI Evolution
AI is moving at the edge/
inside the objects
AI followed
same evolution path
as IT & infrastructure
7
EMBEDDED AI
enable local decisions
even when network is down
8
Smart objects are
dumb
when not
connected
9
AI AUTOMATION
10
AI driving AI
Automating
existing manual process
is a
dead end
11
Automating AI
without seamless
deployment
is
useless
12
Vision
INDUSTRIAL
DATA
AI
AUTOMATION
AI
EVOLUTION
13
Solution
IoT PLATFORMFEATURE
ENGINEERING
META ACTIVE
MACHINE LEARNING
EMBEDDED AI
About Tellmeplus
15
Meta Active Machine Learning technology Paris &
Montpellier
R&D mathematicians
from CNRS3 Patents
2011 creation
FounderJM Cambot
21
Software
vendor
Predictive Analytics
2016 4,2M€ raised
CEOBenoit Gourdon
About us
SaaS predictive analytics platform
for augmented experts
to create automatically
AI-based prescriptive models
deploy seamlessly in the cloud / at the edge
Predictive Objects
For whom?
IoTPlatforms
Industrial Internet
CustomerIntelligence
6
18
Partners & Customers
Integrators
Technology
Customers’ references
19
Predictive Objects scope
Data collection
Data cleansing
Data preparation
ModelingPerformance monitoring
TELLMEPLUS
20
IoT
Applications
Business
Applications
Management
Edge / Fog
Processing
IOx IOx IOx
• Optimized hardware footprint
• No need for separate compute
machinery
• Integrated security
• Device communications
• Empowered edge
processing
• Reduced latency &
bandwidth cost
Edge / Fog
Processing
IOx
Data Center
Empowering the Edge
Compute inside
the network
POPOPOPO
POPO
PO
21
22
23
24
25
Copie d’ecran ready to deploy
26
27
28
Copie d’ecran Push
29
30
Use cases / Case studies
IIoT PlatformsUse Case
PRESCRIPTIVE MAINTENANCE
EMBEDDED INTELLIGENCE
PROCESS MANAGEMENT
Industrial InternetUse Cases
34
Process managementSemi-Conductors
Predict process qualityAll data (+ variables & exogenous)
Real-time prediction per entity
Identify defective die Optimized model for local identification
Identify defective die early stage
Actionable
prescriptionsExplain in business language, act &
fix
Predictive MaintenanceSmart TV
Predictive Objectsmake the Smart TV
intelligenteven when not connected
Prescriptive Maintenance
Enriched User Experience
Welcome in the
INTELLIGENCE OF
USAGE
36
Settings
1,000+ wind turbines
6 months-3 years of data history
50 to 200 sensors per wind turbine
15 min data collection intervals
100 Gb data
Initial results
Prediction 24/48h - more than 1 week ahead
Accuracy = 80%
“Equipment E will break down in 1 month”
“Because of reasons X, Y, Z… andweather”
“Operator, you need to replace part P”
“And these are the steps to replace it”
Predictive MaintenanceWind Turbines
37
Battery failures predictions• Battery voltage, lights on/off, driver’s behavior,
car model, mileage, GPS, …
• + exogenous data (seasonality, weather,…)
• 100Go
• 1000 cars
• Dataset 200 columns
• Sensors: seconds to minutes
Works even when network is not available!
Predictive MaintenanceCar Battery
38
Use cases – Automotive Xee
• Simple, easy to use
• Seamless deployment
• Designed for subject matter Experts
• Resilience, real-time, security
• Cost effective
• Intelligence as a service
Value Proposition
Automated Embedded
Artificial Intelligence
Architect for Manufacturing - Cisco02/06/2017
L’infrastructure au service de la cybersécurité de votre usine
Wissam LOUDHAIEF @WissamLOUDHAIEF
#IoTforBusiness @CiscoFrance
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Industries 4.0 Adoption Challenges
“78% of IoT Initiatives led by LOB”
IT must insure reliability, security & standards
IT and OTConvergence
24% of cyber attacks occur in
manufacturing (among top three
targeted industries)
Exponential increase in
attack surface with Industrie 4.0
Security Risks Data Overload
How to manage massive
amounts of data
How to turn data Into insight
and action
Complexity
Multiple protocols
Network Automation and
Management is critical to managing
millions of IoT devices
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Convergence of IT and OT
IT
• Protect IT Assets• Confidentiality,
Integrity, Availability• Data, Voice, Video• Network
Authentication• Threat Detection
OT• Operations
uptime/Safety• High Availability,• Integrity, Confidentially• Control
Protocols/Motion• Physical Access• Process Anomalies
Cyber-SecurityIT/OT Convergence
The Rigid Silos between IT and OT
• Security Risk Assessment• Asset Visibility across IT/OT• Segmented Access Control• Evolving Security Regulations • Remote Access
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IoT Systems as Attack Surface
Automation vendors still ship application updates on EOL Windows platforms
Vulnerabilities found in industrial systems rose 2400% from 2009 to 2015
The most common Ethernet based OT protocol lacked authentication till Fall of 2015
Yet Ethernet in manufacturing grew 96% the three years before
ICS Vulnerabilities Reported – ICS-CERT
20% Growth of Incidents in 2015- US ICS-CERT
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
2000Australia:Sewage released into fresh water
2005 Japan:Malware releases nuclear plants data
2010Stuxnet discovered
2013Malware on OT vendor site infects firmware
2015Ukraine:Grid taken down for up to 6 hours
Escalating Attacks in IoT Domain
2016Mirai botnet launches largest DDoS
2003USA:Software bug causes power outage for 50M people
2008Poland:City trams derailed by teenager with TV remote control
2012Saudi Arabia:Duqu wipes 30k computers
2014Germany:Malware damages smelter
2017Attack triggers 150+ warning sirens across Dallas
2017WannaCry
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Connected Factory Wireless
Connected Factory Network
Connected Factory Security
Ethernet
Managed Switches
Connected IT/OT Network
Management in OT Tools
SDN for Plug & Play Factory
Factory Wi-Fi (ad Hoc)
Unified Factory-Wide Wi-Fi
Wi-Fi Management Tools
LBS-Ready WiFi
Hyper Location
Industrial DMZ
Network Access Control
Central Identity and Policy
Secure Remote Access
Industrial Protocol DPI
1.
2.
3.
4.
5.
1.
2.
3.
4.
5.
1.
2.
3.
4.
5.
Infrastructure Building Blocks for the Digital Factory
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security Readiness in Today’s Typical Factory
Connected Factory Security
Industrial DMZ
Network Access Control
Central Identity and Policy
Secure Remote Access
Industrial Protocol DPI
1.
2.
3.
4.
5.
Where are You?
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Evolve to Security: Phased Security ArchitectureFirst Phase –Secured Connectivity
Second Phase –Secured Visibility & Control
Third Phase –Converged Security & Depth
Level 5
Level 4
Level 3
Level 2
Level 1
Enterprise Network
Site Business Planning & Logistics Network
Enterprise Zone
DMZ
Manufacturing Zone
Cell/Area Zone
Site Manufacturing Operationsand Control
Area Supervisory Control
Basic Control
ProcessSensors Drives Actuators Robots
FactoryTalkClient
HMI MagelisHMI
EngineeringWorkstation
Operator
Interface
BatchControl
DiscreteControl
DriveControl
ContinuousProcessControl
SafetyControl
FactoryTalkApp Server
FactoryTalkDirectory
EngineeringWorkstation
DomainController
Terminal Server RDP Server App Server Patch Mgmt.
E-Mail, Intranet, etc.
Zone SegmentationControlled Conduits
Application ControlThreat Control
Policy Driven ResponseDeeper Vision / Control
Level 0
v v
v
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Addressing Cybersecurity ChallengesVisibility
Lack of visibility into what assets are connected to the network
Solution: Identify all assets (non-IP and IP). Deep packet inspection.
Legacy Infra.
Legacy control systems more prone to cyber threats
Solution: Stop threats at each layer of infrastructure.
Change Control
24x7 manufacturing is a very challenging environment to do change controlSolution: Stop threats before they spread. Automate remediation.
Multi-site scale
Autonomy, inconsistency & difficulties with securing facilities across company
Solution: Cisco enterprise-class portfolio
Patch Mgmt.
Outdated OS/Firmware on machines, sensors, PCs, HMIs, etc
Solution: Stop threats before they hit unpatched systems.
Partner Access
Securing and managing partner and vendor plant floor access:
Solution: ISE. AnyConnect VPN. Cisco SecureOps.
Pace of Innovation
Increase in technology dependence also increases vulnerabilities
Solution: Taloscutting-edge security research
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Manufacturing Cybersecurity Portfolio
Assess
ment
Build
ing B
locks
OT Network Segmentation
Industrial Cybersecurity Reference Architecture
Operational TechnologyAsset Discovery & Inventory
Foundation
Industrial CybersecurityRisk & Vulnerability Assessment
Industrial Cybersecurity Architecture Assessment
Baselin
e
Discovery & Requirements Gathering Workshop
Ma
na
ge
d S
erv
ice
or
Cu
sto
me
r M
an
ag
ed
Secure AccessIdentity & Access
Management
Threat & Anomaly Detection
Designs: IDMZ, Cell/Zone Security, Wireless Security
SecureOps
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco IoT Threat Defense
IoT Threat Defense protects IoT environments,
reducing downtime and business disruption
Cisco IoT Security Solutions Provide:
Visibility and Analysis of potential dangerous behavior to/from IoT devices
Professional Security Services to assess and baseline risk, manage OT environments and perform incident response
Segmented Access Control of both IT and OT environments
Secure Remote Access into the OT network
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco IoT Threat Defense Capabilities
• Secure Connection into OT environment
• Prevent remote devices from introducing threat to OT environment
• Visibility into remote activities
• Profile Devices• Visibility of data and
traffic• Threat Analytics to
assess threat
• Segment IT and OT environments
• Segment OT devices in the IT network
• Quarantine dangerous devices
Secure Remote Access
IOT Security Services
Segmented Access Control
Visibility & Analysis
• Risk assessment and baseline
• Deployment Services
• Incident response
• Solution Support
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CHALLENGE
CRITICAL NEEDS
Pervasive Physical and Cyber Security for the Factory
Ransomware
BUSINESSOUTCOMES
Department of Homeland Security states that Ransomware attacks have grown 300% in 2016 over 2015, with 4000 attacks daily on federal agencies, compared to 1000 attacks last year
2016 Ransomware Attacks:
• Manufacturing - 54%
• Healthcare – 44%
• Education - 35%
• Tech - 29%
• Banking - 28%
• Identity Services
• Physical Security
• Machine / controls security
• Secure Remote Access
• Data / App Service Access
Reduced Downtime
Reduced Risk
Lower Total Costs
1. Ransomware gains access to systems through web, email, servers…
2. Ransomware takes control of those systems, and holds the data is these systems ‘hostage’ until the owner/company agrees to pay the ‘ransom’ (bitcoins) to free the system.
Problem: Customers can be taken hostage by malware that locks up critical resources–Ransomware
16 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
COMPROMISED SITES AND
MALVERTISING
PHISHING
SPAM
Blocked by Cisco
Umbrella Roaming (DNS Security)
Blocked by Cisco
AMP for Endpoints (Host Anti-Malware)
Web link
Web redirect
C2
File drop
Email attachment
EXPLOIT
KIT DOMAINS
Angler
Nuclear
NuTrino
C2
RANSOMWARE
PAYLOAD
Malicious
Infrastructure
Encryption Key Infrastructure
Prevent and Contain Ransomware with Cisco Umbrella, AMP and Email Security
Blocked by Cisco
Cloud Email Security with AMP
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Solution
Business and Technology Challenges
ISA 3000 appliances for secure connectivity throughnetwork segmentation and threat mitigation; ISA3000as NAT box connecting to Vendor Network.
Modernize distributed warehouse network infrastructure.
NAT is needed to enable communication from upper layer systems like SCADA server, WCS and other cloud services.
Provides Flexibility, Replication and Repeatability ofsystem designs between multiple Vendors and multipleFulfillment centers.
Segmented Access Control for Distribution CenterLarge Online Retailer, US
Business Benefits
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Industrial Security Appliance 3000 Overview
TransportationManufacturing Energy
Stateful inspection industrial firewall through ASA FW
Industrial protocol (DNP3, Modbus, IEC 60870, CIP) visibility and rules for known vulnerabilities
Vulnerability protections for ICS, Windows, MES components, OT applications, NW infrastructure
High-performance VPN, DNS, DHCP, NAT
Hardware bypass, alarm I/O, dual-DC power, rapid set up via SD card, PTP support in HW
Industrial protocol specific parsing, protocol abuse control, detect set-point level changes
Certified for power substations, industrial, and railway and helps meet NERC-CIP, ISA99, IEC 62443
High Availability and latency controls
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Solution
Business and Technology Drivers
Connected & Secure FactoryCampofrio Food Group
• Cisco Services: Planning, Design and Implementation• Cisco Validated Design (CPwE)• Ubiquitous Wireless• Security: ASA/Firepower, ISE
• To provide secure plant-wide wired and wireless connectivity to meet day-one operational requirements whilst serving as a platform for future digitization as Campofrio moves towards Industry 4.0
• Need to meet aggressive design and deployment timescales
• First end to end implementation of connected factory architecture in Spain with IT/OT convergence to support real-time monitoring of machines, improved control, increased efficiency, less downtime and greater productivity
• Foundation for increased digitization in future
Business Benefits
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security as an enabler of Industrie 4.0
3
• Detect and contain in the network infrastructure
Integrate Threat & Segmentation Tools
Network as an Enforcer
Full Segmentation throughout IT and OT
Third
1
• Risk Assessment
• Deployment Services
• Secure Remote access
• Protect Employees
Cloud Security
Endpoint Security for critical users and servers
Email Security
First
2
• Detection in the network infrastructure
Network as an Sensor
Identity Segmentation
• Incident Response Retainer services
Second
CEO - Sentryo02/06/2017
Assurer la sécurité de vos donnéesindustrielles
Thierry ROUQUET @thierryrouquet
#IoTforBusiness @CiscoFrance
Sentryo
Sentryo HQ│66 Bd Niels Bohr CS 52132 69603 Lyon-Villeurbanne - France+33 970 469 694│[email protected]│www.sentryo.net
Cyber Security for the Industrial Internet
CISCO Presentation
Thierry Rouquet Sentryo CEO [email protected]
Sentryo
■ Incorporated: June 2014
■ Control Engineering, Cybersecurity and Entrepreneurship
■ Headquarters: Lyon - France
■ Venture capital backed
■ Target Industrial sectors: Energy, Process Industries, Manufacturing, Transportation
■ Indirect Go2Market
■ Offices: France/Germany/USA + partners LATAM, South Asia, Middle East
■ Awards: BMW Techdate Cisco Live Concours Mondial de l’innovation
Sentryo
Market &
value proposition
Sentryo
Industrial corporations are facing new challenges and they are not equipped to meet them
Industrial control systems which pilots their critical assets are exposed to
cyber breaches
…………...
They could be the direct cause of health, safety
and environmental disaster.
They must leverage Digitization to transform their businesses to keep
their competitive edge
……………….
They can’t because they do not control their
Industrial control system integrity.
Sentryo
What say Industrial Corporations in Energy, Transportation and Manufacturing
● Our control engineering staff have NO cyber security culture. We have to empower them to master cyber risks.
● Our control systems are exposed but we don’t even know what devices are connected and who is talking to who. We need visibility and change tracking.
● If the integrity of our control system is compromised we will not be able to know it. How can we detect it and respond quickly enough to avoid damage and production loss?
Sentryo
Sentryo helps Industrial corporations to maintain availability, resilience and safety of their industrial systems
while transforming their businesses through digitalization
Sentryo is offering ICS CyberVision
SentryoICS CyberVision
CONFIDENTIAL Sentryo
Sentryo ICS CyberVision Visibility - Integrity - Security
1 Visibility■ Dynamic OT asset inventory ■ Flow mapping■ Weaknesses & Vulnerabilities identification
2 Integrity■ Control system key events tracking ■ OT configuration tracking
3 Detection / Response■ Anomaly Detection■ Malicious Behaviors Identification■ OT “Flight Recorder”
CONFIDENTIAL Sentryo
A uniquetwo tiersarchitecture
HardwareSensors
Data Analytics & Visualization
Data Diod+Sensors
Data Collection
Passive Sensors extract meaningful information from M2M communications and send them to the center.
SoftwareSensors
(IoT)
The Center provides a visual
map of the control system, manages
vulnerabilities, tracks changes and detects abnormal
behaviours.
Cisco IoX
CONFIDENTIAL Sentryo
An OT&IT collaboration platform IT SOC
SIEM
OT SOC ICS CyberVision
CONFIDENTIAL Sentryo
Diversity of industrial systems require multiple form factors and implementation scheme
CyberVision CenterHardware appliance / Software appliance / Cloud deployment
Sentryo Sensors
SENSOR3Industrial DIN Form
Factor
SENSOR7Hardware
Diod included
Critical Infrastructure
Software Appliance
Virtual Machine
Industrial IoT
Cisco IoX ContainerEmbedded inside IE4K
Switch
Potential Cisco SolutionX Program
How does it work ?
Sentryo
● Inventory■ Devices, Modules■ Firmware
● Process Control■ System Messages■ Programs■ Register IDs
COLLECT
1
How it works
Passive sensors use DPI technology to extract meaningful information (data & metadata) from OT networks.
Benefits: Store all data collected within the CyberVision center database
● Network ■ Metadata■ Statistics
Sentryo
CyberVision Centers combines collected data to create “process & network” behaviors, correlates them with Threat Intelligence feeds and interacts with the Control Engineer to add business context.
● Dynamic asset inventory● Connection mapping● Passive vulnerability
Management
Benefits: Provides situational awareness and empowers the OT staff to reduce the attack
surface
Discover & Map
How it works
2
Sentryo
● Track changes● Log all events with
zero-configuration● User defined severity
Benefits: Maintain OT systems integrity with a minimum level of
workload for OT staff
How it works
3Next, events are generated and recorded into a long term storage database. They are contextualised and presented in a detailed view. OT engineers control assets configuration and key events using a visual dashboard.
Control System Integrity
Sentryo
How it works
4
● Track changes & detect anomalies
● Identify malaicious activities
● Visualize alerts in a OT tailored view
Benefits: Identify malicious behaviors and foster OT & IT
collaboration.
Detect & altert
Control Engineers create Baselines as a set of behaviors. CyberSecurity experts add known malicious behaviour (IoC) through the API. ICS CyberVision relies on machine learning to classify behaviors and continuously improve detection accuracy.
ICS CyberVisionVersatile deployment
CONFIDENTIAL Sentryo
‘Time and space’ roll-out
OT security activities:- Up-to-date Inventory - Remote access tracking- Vulnerability ManagementWhat to look:- Components- Remote Flows
Visibility
+Visibility
OT security activities:- Monitoring Key Events - Assets configuration (version, programs)- Assets availability (reboot, stop commands)What to look:- Key Events
OT security activities:- Anomaly detection / Behavioral Analysis- Malicious activitiesWhat to look:- All Events- All Behavior modifications
All OT Systems
Integrity
Global Security
Critical for Business Operations Health & Safety Impact
+Visibility
+Integrity
Mobile (or Permanent) Permanent (or Mobile) Permanent
SentryoICS CyberVision
Use cases
Sentryo
Storage
Transport
Distribution
Context■ Gas transport & storage ■ Distributed network: 2000+ devices ■ 3 level of criticality : Storage (High), Transport network
(Medium), Access network (Low)■ Scada/PLC: Rockwell/Schneider■ SOC implementation forecasted (outsourced)
Challenges■ Shortage of gas supply, environmental, human, ■ Compliance (Storage)
ICS CyberVision balanced according to criticality ● Visibility (D&M): Low, Med, High - Done● Integrity (P&P): Medium & High - Roll out● Security (D&R): High - Planned
Deployment scheme● 2 sensors on the backbone to provide visibility● 3-5 sensors on each of the critical sites (Storage,
compression) to provide integrity & security● 1 Single center in the corporate Data center● Next: Integration with RSA Netwitness (SIEM)
Case # 1 Provide adhoc cybersecurity for gas transportation & storage
Sentryo
Automotive manufacturing
ICS CyberVision
Context■ Large automotive manufacturing plant■ 500+ Robots piloted with PLC’s■ Zero stock, on demand■ Multiple maintenance operations made by
subcontractors.
Challenges■ Increase the capacity to cope with an increasing
variety of products with Big Data analytics■ Reduce Down Time
ICS CyberVision ■ Visibility (D&M): maintain an always updated
inventory & map - Pilot-■ Integrity (P&P) : track changes on the OT
network including program updates and remote access - POC -
Deployment scheme- 1 sensor / Cell- Target -> CISCO IE4000 Embedded
Case # 2 Maintain integrity on the car manufacturing control system
Conclusion
CONFIDENTIAL Sentryo
■ A unique OT&IT collaboration platform which puts the control engineer at the core of the monitoring process
■ A versatile two-tier architecture that fits with centralized and distributed infrastructures
■ A multi-level implementation to match the level of criticality (Visibility/Integrity/Security)
■ A 100% proven passive approach with no impact on the existing control system.
■ Critical infrastructure grade: designed to cope with national critical infrastructure regulations.
Sentryo ICS CyberVision competitive advantages
Sentryo
Q/A
Group Industrial IT and Automation Manager – Groupe Bel02/06/2017
Collaboration Groupe Bel & Cisco
Xavier TEXIER @Bel_en_France
Mise en place d’un pilote autour de l’usine d’Evron, dans un environnement multi-constructeurs
#IoTforBusiness @CiscoFrance
Head of IoT – Cisco France02/06/2017
Conclusion
Fabien MEDAT @fmedat
#IoTforBusiness @CiscoFrance
Digital Manufacturing Solutions
Analytics & Big Data
Connected Machines & Edge Compute
Factory Security
Factory Network Factory Wireless
Co
nn
ecte
d F
acto
ry
Infr
astr
uctu
reC
om
pute
Apps
Factory Virtualization Data Center and Cloud
Factory Collaboration
Why cisco Digital Manufacturing ?
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Prochains événements
Du 15 au 17 juin 2017Paris – Porte de Versailles
Rejoignez-nous !
6 juillet55 avenue Bosquet – Paris 7
Rejoignez-nous !
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
• Notre ebook sur l’industrie 4.0 : https://discover.cisco.com/fr/fr/manufacturing/ebook/industrie40/
• Plus d’informations sur nos solutions pour les industriels : http://www.cisco.com/c/fr_fr/solutions/industries/manufacturing.html
• Plus d’informations sur nos solutions IoT : http://www.cisco.com/c/fr_fr/solutions/internet-of-things/overview.html
• Suivez-nous sur le blog : http://gblogs.cisco.com/fr/manufacturing
• Suivez-nous sur Twitter : @CiscoFrance @CiscoMFG
• Plus d’informations sur TellMePlus : http://www.tellmeplus.com/
• Plus d’informations sur Sentryo : http://www.tellmeplus.com/
Liens / Ressources
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Merci !
Rendez-vous dans le loungepour le cocktail déjeunatoire
#IoTforBusiness @CiscoFrance
Eliminer les temps d’interruption grâce à la
maintenance prédictiveBenoit Gourdon, CEO Tellmeplus
2
Vision
INDUSTRIAL
DATA
AI
AUTOMATION
AI
EVOLUTION
3
INDUSTRIAL
DATA
4
Industrial data
Format
Volume
Connectivity Real-time
Security
Privacy
5
AI EVOLUTION
6
AI Evolution
AI is moving at the edge/
inside the objects
AI followed
same evolution path
as IT & infrastructure
7
EMBEDDED AI
enable local decisions
even when network is down
8
Smart objects are
dumb
when not
connected
9
AI AUTOMATION
10
AI driving AI
Automating
existing manual process
is a
dead end
11
Automating AI
without seamless
deployment
is
useless
12
Vision
INDUSTRIAL
DATA
AI
AUTOMATION
AI
EVOLUTION
13
Solution
IoT PLATFORMFEATURE
ENGINEERING
META ACTIVE
MACHINE LEARNING
EMBEDDED AI
About Tellmeplus
15
Meta Active Machine Learning technology Paris &
Montpellier
R&D mathematicians
from CNRS3 Patents
2011 creation
FounderJM Cambot
21
Software
vendor
Predictive Analytics
2016 4,2M€ raised
CEOBenoit Gourdon
About us
SaaS predictive analytics platform
for augmented experts
to create automatically
AI-based prescriptive models
deploy seamlessly in the cloud / at the edge
Predictive Objects
For whom?
IoTPlatforms
Industrial Internet
CustomerIntelligence
6
18
Partners & Customers
Integrators
Technology
Customers’ references
19
Predictive Objects scope
Data collection
Data cleansing
Data preparation
ModelingPerformance monitoring
TELLMEPLUS
20
IoT
Applications
Business
Applications
Management
Edge / Fog
Processing
IOx IOx IOx
• Optimized hardware footprint
• No need for separate compute
machinery
• Integrated security
• Device communications
• Empowered edge
processing
• Reduced latency &
bandwidth cost
Edge / Fog
Processing
IOx
Data Center
Empowering the Edge
Compute inside
the network
POPOPOPO
POPO
PO
21
22
23
24
25
Copie d’ecran ready to deploy
26
27
28
Copie d’ecran Push
29
30
Use cases / Case studies
IIoT PlatformsUse Case
PRESCRIPTIVE MAINTENANCE
EMBEDDED INTELLIGENCE
PROCESS MANAGEMENT
Industrial InternetUse Cases
34
Process managementSemi-Conductors
Predict process qualityAll data (+ variables & exogenous)
Real-time prediction per entity
Identify defective die Optimized model for local identification
Identify defective die early stage
Actionable
prescriptionsExplain in business language, act &
fix
Predictive MaintenanceSmart TV
Predictive Objectsmake the Smart TV
intelligenteven when not connected
Prescriptive Maintenance
Enriched User Experience
Welcome in the
INTELLIGENCE OF
USAGE
36
Settings
1,000+ wind turbines
6 months-3 years of data history
50 to 200 sensors per wind turbine
15 min data collection intervals
100 Gb data
Initial results
Prediction 24/48h - more than 1 week ahead
Accuracy = 80%
“Equipment E will break down in 1 month”
“Because of reasons X, Y, Z… andweather”
“Operator, you need to replace part P”
“And these are the steps to replace it”
Predictive MaintenanceWind Turbines
37
Battery failures predictions• Battery voltage, lights on/off, driver’s behavior,
car model, mileage, GPS, …
• + exogenous data (seasonality, weather,…)
• 100Go
• 1000 cars
• Dataset 200 columns
• Sensors: seconds to minutes
Works even when network is not available!
Predictive MaintenanceCar Battery
38
Use cases – Automotive Xee
• Simple, easy to use
• Seamless deployment
• Designed for subject matter Experts
• Resilience, real-time, security
• Cost effective
• Intelligence as a service
Value Proposition
Automated Embedded
Artificial Intelligence