Kevin Price, a technical product evangelist for Infor, has spent most of his professional career working in the enterprise asset management software space. Angel Torres, Infor’s EAM practice lead and managing partner of VisualK, Infor’s Gold Channel Partner, is a problem solver with proven ability to innovate by integrating technology with EAM best practices.
During the live Q&A portion of the webinar, "How to Navigate the Challenges of OEM-Based Asset Management," Price and Torres tackled several attendee questions on OEM partnerships, security and much more.
PS: Lots of people are worried about providing secure access to their data to third parties like OEMs. Why are people so concerned about data sharing, and how do you help them address their concerns in their solutions and with their business cases?
KP: Some of the questions that come from security-minded organizations are related to getting data into third-party hands they don't know. Data elements like water utility or power utility are very protected. Unfortunately, the organization may have data points that are important to keep internal, not external. There could be a potential for terrorist events based on how the organization is set up. There could be different types of mining data that can be put out and provided competitively. How would I know that my information is safe?
You need to not only make sure that the data points are secure, are vetted, and have been reviewed by your IT organization, but also make sure the people are secure and vetted by your IT organization, and there are lots of different certifications that you can go through to make sure that you're accessing data (securely).
Then, when you access the third party, you can provide, through different types of portals, glimpses into your application. Maybe OEMs are coming in to do work management functions and you want to capture that information. Maybe you provide a portal for them to go in and access data in that way, or maybe you say, "You need to give us a flash file, which we'll run though and vet, and then we'll upload into our system so that we document when you did work." But the questions are valid when it comes to security. They always are. It's a matter of being open in the collaboration with yourself, with the OEM, with the third party and with your security organizations internally.
AT: One of the things that we see, especially with utilities, is that whenever data gets to a repository, an onsite buyer, or whatever, it's typically within the confines of your network. And that, for the most part, is pretty much secured. But if we look at the SCADA and the sensors out there in the fields, people are just beginning to realize that those are vulnerable, as well. People are kind of waking up to that.