Guest post by Charles Araujo, Principal Analyst, Intellyx
Just as was the case with the settling of the American West, today’s technology settlers are flocking ‘West’ to new territory in search of new fortunes and futures. This new territory, the Internet of Things (IoT), is in a period of rampant expansion, endless opportunity, and few rules. It is unquestionably the Wild Wild West of technology.
The Internet of Things refers to a broad category of smart and connected devices that includes a vast range of endpoints including industrial equipment sensors, smart appliances, smart cars, geo-beacons and just about everything else in between. The common denominator is that these smart devices exist at the enterprise’s edge collecting data and sharing it with core systems, often providing at-edge analytics, and sometimes performing automated actions – all without human interaction.
As enterprises have realized the potential business value and competitive benefits that smart devices can provide, they have rushed to deploy them and incorporate them into their commercial products – resulting in an explosion of enterprise use cases.
In most organizations, this rapid expansion of IoT deployments has happened with little strategic oversight as business leaders focused on seizing advantage. But this Wild Wild West approach now leaves enterprises in a precarious position as they begin to grapple with the security, data governance, and architectural complexities incumbent in this vast new technology territory.
“As organizations exit their Wild Wild West phase, they must adopt an IoT strategy within the context of their broader enterprise architecture (EA)…”
Enterprise Architecture and Your IoT Strategy
As organizations continue their investment in IoT and begin to take a more strategic view of their deployments, they are coming to terms with the significant issues and risks that they bring.
The strategic challenges span security, governance, and operational concerns and include increased attack surfaces, data governance issues, and operational manageability. As great as IoT’s business value and competitive benefits may be, its deployment also increases business risk as organizations embed smart devices into critical business processes and essential elements of the customer experience.
The good news for most enterprise organizations is that they have faced many of these challenges before and have already embraced a discipline to help address them: enterprise architecture.
As organizations exit their Wild Wild West phase, they must adopt an IoT strategy within the context of their broader enterprise architecture (EA) rather than attempting to create it in an independent – and isolated – fashion.
Incorporating this strategy into their broader enterprise architecture will enable organizations to address its challenges in a holistic fashion, which will be essential as complexity increases.
For instance, enterprises must be able to address the flow and governance of device-generated data, device connectivity, the use of shared infrastructure (perhaps including the use of shared devices), and IoT specific infrastructure elements such as gateways and data collectors – all within the context of the organization’s entire technology stack.
Your Path to IoT Success
While EA will be essential to helping organizations tame their IoT deployments and thus realize the business and competitive value they seek, organizations must first focus on several important elements as they apply it to this still-developing domain.
Rather than spending resources on standards and establishing strict architectural guidelines at this stage of development, organizations should instead focus on creating architectural models that protect the integrity and fidelity of data consumed at the edge and as it flows throughout the enterprise.
Moreover, these architectural models should center on ensuring security and manageability throughout the architecture, but without imposing limitations that will inhibit the organization’s ability to experiment with new IoT use cases and applications.
WEBINAR: 14 March (Wednesday), 12:00 EDT / 16:00 GMT - The Surprising Role of EA on Your IoT Strategy
The goal of applying EA in an IoT context is no different than in other parts of the architecture: to create a strategic, macro view of the technology stack within the context of the business and its priorities to ensure security, manageability, and interoperability without unnecessarily inhibiting the organization’s ability to innovate or operate.
When it comes to IoT and its rapidly evolving state, however, organizations must deftly apply EA principles to ensure that they are providing sufficient oversight and control, but no more.
Most importantly, as organizations apply EA to their IoT strategies, it will be critical that they remain laser-focused on the business context, the business value and competitive advantage they seek to create, and the impact of these strategies on the customer, partner, and employee experience.
The Intellyx Take
On the one hand, applying EA to IoT strategies makes perfect sense. EA’s original purpose was to address the very issues that IoT deployments are now facing – and to do so from a business perspective.
The challenge, of course, is not with EA principles, but with the overly dogmatic manner in which many enterprises have applied EA in practice. Early IoT advocates have steadfastly resisted the application of EA to IoT strategy because of a well-justified fear that doing so would stifle innovation.
The implications of IoT deployments and the risks that they are now introducing, however, make continuing down this path untenable. Organizations must overcome these fears and adapt their EA practices to account for the experimental and dynamic nature of IoT deployments.
An important element of this practice adaptation will be the adoption of tools, such as SAMU, that help organizations break through the dogmatic application of EA and strike this balance of flexibility and just enough control.
Adapting EA practices and striking this balance will now become a strategic advantage in and of itself, as those organizations that do so successfully will find that they alone can harness the competitive value and business benefits of IoT while mitigating the security risks and operational complexity that it brings.
Copyright © Intellyx LLC. Atoll is an Intellyx client. Intellyx retains full editorial control over the content of this paper.
Photo by Eniko Polgar on Unsplash.