Professional Documents
Culture Documents
subject=Architecting%20and%20Planning%20for%20IoT%20Success:%20A
planning-
iot-
success-
gartner%3Fdocdisp%3Dshare%26srcId%3D1-
4398736771%0D%0DAny%20views%20or%20opinions%20expressed%20i
mail%20are%20those%20of%20the%20sender%20and%20do%20not%20n
Erik T. Heidt
(http://www.gartner.com/analyst/44329)
The Internet of Things (IoT) pierces organizational boundaries, changing the operating culture of the
organization including the ways in which different areas work together and the expectations about
where and how decisions are made.
Few IoT systems are entirely "greenfield" ones. Most leverage existing operational technology (OT) and
business systems, including proprietary communications protocols and control-system technologies
originally developed and deployed decades ago.
IoT is integration-heavy in all aspects of its development, resulting in complex and significant testing,
quality and monitoring requirements.
The right plans, architectures and practices are helping organizations overcome these challenges and
successfully craft and deploy IoT solutions.
IoT seeks to improve and extend critical services and infrastructure, but it cannot be successful if it
disrupts them. The organization's service quality needs must come first.
Engagement with the groups participating in and impacted by IoT initiatives is vital, in order to
understand their requirements and the project's technical and operational constraints.
A holistic target architecture capable of meeting the IoT needs of the organization will help reduce
redundancy and interoperability issues, by avoiding the creation of a long series of one-off solutions.
IoT is a digital business re-engineering effort, not a single project. Organizations should use a technical
strategy to plan the deployment of solution components. This approach progressively builds up skills
and technology, enabling better agility and delivery capabilities over time.
Table of Contents
Insight From the Analyst
Executive Overview
Definition
Research Highlights
Related Research
Related Research
Related Priorities
Related Resources
Webinars
Tables
Table 1. Related Priorities
Figures
Figure 1. IoT Extends IT Into the Physical World to
Sense, Analyze, Act and Communicate
For technical professionals, the Internet of Things is both exciting and daunting. It's exciting because of the
rapid rate of innovation and technical sophistication and because it's one of the main areas where
technical professionals can develop initiatives that can have a transformative impact on their organizations'
business capabilities. But, it's daunting because the deployment of IoT solutions is fraught with new types of
complexity that most technical professionals haven't encountered in traditional IT initiatives.
Four challenges related to IoT complexity come up repeatedly in my conversations with Gartner for
Technical Professionals (GTP) clients:
IoT security incidents, both actual and speculative, appear regularly in the media. The vast majority of
these can be addressed through the application of existing and well-understood security and risk
practices. The inherent complexity of IoT often prevents technical professionals from understanding how
to leverage their existing security and risk assessment capabilities.
IoT pierces existing organizational boundaries and brings disparate groups together. This means that
groups that don't normally work together must collaborate. It also means that information that may have
previously gone through multiple filters in the organization will become available instantly to new
audiences. These factors change the operating culture of the organization, including how people work
together, and where and how decisions are made.
Few IoT systems are entirely "greenfield" ones. Most leverage existing operational technology (OT) and
business systems, which will need to be integrated into the solution. The IoT solution may require
integrating proprietary communications protocols and control-system technologies originally developed
and deployed decades ago. This integration must avoid disrupting the critical infrastructure and
processes that IoT aims to extend.
IoT is integration-heavy in all aspects of its development typically spanning multiple edge endpoint
technologies, cloud-based platforms, and enterprise application systems and databases. This results in
complex and significant testing, quality and monitoring requirements.
Many of our clients took the right planning steps and focused on the right problems as they rolled out their
solutions. Today, they are reporting successful IoT deployments. As a GTP analyst, my greatest source of
satisfaction comes from helping clients be successful and the road to IoT success for technical
professionals starts by identifying and managing IoT complexities proactively. This collection of research will
guide them on the journey.
Business demand for IoT value is compelling technical professionals to demonstrate how to deliver IoT.
Across many industries, organizations are exploring ways to integrate data from physical systems and
appliances to drive new business value. Many businesses are re-examining their IT and OT investments
from an IoT perspective. They are seeking ways to harness the benefits that IT has brought to purely
electronic areas, and bring them into the world of physical devices and operations.
IoT is born out of new synergies between digital business strategies and the physical world. Data from
"things" can be analyzed to gain business-improving insights into what's happening in the world, or within
the business's physical operations. Beyond these capabilities to sense what's happening in the world and
analyze this information, IoT can drive further benefits through the ability to communicate and act that is,
to issue alerts and initiate physical-world actions (see Figure 1). These capabilities can drive improved
efficiency, safety and reliability, and create new business services.
But, this marriage between the physical world and IT poses major challenges for technical professionals.
Integrating physical assets or control systems into the broader IT context is a complex undertaking, involving
many heterogeneous technologies. It poses significant testing, quality and monitoring requirements.
Technical professionals must be ready with the right plans, architectures and practices to surmount these
challenges and successfully deploy IoT solutions. Three priorities are key to this goal:
IoT success demands a technical strategy that enables organizations to implement a portfolio of IoT
solutions. This strategy will enable the organization to develop long-term, sustainable IoT adoption plans,
develop target architecture, and execute on multiple IoT opportunities. If IT organizations don't plan and
prepare properly, they risk:
Disrupting operations
It's important to approach IoT technology planning from a strategic perspective early, before individual
business units seize the initiative and take off in their own directions without any oversight. Our
recommended process of developing and executing an IoT technical strategy includes the key steps needed
to address this priority (see Figure 2).
SOURCE: GARTNER (MAY 2017)
It's also important to engage with the groups impacted by IoT innovations to understand their requirements.
These engagements will uncover any technical and operational constraints as well. From there, the next
critical step is to develop and use an IoT technical architecture to plan which components you'll develop, and
in what sequence, to support the organization's IoT efforts. And finally, security planning is also critical, and
needs to be addressed as early as possible.
"A Primer for Building Resilience and Security Into Internet of Things Solution Architecture"
(/doc/code/297738?ref=ddisp&latest=true) : The scale and diversity of IoT technology pose a sizable
security challenge. Strong practices and architecture, focusing on the IoT edge in particular, are critical to
managing digital business risk.
Organizations will be deploying multiple IoT solutions, and these projects should be addressed holistically
not as isolated, one-off exercises. IoT is a business re-engineering effort, not a single project.
As the organization develops an IoT deployment competency, it will become more productive and cost-
effective, and will avoid chaotic and inefficient IoT implementations. Minimizing waste and redundancy will
ensure that systems integrate and interoperate properly.
In order to avoid the creation of a long series of one-off solutions, technical professionals must develop an
IoT architecture that can meet the needs of the organization holistically (see Figure 3). They also must
develop processes and methodologies for implementing IoT solutions in an iterative cycle that builds
organizational competence in IoT. That way, the new skills and technology developed will enable increased
agility and delivery capabilities over time.
SOURCE: GARTNER (MAY 2017)
The research collected in this section focuses on the repeatable processes and frameworks required to
develop an IoT delivery competency. Key focus areas here include using reference models and processes
for IoT deployment, and ensuring that solutions are properly managed and governed.
"Architect Your Internet of Things System by Using the Gartner IoT Reference Model" (/doc/code/324241?
ref=ddisp&latest=true) : Every IoT project needs an architecture that defines what functionality is required,
where that functionality will operate, and how data and control will flow. Technical professionals can use
Gartner's IoT Reference Model to create their own IoT architecture.
It's easy to get lost in the technical details of IoT projects, without proper focus on the "big picture" provided
by strategy, planning and frameworks. In fact, this is why we presented this section last:
Once the proper prerequisites are in place, however, in-depth information on these components will be
critical to the success of most IoT initiatives.
For example, most technical professionals will need to build up their knowledge in technologies associated
with the edge- and platform-related components of IoT. These include gateway technologies at the IoT
edge, cloud-based technologies supporting the IoT platform, and analytics capabilities that can be deployed
in different portions of the end-to-end solution (see Figure 4).
Given the large attack surface presented by sensors and instrumented "things," features such as public-key
infrastructure (PKI) will be vital to ensure proper security. The things connected to the IoT system will need
identities to ensure secure and trusted solutions, posing new challenges in the area of identity and access
management (IAM). Perhaps most critically, technical professionals will need to master new integration
challenges involved in connecting physical edge technologies to both the IoT platform and the enterprise
systems. GTP has a curated set of deep technical literature on a variety of IoT subjects that will help build
knowledge in these key areas.
SOURCE: GARTNER (MAY 2017)
"Exploit the Strengths of Public Cloud for Your IoT Platform" (/doc/code/297298?ref=ddisp&latest=true) :
Elasticity, global reach, scalable stream processing and data analytics features make cloud computing the
ideal platform for IoT solutions. Technical professionals should assess cloud IoT platform suites for
capabilities that will underpin IoT projects today and in the future.
"PKI Is Gearing Up for the Internet of Things" (/doc/code/303119?ref=ddisp&latest=true) : PKI has been a
foundational security tool for identity professionals for two decades. IoT, mobility, certificate life cycle
handling, scale and new deployment options are kindling new interest in PKI, its potential disruptors and its
vendors.
"Molding Identity Into the Internet of Things" (/doc/code/303076?ref=ddisp&latest=true) : The diversity of IoT
makes the Identity of Things (IDoT) hard to architect and manage for IoT solution architects. Users, devices,
gateways, platforms, applications and services all have a part to play in IoT solutions, and need identities to
form a secure and trusted IoT.
Priority Focus
Supply Chain and Operations Trends and Innovation Supply chain and operations trends
(http://www.gartner.com/explore/initiatives/overview/10325) and innovation identifies emerging
technologies, business models and
processes that position supply
chain as a competitive advantage in
enabling business outcomes.
Delivering Effective Identity and Access Management Capabilities The delivery of effective identity and
(http://www.gartner.com/explore/initiatives/overview/10510) access management (IAM)
capabilities involves tools and best
practices that manage identity,
privileges, access and trust to
support security, risk and business.
Priority Focus
SOURCE: GARTNER
"Rapidly Architect Your IoT System With the IoT Reference Model"
(https://www.gartner.com/webinar/3623721)
2017 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any
form without prior written permission is forbidden. The information contained herein has been obtained from sources
believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such
information. Although Gartners research may discuss legal issues related to the information technology business,
Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner
shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations
thereof. The opinions expressed herein are subject to change without notice.