I attended a breakfast presentation this morning given by Schneider Electric on the topic of facilities and energy intelligence. Essentially, they are tearing down the monitoring silos of energy, fire, lighting, data center power, HVAC and physical security monitoring to deliver a unified dashboard for facilities and energy management.
As I listened to the presentation, I was struck by the parallels by the parallels between the presentation and our research on Enterprise Security Intelligence (and most recently in this research note for clients, on Application Security Intelligence).
What are some of the common elements?
- Tearing down the silos of monitoring
- Expanded use of sensors and collectors for more detailed monitoring
- Detailed repository created from the monitoring information
- The use of correlation of the information to generate actionable insight and prioritized actions for the administrator
- The ability to model proactive “what if” scenarios against the models and historical data
- The ability to look at patterns over time for insight (in their case for predictive failure analysis, in information security’s case to look for anomalies).
Interesting. These are almost exactly the same types of deliverables we expect from enterprise security intelligence.
Conclusion: I believe the need for “intelligence” is becoming ubiquitous across all aspects of business and IT … and in this case, facilities and energy and in our case, information security.
Read Complimentary Relevant Research
Predicts 2017: Artificial Intelligence
Artificial intelligence is changing the way in which organizations innovate and communicate their processes, products and services. Practical...
View Relevant Webinars
The IoT In Manufacturing Operations: Where Are We Now?
The Internet of Things (IoT) is a paradigm shift for manufacturing operations. Its fanfare creates uncertainty in state-of-the-art technology...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.