The Industrial Internet Consortium (IIC) has released a web-based tool to enable users to better understand their enterprise IIoT maturity.
It says its IIoT Maturity Assessment helps organisations become best-practice adopters of IIoT by guiding business managers through a range of questions about the adoption, usage and governance of IIoT within their organisations.
The co-chair of the IIC’s Business Strategy and Solution Lifecycle Working Group and co-author of the tool, Jim Morrish, said it would help companies get a baseline for their maturity and assess this at regular intervals to track their progress.
The IIoT Maturity Assessment comprises four main dimensions each with a number of strands each of which has five levels of maturity.
For example, under strategic context, a maturity level can range from a limited number of key individuals having stepped up to IIoT ownership to full ownership of IIoT within an organisation. The tool provides feedback about the level of maturity and highlights areas that may require development.
It also provides links to the IIC body of knowledge for reference and to help organisations improve their maturity.
IIC resources include collaborative resources developed by industry leaders from the IIC membership, including IIC foundational documents (Industrial Internet Reference Architecture, Industrial Internet Security Framework, Industrial Internet Connectivity Framework, Business Strategy and Innovation Framework, Industrial Internet of Things Analytics Framework, and Vocabulary Technical Report) and other IIC documents and tools.
The too is available in three levels of analysis: Quick, Standard (both open to everyone) and Detailed (IIC members only).
Structure of IIC Maturity Assessment
Business Strategy
- Market context
- Strategic context
- Business model innovation and refinement
- IoT Foundations
- Business Solution Lifecycle
Interface to business strategy
- Solution design
- Project team structuring
- Project management
- In service monitoring and feedback
- Technology
Technology strategy
- Reference architecture and standards
- Platforms stack
- Data location transparency
- Security
Governance
- Enablement
- Hardening