SCADA to the Cloud

Cloud services have become firmly entrenched in our everyday lives as we access more of what we do not through the hard drives on our computers, but through networks linked to our smartphones and tablets. The cloud is becoming an increasingly essential part of operating in industry as well, with more manufacturers taking advantage of the benefits of traveling light.

Now days almost all service provider companies are providing service on demand concept as in virtual world.
For example you can rent for software to work on demand and you dont need any hardware for that, it will work on public domain as service on demand.

Same you can hire a Server on rent in the cloud and you can do all your stuff. Its really forwarding the world towards a new generation technology.

Therefore now Process Industries also become attentive on cloud solutions and providing different type of solutions based on Cloud. Recently ABB Globalogix take oil and Gas Scada into the Cloud to provide a software-as-a-service (SaaS) SCADA based on ABB’s SCADAvantage product.Providing the SCADA through the cloud lowers upfront costs and reduces the operating risks and maintenance burden.
GlobaLogix has built a highly secure and redundant cloud-based infrastructure to host ABB’s SCADA platform.
1. The infrastructure provides access to 53 data centers in North America with 2,048 bit encryption that exceeds the current Department of Defense standards

2. The infrastructure also complies with the most stringent Tier 4 data center standards from the Telecommunications Industry Association (TIA) and American National Standards Institute (ANSI) for mission-critical computer systems.

3.The standard requires fully redundant subsystems and compartmentalized security zones.

4.Additional security is provided by Citrix authentication installed on each of the client’s laptops, desktops and tablets that provide access to the cloud-hosted SCADA system.

5. Field operators can optionally be provided with password-protected web access to read-only data and key information to reduce exposure to malicious attacks and prevent operator errors.