• Partners
  • Results
        • Latest from The Blog

          Managed Network Services

          You rely on the cloud to run your business. What would you do without it? With business-critical software applications and data now in the cloud, networks are the gateway to everything your employees need to do their jobs.  And if a problem causes the network to go down, it can bring your operation to a

          Read More »

          The “IT Contact” Dilemma

          “Oh, yeah I have a contact who can do that.” In today’s world, if your IT contact is your company’s solution, you should be concerned. Do you really want to rely on one person to protect the technology that keeps your company running while cybercrime is at an all-time high and attacks are becoming increasingly

          Read More »

          The imminent danger facing the legal Industry

          Attorney-client privilege extends to client data Attorney-client privilege is what makes a client feel secure from the potential risk of having sensitive information fall into the wrong hands. Unfortunately, client data doesn’t always receive that same luxury. Data breaches in the legal industry are on the rise and most firms are not giving cybersecurity the

          Read More »

          Cybersecurity Awareness Month 2020

          2020 has certainly brought no shortage of changes from 2019 – but one of the biggest changes between last fall and this fall is the amount of time we’re spending at home, in turn using technology to run our business from home. This has opened up pandora’s box when it comes to cybersecurity for both

          Read More »

          What makes healthcare data so valuable to cyber-criminals? The unique risks and results that our digital healthcare systems face.

          When it comes to cybersecurity these days, most people are more concerned about keeping their financial information safer than their health information, even though PHI (Personal Health Information) is significantly more valuable on the black market. When a bad actor obtains the name, birthdate, social security number, and medical history for an individual, not only

          Read More »

          COVID-19 and the Rise of the Virtual Business: The “new normal” of navigating business continuity

          The COVID-19 pandemic has changed business forever. But this isn’t necessarily a bad thing. Successful entrepreneurs and innovators understand that though change is hard—especially when forced upon us—it can be good for strengthening your business.   As quarantines are lifted, the idea of returning to work has shifted as business leaders realize, through this unfortunate

          Read More »


          WATERLOO, ON | FEBRUARY 26, 2020 – FoxNet, a Waterloo-based global IT solution provider, is excited to announce it has been named one of Cloudtango’s Top Managed Service Providers in Canada 2020. The annual list recognizes top-performing Managed Service Providers across the country, spotlighting those who have excelled in support services, customer satisfaction, market growth,

          Read More »

          Secure Remote Workers

          Unfortunately, COVID-19 continues to spread across the globe. Like the rest of the world, we are following updates diligently. Due to this evolving public health situation, cyberthreats, including phishing scams and spam, are spiking as online criminals take advantage of the pandemic. Hackers are setting up malicious websites, posing as reputable sources of information about

          Read More »

          FoxNet Inc Announces Partnership with eSentire to Deliver MDR Services to its Clients

          Waterloo, Ontario – November 5th, 2019 – FoxNet Inc announced it has signed a partnership agreement with eSentire, Inc., the global leader in Managed Detection and Response (MDR), to deliver cybersecurity services to their growing portfolio of clients.  Organizations operate in a world in which their data, infrastructure, endpoints, customers and supply chain partners are distributed everywhere. Category creator

          Read More »

          The Best of Cybersecurity Awareness Month 2019

          Fall makes us think of crisp apples, changing colours, turkey dinners, Halloween candy – but what about cybersecurity? October is Cybersecurity Awareness Month (or #CSAM) and this year the focus was on encouraging all businesses to take action and think proactively about reducing threats. Many global IT leaders and government initiatives shared excellent resources, important

          Read More »

          What are Next-Gen Managed Services?

          Trends in data management, cybersecurity, and cloud-based solutions over the past several years have created a very important need for both SMBs and enterprises – next-gen managed services. IT management has become a lot more than reducing downtime and resolving support tickets. An MSP, or Managed Services Provider, is the solution many companies have been

          Read More »

          BUaaS: Backup as a Service

            Backup as a Service, or BUaaS, is an end to end solution that stores and protects your valuable data. BUaaS bridges the gap between protecting data onsite and protecting data in the cloud, making it an absolutely critical component to any business. Keeping your data safe is imperative for any business. FoxNet’s BUaaS is

          Read More »

          FoxNet Announces Partnership with Rubrik

          For Immediate Release Waterloo, Ontario | November 2, 2018 — FoxNet, a Waterloo-based IT service provider, has joined with cloud management leader Rubrik as a service delivery partner. FoxNet will be using Rubrik to deliver innovative cloud management technology to its clients. FoxNet will offer Rubrik’s secure and dependable Backup-as-a-Service, DR-as-a-Service and Archival-as-a-Service to clients

          Read More »

          FoxNet Partners With Pure Storage To Build Modern Data Solutions

          For Immediate Release WATERLOO, ON | October 31, 2018 – FoxNet, a leading IT services provider, has partnered with Pure Storage Inc., lending its expertise as part of a collaborative initiative to generate faster, smarter data storage solutions for an increasingly data-driven world. Bill Fox, President of FoxNet, says the partnership prepares businesses to gather,

          Read More »

          16th Annual FoxNet Charity Golf Tournament

          FoxNet hosted its 16th annual Golf Tournament on August 23rd in support of Kidsability and Waterloo Region Junior Achievement. Participants enjoyed a wonderful day on the links thanks to FoxNet and their generous sponsors. This year the tournament raised a remarkable $16,000, which will be put to excellent use in helping youth across the Waterloo

          Read More »

          The FoxNet Annual Charity Golf Tourney Raises $16K to Benefit Local Children

          For Immediate Release WATERLOO, ON | August 27, 2018 – FoxNet, a Waterloo-based IT service provider, raised $16,000 during its 16th annual charity golf tournament this month in support of local non-profit organizations. The proceeds from the FoxNet Golf Tournament will support local organizations whose programs empower special needs children and youth to realize their

          Read More »

          Why Good Companies Fail

          Recently, a customer asked me to develop a seminar for his executive team and board of directors on the topic “Why Good Companies Fail.” A fascinating question which begs to be answered. After all, how could good (and even great) companies like Nortel, Kodak, and others fail? Yet somehow they have. Each the leader in

          Read More »

          FoxNet Rides for Mental Health

          “It was early! It was wet! It was a great way to raise money for a cause close to our hearts at FoxNet.” Bill “RPM” Fox The FoxNet team pumped up our bike tires, dusted off our helmets and hit the country roads for Ride Don’t Hide this June.  We are proud of our FoxNet

          Read More »

          Team FoxNet Participating in Ride Don’t Hide

          Mental illness is an issue that will impact all Canadians at some point in their lives, either directly or indirectly. For this reason, we are eager to take part in the Ride Don’t Hide event on June 24th. Our team of 12 (and growing) will join thousands of riders coming together to help put an

          Read More »

          Keys to Successful IoT Implementation

          by William Dupley Introduction A successful military strategy depends on the ability of leadership to identify potential obstacles and barriers and ensure their strategy is agile enough that it can adapt. IoT projects also require in-depth implementation barrier analysis to uncover any potential obstacle that could impact a successful implementation. IoT and OT (Operational Technology)

          Read More »
  • Careers
  • Contact

Keys to Successful IoT Implementation

Share on linkedin
Share on facebook
Share on twitter
Share on email
Share on print

by William Dupley


A successful military strategy depends on the ability of leadership to identify potential obstacles and barriers and ensure their strategy is agile enough that it can adapt. IoT projects also require in-depth implementation barrier analysis to uncover any potential obstacle that could impact a successful implementation.

IoT and OT (Operational Technology) are now being deeply integrated. AI, Blockchain, Edge Computing and Serverless Architecture are now rapidly being included in IoT environments. At the same time, cybercriminals are targeting IoT devices and looking for every opportunity to exploit weaknesses in IoT infrastructures.[1] These trends demand that a comprehensive analysis methodology is in place to identify all transformation work that is required to ensure a successful IoT implementation – prior to any engagement.

OACA Cloud Maturity Model Version 4.0

To address these demands, the Open Alliance for Cloud Adoption (OACA) has released version 4.0 of the Cloud Maturity Model (CMM). The OACA Cloud Maturity Model has been developed to provide IT implementation teams with a detailed assessment tool for identifying if the current and future state of IT in their enterprise aligns with the requirements of their business goals. The OACA Cloud Maturity tool has recently been expanded to include IoT technologies and several new IT domains which need to be assessed to ensure the long-term success of IoT projects.

There are 30 domains in version 4.0 of the Maturity Model. These domains are divided into two primary capability areas: (1) non-technical and (2) technical. Each capability area encompasses a set of appropriate domains such as finance, governance, and portfolio management so that a consultant or auditor can simply select and review the capability areas and domains that best apply to a specific IoT use case.

Cloud Maturity Model — Non-Technical CapabilityThe non-technical capability domains and benefits.

Cloud Maturity Model — Technical Capability

The technical capability and benefits.

Version 4.0 has also added Networking, AI, IoT, API’s and ConfigMgt. These domains are critical when implementing an IoT project.

CMM Assessment Process

There are several steps to the CMM assessment process. The graphic below gives an overview of the flow of this assessment process:

Building a Road Map to Hybrid IT

Enablement from a CMM assessment

To create a detailed IoT roadmap, first define a series of projects for each domain. Each of these projects should accomplish the outcomes defined by the desired maturity level an organization is looking to achieve.

The OACA recommends the following approach to building the map:

  1. Analyze business goals and determine new business scenarios that are possible as a result of implementing IoT technology. Define the IoT use cases which support each business scenario.
  2. Analyze each IoT use case, determine the CMM level that accurately describes the current state for each of the domains covering both technical and non-technical capabilities.
  3. Analyze each IoT use case, determine the CMM level that describes the desired target state for each of the domains for both technical and non-technical capabilities.
  4. Determine a list of elements that need to be addressed using the outcomes identified in the assessment per CMM level. Higher maturity level layers build upon the previous layers; begin at CMM 1 and build upward.
  5. Analyze each of the elements in the people, process, and technology layers per domain, determine what will help close the gap — examples may include, the incorporation of a methodology or framework, a process update, tooling updates, and any education and skills development or augmentation.
  6. Build a practical timeline for addressing these gap items within the environment. Often, the implementation of technology elements should follow process and skill related updates. Consider creating a Cloud adoption program office or cloud adoption center of excellence (CoE) composed of champions and transformation processes/tools to empower those tasked with specific roadmap projects.
  7. Perform ongoing measurement of the resulting benefits after each milestone is completed. Use these measurements to shape the resulting roadmap for each domain to ensure that the business objectives and IoT benefits being sought are realized.
  8. Review and group appropriate tasks together. Determine estimated resource requirements in order to integrate the planning with daily business operations. This effort may be led by the Cloud/IoT adoption program office (of the individual tasked with this).
  9. Create draft project plans for each domain taking into consideration any cross-domain dependencies, prerequisites or corequisites.
  10. Determine appropriate key performance indicators (KPIs) for measuring the progress of specific updates and the benefits or enablement that the changes generate.

Barrier Elimination

When planning an IoT roadmap, the experienced analyst must consider which barriers must be overcome. Common barriers to be considered for each domain during the analysis can be uncovered by asking these simple questions:

  • Do cloud skills exist?
  • Do IoT skills exit?
  • Are there unique applications in the environment that inhibit cloud use?
  • Is there a perception of entitlement?
  • Are there union-driven job classifications?
  • Has leadership provided a mandate to move to the cloud or IoT technologies?
  • Is there a compensation scheme supporting cloud/IoT adoption?
  • Are there software licensing constraints and or physical requirements such as a licensing dongle?

For each of the barriers uncovered, a solution or project must be included in the IoT transformation plan taking into consideration the organization’s hierarchy, culture, structure, and business strategy.

Here is an example of a Barrier Analysis Pareto chart. Each of the barrier categories require particular projects to be included in the implementation plan to ensure the barriers are successfully eliminated.

Building a Roadmap

 The last step is to build a comprehensive roadmap.  This roadmap contains the IoT projects, barrier analysis projects, and domain transformation projects. The roadmap brings together all initiatives for execution, coordination, and governance.

An example roadmap based on the result of a CMM analysis.

What does this mean for me?

The winning formula for a successful IoT project is:

IoT Data + Analytics + Strategic Planning = Smart Initiative

The key to a successful strategy is the ability to uncover the obstacles to the project’s success. The OACA Cloud Maturity Model provides an excellent toolset to help you in your IoT journey.

FoxNet uses the OACA CMM analysis toolset and methodology as a key component when developing a successful IoT Strategy.

Follow-up Material

The OACA Cloud Maturity Model Usage Manual and Assessment tools can be downloaded here

For additional Information on our IoT Workshop reach out directly to John Chiappetta, Head of IoT, North America at jchiappetta@

[1] https://threatpost.com/bugs-in-logitech-harmony-hub-put-connected-iot-devices-at-high-risk/131776

About the Author

Bill Dupley is a Digital Strategist at FoxNet. He has led IT transformation and strategic planning teams for over 50 companies and governments worldwide and bring extensive experience in IT & Business Strategic Planning, IT process design, and enterprise architecture. Bill has held several positions over his career including the Cloud Chief Technologist for Hewlett-Packard Enterprise Canada and Director of Strategy and Business Development for HPE Canada Consulting. He is a graduate of Ryerson University, a former member of the HPE IT Global SWAT Team, and a member of the Open Data Center Alliance Cloud Maturity Model authorship team. He is dedicated to helping customers equip themselves rapidly for our ever-changing technological world.

Scroll to Top