Reach the full potential of your AVEVA PI System

The service is provided by PIPER Solutions professionals, certified by OSIsoft as specialists in AVEVA PI System™ infrastructure and installation. installation of the AVEVA PI System™. The scope of this package is limited to a single site comprising of 1 PI server node, up to 5 interface nodes, 1 system administrator node, 3 custom applications or node, 3 custom or 3rd party applications and up to 5 PI client stations.

Optimize the use of your PI System to achieve your business objectives.

OSIsoft trained and certified engineers will guide you to get the most out of your PI System.

With more than 6 years of experience handling incidents, we even know what issues can cause you difficulties.

A service to identify weaknesses in your PI Systyem to increase its efficiency:

    Identifying weaknesses:

    A software audit can help identify weaknesses in the implementation and use of data management.

    Increased PI System efficiency:

    An audit can identify opportunities to improve the use of your PI System, which can increase process efficiency and improve productivity.

    Reduced overhead costs:

    The audit can identify areas where the company is wasting resources or paying for functions that are unnecessary for the proper functioning of your PI System, which can generate significant savings in the long run.

    Improved data quality:

    The opportunity will be provided to implement best practices for managing the AVEVA PI System™, allowing the company to improve data quality and make more informed decisions.

    Improved Vendor Relationship:

    An audit can help the company establish a stronger and more transparent relationship with its software vendors, which can lead to improvements in service quality and increased customer satisfaction.

Read more about the AVEVA PI System Audit service

PIPER Solutions is a strategic partner of OSIsoft

AVEVA PI System Benefits:

The AVEVA PI System collects data, stores large amounts, provides context, meaning, and enhances the raw, running real-time analytics to be important insights into your business, flagging them on key batches and events. It is a product already configured and ready to receive maintenance from us; It has the advantage of being able to integrate quickly with other business solutions, to optimize your production, reduce your maintenance costs, protect your staff from unplanned downtime incidents and improve the efficiency of your operational processes.

Audit service objectives

1. Audit the existing AVEVA PI System™ architecture in its current state: Comprehensive assessment of the AVEVA PI System™ infrastructure to identify its current design and configuration.

2. Diagnose system security and performance issues: Identify and analyze potential security vulnerabilities and performance deficiencies in the system.

3. Specify licensing and versioning conditions: Define conditions and requirements related to licenses and software versions used in the system.

4. Evaluate current management practices and propose improvements: Analyze existing management practices and provide recommendations to improve the efficiency and effectiveness of system administration.

5. Propose a scalable system growth plan: Design a strategic plan that allows for future system growth in a scalable and sustainable manner.

6. Evaluate the functionality and usefulness of third-party applications: Analyze and evaluate third-party applications used in the system in terms of their functionality and usefulness.

7. Provide a support plan and improve system performance and usability: Develop a detailed technical support plan to optimize system performance and usability.

8. Provide a backup plan for the system: Establish a robust and reliable backup plan to ensure the integrity and availability of system data in the event of failures or incidents.

9. Deliver a report and recommendations for improvement: The report will consist of the following parts: Introduction, audit deliverables, current AVEVA PI System architecture, licenses and usage, logs, performance metrics, PI Data Archive security model, PI Asset Framework security model, PI Tags and AF configuration, software backup and status, third party application inventory, management practices, recommendations based on best practices, high availability options, conclusions and evidence.


The audit process, starting from order to completion, typically takes 3 to 4 weeks:

Week 1 and 2

Communication of prerequisites. Confirmation of installation date with PIPER. Start of respective reviews and installations.

Week 3 and 4

Review of collected tag information. Prepare and generate final audit report.