Two hours is a considerable distance to drive, especially to scare an errant possum. But, according to Kurt Nelson, IT director at Pacific Pipeline System (PPS), that's how security monitoring used to operate. Two hours is a considerable distance to drive, especially to scare an errant possum. But, according to Kurt Nelson, IT director at Pacific Pipeline System (PPS), that’s how security monitoring used to operate. With more than 2,000 miles of crude oil pipeline across the country, PPS had motion detectors installed around several of their facilities. While the detectors warned of trespassers at pumping stations, they didn’t give any visual clue of what was causing the detectors to go off. Using network cameras from Axis technology installed at remote unmanned facilities, controllers now monitor alarms with online real-time video surveillance. They can also watch crews working at remote facilities to ensure their safety. Axis network cameras plug into existing networks and have built in Web servers, which allow them to operate without a PC. Video servers digitize images from CCTV cameras and upload the images to a Web browser, where undoubtedly a possum or two will find its 15 seconds of fame. Related content brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 2023 5 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest CyberFirst Girls aims to introduce girls to cybersecurity, increase diversity, and address the much-maligned skills shortage in the sector. By Michael Hill Sep 26, 2023 4 mins Back to School Education Industry IT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. By Michael Hill Sep 26, 2023 3 mins IT Governance Frameworks Incident Response Data and Information Security news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Generative AI Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe