Realize the limitless possibilities that are unlocked when you connect equipment, infrastructure, and people and leverage those connections across secure, reliable and expandable networks.
Take the interactive tour and discover how your water and wastewater operations can maximize productivity and safety with the Motorola Solutions’ Industrial Internet of Things.
Every second counts when averting disaster. A digital oil rig helps drive better and faster decisions that can make all the difference. Efficient wireless voice and data communications help workers offshore and onshore securely reach out and be reached - so emergency calls get to the right person immediately upon recognition of an issue. Take the interactive tour and discover how the industrial internet of things from Motorola Solutions can make all the difference in the moments that matter most.
Ensure emergency calls from the platform are immediately received and given high priority by the control room operator and the Offshore Installation Manager. With Preemptive priority calling, emergency calls take precedence over all other types that are being made simultaneously. Calls can be made by supervisors and other key personnel, so crucial operational information is always relayed without delay.Case Study
Having a team with harmonized radio IDs and fleet maps is imperative to averting any crisis. With Remote Terminal Management, the software and configurations of every radio terminal can be governed remotely from one central location. Once all radios and fleet maps have been harmonized using the ACE3600 remote terminal management, a control room operator can recognize the crew member’s radio and capture the incident details.ACE 3600 Data Sheet
Via integration of the radio system with the oil rig’s Public Address and General Alarm, an Offshore Installation Manager can circumvent the unthinkable by activating alarms and making a PA announcement via his radio. Emergency scenarios such as oil spills can be preconfigured in the system and can be automatically activated in response to such emergency incidents.Explore Smart Siren Solutions
Control room operators can activate an emergency shutdown via an ACE3600 RTU (Remote Terminal Unit) and can take additional steps to control the source of a potential leak before it occurs. By relying on Motorola’s proven Supervisory Control and Data Acquisition (SCADA) systems, oil rigs can operate more intelligently across all organizations. Keeping all oil rig sensors connected enhances productivity and safety.Discover the Industrial IoT Suite
When it comes to speed during a state of an emergency, nothing is faster than PTT. WAVE™, a unified Push-to-Talk application, allows for always-on communication for faster response across all networks and all devices in the moments that matter. Thus, Offshore Installation Managers can connect to any on-duty Emergency Coordinator’s desktop client immediately in an emergency.Discover Team Communications
With automated notification, all or parts of a team can be put on notice simply by one push of a button. To alert and activate emergency response teams, the notification system can send messages to the spill management teams, immediately mobilizing Backup Tier 2 resources.Industrial IoT Infographic
On closure of an emergency situation, logs of voice traffic can be securely stored for post-incident analysis. Analyzing a major emergency after the fact is critical to understanding how well you, your organization and outside agencies responded and recovered from the event. And with the energy sector being one of the most vulnerable industries to cyber attacks, you can ensure your incident logs are resilient of potential cyber threats.Protect Your Incident Logs
The energy sector is one of the most susceptible industries to cyber attacks. In fact, according to the U.S. Department of Homeland Security, in 2014 a staggering 32% of all cyber attacks targeted energy companies. Cyber criminals are targeting the entire spectrum of potentially valuable data: data at rest, data in transit, and data in use.
Be confident that all points of entry between your computers, system servers, communications network and the outside world are secure. Limit points of vulnerability and prevent attempts to compromise any part of your systems with: security policy enforcement, authentication, access control, application whitelisting, intrusion detection system, unused port deactivation, TCP/IP connection, data at rest protection and AES 256 encryption.IIoT Cybersecurity Brochure