Hazardous chemical monitoring

September 2014 Industrial (Industry)

Taminco Chemicals plays a role in nearly everything consumers use, as the leading alkylamines and derivatives producer in the world developing food additives, soaps, fuels and more. To monitor and record all daily activity in its US manufacturing facilities, Taminco has deployed Milestone XProtect video management software (VMS) for overseeing employee safety while delivering hazardous chemicals to and from manufacturing, and ensuring compliance with federal regulations.

“Our products are manufactured and loaded for shipping every day into rail cars and trucks, all of which are thoroughly regulated by the Departments of Transportation and Homeland Security. At times, we may be required to have a technician no more than 25 feet from a load, but with the Milestone video system, there are exceptions we can apply to increase safety and help save time and energy. We can adjust camera views and record every second of a load to ensure there is no spillage while keeping our inventory counts accurate,” says Matt Bodi, IT manager, Taminco USA.

For distribution around the globe, Taminco develops both simple and complex chemical solutions that are used for applications in many industries. The raw materials and end products manufactured in the labs can pose a threat if handled inappropriately or misused, so regulations imposed by the Department of Homeland Security and Department of Transportation (such as the Chemical Facility Anti-Terrorism Standards or CFATS) ensure that the transfers of barrels, jugs and vats are well-documented and monitored for national security purposes. Keeping its efficient yet cautious staff adhering to regulations is a top priority for the company.

Milestone XProtect Enterprise video management software has been deployed by Milestone Partner MMR, to address an outdated analogue camera system in Taminco’s Louisiana and Florida factories. With Milestone’s open platform, Taminco was able to test and choose the highest-quality cameras – including Bosch explosion-proof devices – to keep the factories secure. Milestone’s monitoring abilities assist in the safe and compliant conveyance of chemicals to and from the factories.

The knowledge factor behind the Milestone surveillance system is one of the largest advantages for Taminco. Knowing what happens during an incident, which chemicals are involved and where contamination occurred are crucial in maintaining a safe environment for employees during rare emergencies. In such a hypersensitive industry, Milestone’s simple and intuitive interface provides the IT department administrators peace of mind thanks to the video.

For more information contact Milestone Systems, +1 503 350 1100, [email protected], www.milestonesys.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

210 million industrial endpoints secured by 2028
News & Events Information Security Industrial (Industry)
A new study by Juniper Research has found that there will be growth of 107% over the next five years in the number of industrial endpoints featuring cybersecurity protection.

Read more...
Growing cyber threats to SA’s critical infrastructure
News & Events Information Security Industrial (Industry)
The increasing reliance on digital infrastructure makes critical sectors like utilities more susceptible to cyber threats. This concern has been highlighted by Kaspersky's recent discovery of a new SystemBC variant that has targeted a South African nation's critical infrastructure.

Read more...
Smart manufacturing redefined
Hikvision South Africa Surveillance Industrial (Industry)
AI and intuitive visualisation technology allows managers to monitor manufacturing sites, production, and operational processes, and to respond in real time in the event of an issue – helping to drive efficiency and productivity.

Read more...
CHI selects NEC XON as trusted cybersecurity partner
News & Events Information Security Industrial (Industry)
CHI Limited, Nigeria's leading market player in fruit juices and dairy products, has engaged in a strategic cybersecurity partnership with NEC XON, a pan-African ICT systems integrator.

Read more...
Edge technology can transform manufacturing in South Africa
Axis Communications SA Surveillance Integrated Solutions Industrial (Industry)
Aligning South African manufacturing more closely with this global shift to edge technologies could take manufacturing in the country to a new level, says Axis Communications’ Rudie Opperman.

Read more...
Edge AI and managing risk in the cloud
Industrial (Industry) Infrastructure
As organisations see greater volumes of data generated from their operations. It is understandable and imperative that this data is leveraged to generate more value and increase insight that help operations and asset integrity managers ‘do more, better’.

Read more...
Supporting local manufacturing
Industrial (Industry) Infrastructure
Smart Security asked Esenthren Govender, Solutions Executive at Technodyn for insight into how the company supports local manufacturing organisations to optimise their business.

Read more...
New algorithm for OT cybersecurity risk management
Industrial (Industry) Information Security News & Events Commercial (Industry)
OTORIO’s new risk management model and attack graph analysis algorithm technology, calculates OT cybersecurity threats and provides risk mitigation actions, prioritised according to actual exposure and potential impact on operations.

Read more...
The role of AI in industrial plants
Industrial (Industry)
The average modern industrial plant uses less than 27% of the data it generates, but industrial AI can play a major role in identifying patterns and making process predictions through new software platforms that simplify convergence and analysis of OT/IT/ET data.

Read more...
Addressing the SCADA in the room
Industrial (Industry) Information Security IoT & Automation
Few other sectors command the breadth of purpose-built and custom devices necessary to function, as the industrial and manufacturing industries. These unique devices create an uncommon risk that must be assessed and understood to fully protect against incoming attacks.

Read more...