{"id":32629,"date":"2026-05-08T16:02:56","date_gmt":"2026-05-08T16:02:56","guid":{"rendered":"https:\/\/ecam.com\/?p=32629"},"modified":"2026-05-08T16:03:03","modified_gmt":"2026-05-08T16:03:03","slug":"what-is-energy-surveillance-security","status":"publish","type":"post","link":"https:\/\/ecam.com\/en-ca\/security-blog-ca\/what-is-energy-surveillance-security","title":{"rendered":"What Is Energy Surveillance Security and How Does It Protect Critical Infrastructure?\u00a0"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Key Takeaways<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>What is energy surveillance security?<br><\/strong>\u00a0Energy surveillance security uses video monitoring, AI detection, and remote intervention to protect critical energy infrastructure such as substations, solar farms, and oil and gas sites.<\/li>\n\n\n\n<li><strong>Why is surveillance important in the energy sector?<br><\/strong>\u00a0Energy facilities are high-risk, often remote, and vulnerable to theft, vandalism, and unauthorized access.<\/li>\n\n\n\n<li><strong>What are the best solutions for energy security?<br><\/strong>\u00a0Energy remote video monitoring, live video surveillance, and mobile surveillance units provide the most effective protection.<\/li>\n\n\n\n<li><strong>Can surveillance systems prevent energy site theft?<br><\/strong>\u00a0Yes. Live monitoring with real-time intervention can deter and stop incidents before they escalate.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What Is Energy Surveillance Security?<\/h2>\n\n\n\n<p><a href=\"https:\/\/ecam.com\/en-ca\/industry-security-solutions\/energy-critical-infrastructure-security\"><strong>Energy surveillance security<\/strong><\/a><strong> is a system of cameras, AI analytics, and live monitoring designed to protect energy infrastructure from theft, vandalism, and unauthorized access.<\/strong><\/p>\n\n\n\n<p>This includes protection for:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Solar farms<\/li>\n\n\n\n<li>Wind farms<\/li>\n\n\n\n<li>Electrical substations<\/li>\n\n\n\n<li>Oil and gas facilities<\/li>\n\n\n\n<li>Battery storage sites<\/li>\n<\/ul>\n\n\n\n<p>Energy surveillance security systems typically combine:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fixed and mobile surveillance cameras<\/li>\n\n\n\n<li>AI-powered threat detection<\/li>\n\n\n\n<li>Remote monitoring services<\/li>\n\n\n\n<li>Real-time response capabilities<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-group comp-faq-details comp-faq-details-centered cols-wrap-no-gap cols-tablet-space-between\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns margin-top-lg cols-wrap-no-gap is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div id=\"rank-math-faq\" class=\"rank-math-block faq-always-open\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1743261233710\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong><strong><strong><strong><strong><strong>Is energy surveillance security different from traditional security systems?<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Yes. Energy sites require remote monitoring, wide-area coverage, and solutions designed for unmanned or isolated environments.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Why Are Energy Sites High-Risk?<\/h2>\n\n\n\n<p><strong>Energy sites are high-risk because they are often remote, contain valuable equipment, and operate with limited on-site personnel.<\/strong><\/p>\n\n\n\n<p>Key risk factors include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Remote locations:<\/strong> Limited visibility and delayed response<\/li>\n\n\n\n<li><strong>High-value assets:<\/strong> Copper wiring, transformers, and equipment<\/li>\n\n\n\n<li><strong>Unmanned operations:<\/strong> Minimal or no on-site staff<\/li>\n\n\n\n<li><strong>Large perimeters:<\/strong> Difficult to secure with traditional methods<\/li>\n<\/ul>\n\n\n\n<p><strong>Common risks in energy environments:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Risk<\/strong><\/td><td><strong>Impact<\/strong><\/td><td><strong>Why It Happens<\/strong><\/td><\/tr><tr><td>Copper theft<\/td><td>Operational disruption<\/td><td>High resale value<\/td><\/tr><tr><td>Vandalism<\/td><td>Repair costs and downtime<\/td><td>Low visibility<\/td><\/tr><tr><td>Trespassing<\/td><td>Safety and liability risks<\/td><td>Open access points<\/td><\/tr><tr><td>Equipment damage<\/td><td>Loss of productivity<\/td><td>Lack of monitoring<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div class=\"wp-block-group comp-faq-details comp-faq-details-centered cols-wrap-no-gap cols-tablet-space-between\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns margin-top-lg cols-wrap-no-gap is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div id=\"rank-math-faq\" class=\"rank-math-block faq-always-open\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1743261233710\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong><strong><strong><strong><strong><strong><strong>What is the biggest security threat to energy infrastructure?<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Theft of materials like copper and equipment damage are among the most common and costly threats.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How Does Energy Remote Video Monitoring Work?<\/h2>\n\n\n\n<p><strong>Energy <\/strong><a href=\"https:\/\/ecam.com\/en-ca\/solutions\/live-video-monitoring-and-surveillance\"><strong>remote video monitoring<\/strong><\/a><strong> uses cameras, AI detection, and live operators to monitor and protect sites in real time.<\/strong><\/p>\n\n\n\n<p>Here\u2019s how it works:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>Cameras are installed across the site or deployed via mobile units<\/li>\n\n\n\n<li>AI detects suspicious behavior such as intrusion or loitering<\/li>\n\n\n\n<li>Alerts are sent to a remote monitoring center<\/li>\n\n\n\n<li>Operators assess the situation immediately<\/li>\n\n\n\n<li>Action is taken, including:\n<ul class=\"wp-block-list\">\n<li>Live audio warnings<\/li>\n\n\n\n<li>Escalation to law enforcement<\/li>\n\n\n\n<li>Incident documentation<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<p><strong>Why this matters:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Traditional Surveillance<\/strong><\/td><td><strong>Energy Live Video Monitoring<\/strong><\/td><\/tr><tr><td>Records incidents<\/td><td>Prevents incidents<\/td><\/tr><tr><td>No real-time response<\/td><td>Immediate intervention<\/td><\/tr><tr><td>Limited deterrence<\/td><td>Active deterrence<\/td><\/tr><tr><td>Requires manual review<\/td><td>Automated + human response<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div class=\"wp-block-group comp-faq-details comp-faq-details-centered cols-wrap-no-gap cols-tablet-space-between\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns margin-top-lg cols-wrap-no-gap is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div id=\"rank-math-faq\" class=\"rank-math-block faq-always-open\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1743261233710\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong><strong><strong><strong><strong><strong><strong><strong>Is energy live video surveillance effective for remote sites?<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Yes. It is specifically designed for remote and unmanned environments where traditional security is ineffective.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What Are Mobile Surveillance Units and Why Are They Used?<\/h2>\n\n\n\n<p><a href=\"https:\/\/ecam.com\/en-ca\/solutions\/mobile-surveillance-units\"><strong>Mobile surveillance units<\/strong><\/a><strong> are self-contained security systems that provide rapid-deployment monitoring for energy sites without permanent infrastructure.<\/strong><\/p>\n\n\n\n<p>These units are critical for:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Temporary or remote locations<\/li>\n\n\n\n<li>Construction phases of energy projects<\/li>\n\n\n\n<li>Expanding coverage in high-risk areas<\/li>\n<\/ul>\n\n\n\n<p><strong>Types of mobile surveillance solutions:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Mobile surveillance towers<\/strong>\n<ul class=\"wp-block-list\">\n<li>Elevated cameras for wide-area visibility<\/li>\n\n\n\n<li>Ideal for large solar or wind farms<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Mobile surveillance cameras<\/strong>\n<ul class=\"wp-block-list\">\n<li>Flexible placement across sites<\/li>\n\n\n\n<li>Quick deployment<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Mobile video security systems<\/strong>\n<ul class=\"wp-block-list\">\n<li>Integrated cameras, power, and connectivity<\/li>\n\n\n\n<li>Designed for off-grid environments<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>Benefits of mobile surveillance units:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Rapid deployment<\/li>\n\n\n\n<li>No permanent infrastructure required<\/li>\n\n\n\n<li>Scalable across multiple sites<\/li>\n\n\n\n<li>Effective in remote environments<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-group comp-faq-details comp-faq-details-centered cols-wrap-no-gap cols-tablet-space-between\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns margin-top-lg cols-wrap-no-gap is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div id=\"rank-math-faq\" class=\"rank-math-block faq-always-open\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1743261233710\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong><strong><strong><strong><strong><strong><strong><strong><strong>What is a mobile surveillance tower?<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>A mobile surveillance tower is a portable unit with elevated cameras and power systems designed to monitor large areas such as energy sites.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What Features Should Energy Surveillance Systems Include?<\/h2>\n\n\n\n<p><strong>Energy surveillance systems should include AI detection, remote monitoring, mobile deployment options, and reliable connectivity for remote environments.<\/strong><\/p>\n\n\n\n<p><strong>Must-have features:<\/strong><\/p>\n\n\n\n<p><strong>AI-Powered Detection<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identifies threats automatically<\/li>\n\n\n\n<li>Reduces false alarms<\/li>\n<\/ul>\n\n\n\n<p><strong>Remote Monitoring Services<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>24\/7 live oversight<\/li>\n\n\n\n<li>Immediate response<\/li>\n<\/ul>\n\n\n\n<p><strong>Mobile Surveillance Capability<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Flexible deployment<\/li>\n\n\n\n<li>Ideal for remote or temporary sites<\/li>\n<\/ul>\n\n\n\n<p><strong>Two-Way Audio Deterrence<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enables real-time intervention<\/li>\n<\/ul>\n\n\n\n<p><strong>Reliable Connectivity<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Works in remote or low-infrastructure areas<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-group comp-faq-details comp-faq-details-centered cols-wrap-no-gap cols-tablet-space-between\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns margin-top-lg cols-wrap-no-gap is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div id=\"rank-math-faq\" class=\"rank-math-block faq-always-open\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1743261233710\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong>Do energy surveillance systems work without on-site staff?<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Yes. Remote video monitoring allows full protection without the need for on-site personnel.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How to Choose the Right Energy Surveillance Security Solution<\/h2>\n\n\n\n<p><strong>The right energy surveillance security solution should be scalable, reliable in remote environments, and capable of real-time threat detection and response.<\/strong><\/p>\n\n\n\n<p><strong>What to look for:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Experience in energy sector security<\/li>\n\n\n\n<li>Proven remote monitoring capabilities<\/li>\n\n\n\n<li>Mobile surveillance unit options<\/li>\n\n\n\n<li>AI-powered technology<\/li>\n\n\n\n<li>Fast response protocols<\/li>\n<\/ul>\n\n\n\n<p><strong>Comparison of energy surveillance solutions:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Solution Type<\/strong><\/td><td><strong>Best For<\/strong><\/td><td><strong>Key Advantage<\/strong><\/td><\/tr><tr><td>Fixed cameras<\/td><td>Permanent sites<\/td><td>Continuous coverage<\/td><\/tr><tr><td>Mobile surveillance units<\/td><td>Remote\/temporary sites<\/td><td>Flexibility<\/td><\/tr><tr><td>Live video monitoring<\/td><td>High-risk locations<\/td><td>Real-time response<\/td><\/tr><tr><td>Hybrid systems<\/td><td>Large operations<\/td><td>Scalable protection<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div class=\"wp-block-group comp-faq-details comp-faq-details-centered cols-wrap-no-gap cols-tablet-space-between\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns margin-top-lg cols-wrap-no-gap is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div id=\"rank-math-faq\" class=\"rank-math-block faq-always-open\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1743261233710\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong>What is the most effective energy surveillance strategy?<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>A combination of fixed cameras, mobile surveillance units, and live monitoring provides the most comprehensive protection.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">FAQs About Energy Surveillance Security<\/h2>\n\n\n\n<div class=\"wp-block-group comp-faq-details comp-faq-details-centered cols-wrap-no-gap cols-tablet-space-between\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns margin-top-lg cols-wrap-no-gap is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div id=\"rank-math-faq\" class=\"rank-math-block faq-always-open\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1743261233710\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong>What is energy remote video surveillance?<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>It is the use of remotely monitored cameras to protect energy infrastructure from theft and unauthorized access.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1778255725181\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong>Can surveillance systems prevent copper theft?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Yes. Live monitoring and deterrence significantly reduce theft attempts.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1778255736365\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong>Are mobile surveillance units reliable for energy sites?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Yes. They are designed for remote environments and provide flexible, scalable security.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1778255754342\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong>How quickly can energy surveillance systems respond to threats?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Most systems respond within seconds through live monitoring and intervention.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts<\/h2>\n\n\n\n<p>Energy surveillance security is essential for protecting critical infrastructure in remote and high-risk environments. By combining live video monitoring, mobile surveillance units, and AI-powered detection, energy companies can move from reactive security to proactive protection.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/ecam.com\/get-pricing\">SPEAK TO AN EXPERT<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":125,"featured_media":32627,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[325],"tags":[635,636,637,638,1055,639,640,641,575],"industry":[344],"solution":[433,434],"class_list":{"0":"post-32629","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-blog-ca","8":"tag-energy-live-video-monitoring","9":"tag-energy-live-video-surveillance","10":"tag-energy-remote-video-monitoring","11":"tag-energy-remote-video-surveillance","12":"tag-energy-surveillance-security","13":"tag-mobile-surveillance-camera","14":"tag-mobile-surveillance-tower","15":"tag-mobile-surveillance-units","16":"tag-mobile-video-security","17":"industry-energy-en-ca","18":"solution-live-video-monitoring-en-ca","19":"solution-mobile-video-surveillance-en-ca","20":"entry"},"acf":[],"_links":{"self":[{"href":"https:\/\/ecam.com\/en-ca\/wp-json\/wp\/v2\/posts\/32629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ecam.com\/en-ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ecam.com\/en-ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ecam.com\/en-ca\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/ecam.com\/en-ca\/wp-json\/wp\/v2\/comments?post=32629"}],"version-history":[{"count":0,"href":"https:\/\/ecam.com\/en-ca\/wp-json\/wp\/v2\/posts\/32629\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ecam.com\/en-ca\/wp-json\/wp\/v2\/media\/32627"}],"wp:attachment":[{"href":"https:\/\/ecam.com\/en-ca\/wp-json\/wp\/v2\/media?parent=32629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ecam.com\/en-ca\/wp-json\/wp\/v2\/categories?post=32629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ecam.com\/en-ca\/wp-json\/wp\/v2\/tags?post=32629"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/ecam.com\/en-ca\/wp-json\/wp\/v2\/industry?post=32629"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/ecam.com\/en-ca\/wp-json\/wp\/v2\/solution?post=32629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}