Remote monitoring
Last modified: Friday February 21, 2025.
Alta Protect monitoring service
You can add remote monitoring as a licensed service to your Alta Protect deployment. For more information, see Alta Protect monitoring service.
- Operators in certified centers monitor your security system and review triggered alarms.
- If operatives determine an alarm is valid, they request the dispatch of security personnel to the alarm site.
You must check for local regulations that control the use of alarm systems. See Local authority licensing and dispatches.
License limits and extensions
The base Alta Protect monitoring service license allows 40 verification events and one dispatch per month.
After installation, you must review the number of verification events and dispatch requests.
We recommend not enabling remote monitoring services for the first 14 days of live operation. During this period, make configuration adjustments based on actual site usage and conditions.
- If your system generates a high volume of false alarms, follow the Protect design guide to optimize your setup.
- If your system generates a high volume of valid alarms, you might need to add expansion licenses to cover the additional verification and dispatch events.
- You can configure which alarm zones use remote verification or the dispatch request feature. See Triggered alarm actions.
Exceeding your license limits
We also review your usage. If you exceed your event or dispatch limits, the service continues to work for a grace period of two months.
If you do not optimize your system to work within your allowances or add additional licensing, we remove the monitoring service at the end of the grace period.
Third-party monitoring
You can use third-party services to monitor your deployment.
- You can add third-party remote monitoring as an integration:
- You are responsible for integrating Alta Protect with other services and platforms. See Third-party integrations.
- Test the configuration of your alarm zones before enabling remote monitoring or dispatch services.
- Review all verification events and dispatch requests and adjust your setup or licensing agreement as required.
- You can give external users access to Protect alarm events.
- You can configure Protect to send webhooks and emails that contain alarm details and external links to video footage. See Alarm and arm/disarm actions.