Remote monitoring

Last modified: Friday June 06, 2025.

Operators in certified centers can monitor your security system and review triggered alarms. If they determine an alarm is valid, they request the dispatch of security personnel to the alarm site.

Using the Alta Protect monitoring service

You can add remote monitoring as a licensed service to your Alta Protect deployment. For more information, see Alta Protect monitoring service.

Local compliance

You must check for local regulations that control the use of alarm systems. See Local authority licensing and dispatches.

License usage and false alarms

After installation, you must review the number of verification events and dispatch requests.

We recommend not enabling remote monitoring services for the first 14 days of live operation. During this period, make configuration adjustments based on actual site usage and conditions.

  • If your system generates a high volume of false alarms, follow the Protect design guide to optimize your setup, especially the cameras. See Camera setup.
  • You can configure which alarm zones use remote verification or the dispatch request feature. See Triggered alarm actions.

License usage and false alarms

If your system generates a high volume of valid alarms, you might need to add expansion licenses to cover the additional verification and dispatch events.

For more information, see Alta Protect monitoring service licensing

Third-party monitoring

You can use third-party services to monitor your deployment.

  • You can add third-party remote monitoring as an integration:
    • You are responsible for integrating Alta Protect with other services and platforms. See Third-party integrations.
    • Test the configuration of your alarm zones before enabling remote monitoring or dispatch services.
    • Review all verification events and dispatch requests and adjust your setup or licensing agreement as required.
  • You can give external users access to Protect alarm events.
    • You can configure Protect to send webhooks and emails that contain alarm details and external links to video footage. See Alarm and arm/disarm actions.

For more information, Third-party remote monitoring