Third-party remote monitoring alarm flow

Last modified: Wednesday June 11, 2025.

third-party alarm response flow diagram

When an alarm is triggered in an Alta Protect deployment using a third-party monitoring service integration, the alarm should be processed as follows.

  1. Alarm triggered in an armed zone at the customer site.
  2. Alarm data and video (if available) flows to the Alta Protect platform via the cloud.
  3. The Alta Protect platform processes the alarm data and performs any partner configured alarm actions, such as sending emails, shared video links, webhooks, or triggering API integrations.
  4. At least one triggered action passes alarm data and video (if available) to the third-party monitoring service via their own processes and mechanisms, as configured by the partner or service provider.
  5. The service operators review and respond to the alarm data in accordance with their own operating procedures and any other agreements with the partner.
  6. If appropriate, the partner can configure API and webhook responses from the third-party service back into Alta Protect to continue managing the alarm response within the platform.