Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Effective Alarm Monitoring

July 1, 2004
Expanding on a previous column, System Solutions For The Design Process, here are some more details on the application attributes of alarm monitoring in a server-based access control system.

Access control system alarm monitoring, in its simplest form, is the reporting of alarm or supervisory signal transitions from normal to alarm and vice versa. Most medium- to high-end access control systems have the ability to monitor various types of alarms, such as intrusion, space protection, tamper and system supervisory, all of which are considered essential to the alarm monitoring process.

Of the alarm types listed, the only alarms I have not discussed in a previous article are the system supervisory alarms. These are usually intrinsic to the access control hardware and software. Supervisory alarms generally relate to the loss of communications between the access control server and various system components such as credential readers, control panels and client workstations. The reporting normally occurs from the monitoring point to the access control server, access control client workstation or both.

When alarm monitoring is implemented, it is obviously critical that someone be able to respond to its signal. Ideally, the system should feature a security control room with assigned personnel monitoring the system for alarms and responding accordingly. But as this is not practical in all cases, end users without the resources to provide dedicated personnel for security monitoring often have to improvise.

When implementing a centralized monitoring system, and given that you possess a dedicated and competent staff, there are several ways to execute effective monitoring of the system. Intrusion, motion and tamper alarms can be monitored at the security control room by the security staff, and supervisory alarms can be partitioned out and monitored separately by the engineering services staff at a remote access control client workstation. When the security staff receives an signal stating that the access control system has received a supervisory alarm, they can immediately respond or investigate. During that period of time, the engineering staff can query the system for information regarding the supervisory alarm and quickly mobilize to minimize system down time.

For companies with offices located in several different cities, or even multinational offices, alarm monitoring can be developed into a far more sophisticated reporting system. Companies that have a dedicated security staff may only deploy a full staff during business hours and a scaled-down crew at night or on weekends. When this is the case, the skeleton crew may be spread thin and might have to patrol and monitor at the same time. Consequently, there may be a time when the access control computer is unmanned. End user-owned digital pager and radio systems with access control system interfaces have been popular for quite a few years in this scenario. However, in some cases, these are not as practical as the commercial cellular system for use as a communication system.

Roll over the alarms

When the security staff is required to be away from the monitoring station and alarms still need to be responded to, alternative devices are necessary to facilitate the continuous monitoring of alarms. Solutions to this problem have been addressed through several creative means. For instance, when an alarm is received at a temporarily unmanned monitoring station, the system can be programmed to roll the unacknowledged alarm over to an alternate monitoring station after a predetermined amount of time has elapsed.

Additionally, the alarm can be programmed to continue to roll from monitoring station to monitoring station until the alarm is acknowledged. Of course, along with the rollover feature, there has to be accountability for not acknowledging or responding to the alarm in a timely manner. Even though the alarm has rolled over to an alternate monitoring station, the originating monitoring station has the responsibility of acknowledging the alarm and submitting a report explaining why the alarm was required to roll over, thus creating accountability.

In today’s security climate, effective monitoring and timely response to alarms is more necessary than ever before. The more sophisticated and prepared the end users can prove themselves to be at implementing the available features of access control and security monitoring systems, the more capable they will be at detecting and deterring the undesirable elements threatening persons and property.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 19, 2025

From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Before the Alarm Sounds – Developing Effective Monitoring Response Plans

    See More
  • Unique IP Comes to Alarm Monitoring, Helps Cut False Alarm Fines

    See More
  • Image Transmission – IT with Alarm Monitoring

    See More

Related Products

See More Products
  • effective.jpg

    Effective Physical Security, 5th Edition

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products

Events

View AllSubmit An Event
  • January 9, 2012

    AVHS: Server Software for Hosting of Video Monitoring Services

    Easy access to security video via the internet is becoming increasingly popular, both for verification of alarms by central alarm stations as well as monitoring small businesses and homes by end customers. AXIS Video Hosting Systems (AVHS) is an easy and cost-effective way to implement true remote monitoring and further develop your business. Learn how you can take advantage of this new product, and capitalize on a fast growing market.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing