Effective response to threats

Alerting process

A well thought-out alerting process is crucial to counter threats quickly and in a targeted manner. From the detection of an event to the triggering and transmission of alarms and targeted intervention, we offer you a comprehensive alerting strategy designed for reliability and precision. Using state-of-the-art alarm triggers and transmission technologies, our system ensures that security incidents are detected at an early stage and immediately forwarded to the right people. Fast alarm processing means that the planned intervention is initiated immediately, providing optimum support for your security structure.

A modern alarm system mounted on a concrete pillar in an industrial environment.
Core element of their security concept

Alerting process

01

Event

A security-relevant event is detected by sensors, surveillance cameras or other security components.

02

Alarm trigger

The system recognizes the event and triggers an alarm automatically or manually.

03

Alarm verification

Immediate verification of the alarm signal, for example by video verification, ensures that it is an actual event and reduces false alarms.

04

Alarm management

The alarm software enables centralized management of all alarm systems, flexible notifications and precise logging.

05

Alarm transmission

The triggered alarm is forwarded via one or more transmission methods (e.g. mobile radio, Internet, LAN) to the location(s) defined in the alarm escalation - persons, alarm receiving center, security personnel.

06

Alarm intervention

Security forces or emergency services take targeted measures to neutralize the threat and prevent damage.

Immediate response to threats

Alarm triggering


Alarm triggering is the central moment in the alarm process, when the system reacts to security-relevant events such as unwanted intrusion, technical alarms such as heating failure or panic and heat alarms and initiates all further steps. Various types of alarm triggering ensure that specific threats are reliably detected and averted.

  • Automatic alarm triggering

    Security and technical sensors detect anomalies such as unauthorized movements, glass breakage or smoke development and automatically trigger an alarm. This enables a rapid response to security-critical events and technical faults.

  • Manual alarm triggering

    An alarm can be activated manually with a simple press of a button via the hand-held transmitter or the app. This method allows staff to respond immediately in emergency situations.

  • Video-verified alarm triggering

    The alarm event is generated by analysis software that evaluates the images from the surveillance cameras. The alarm is then visually verified and processed by a person in an alarm receiving center. This reduces false alarms and enables rapid, targeted intervention.

A modern glass breakage sensor is mounted on a wooden wall near a broken glass element. The glass pane shows clear signs of breakage with a large opening in the middle. The sensor has a green light signaling active monitoring. The image emphasizes security technology and its application to glass surfaces.
A surveillance room with numerous screens displaying security camera images. In the foreground, a person can be seen holding a phone and working with a microphone. The scene is kept in subdued light, with a focus on the screens and the surveillance equipment. The image conveys professional security monitoring and alarm verification.
Precision before reaction

Alarm verification

Alarm verification is a crucial step in the alerting process to assess the actual threat situation and minimize false alarms. Through rapid, targeted verification, we ensure that each alarm is only escalated when actually required.

  • Video verification

    If an alarm is triggered, the system accesses networked surveillance cameras to visually check whether there is actually a threat. This enables a quick decision to be made as to whether intervention is necessary.

  • Sensor calibration

    With the help of several sensors that detect movement, noise or other anomalies, the system can precisely confirm the authenticity of an alarm signal. This significantly reduces false alarms and makes more efficient use of resources.

  • Alarm confirmation by staff

    In certain cases, an alarmed employee can check and confirm the event directly via a mobile app or a connected control panel.

Alarm verification offers you maximum security and efficiency by ensuring rapid and targeted action as soon as an actual incident occurs.

Intelligent control for maximum safety

Alarm management using alarm software

The alarm software simplifies the management and monitoring of all alarm systems and enables a precise, rapid response to security-related incidents. It collects and processes alarm data centrally, logs events and reliably forwards messages to the responsible persons or emergency services.

  • Central control

    The software enables central monitoring and control of all alarms so that you always have a complete overview.

  • Customizable notifications

    Alarms can be forwarded flexibly to the right personnel - via push, SMS, email or phone call. This means that every alarm message reaches the right person without delay.

  • Logging and analysis

    The software documents all alarms and provides reports that help to optimize security processes and improve response times.

With our alerting software, your security infrastructure remains efficient and easy to manage - for maximum protection and control.

Intimate and reliable

Insight into the alerting software

A user interface of an alerting software with various settings and options. On the left is a navigation menu with items such as Dashboard, Alarms, Locations, Event Logs, Events, Jobs, Analytics and more. In the center are details about an incoming alarm, including alarm type, alarm header and alarm code. On the right, there are specific options such as "Prevent parallel execution" and "Run in background".
Fast forwarding for an immediate response

Alarm transmission

Alarm transmission is an essential step in the alerting process, ensuring that an alarm is immediately forwarded to the relevant authorities. We rely on reliable, multi-layered transmission methods to ensure fast and secure communication, even at critical moments.

  • Mobile radio transmission (GSM/4G)

    Independent of the local network and ideal in the event of network failures.

  • Internet transmission (LAN/WLAN)

    Fast transmission in real time for immediate response.

  • Redundant transmission

    Combination of several methods for hedging.

  • Notification via push, SMS or call

    Direct alarm forwarding to mobile devices for rapid action.

A modern server room with several rows of server racks protected by glass fronts. The room is clean, well-lit and fitted with white tiles. In the background is a door with a green emergency exit sign. The servers are equipped with illuminated indicator lights and screens that display the operation and status of the devices.
A police car with its siren on and red and blue flashing lights in the foreground. In the background is a blurred scene of people standing in an illuminated interior or subway station. A police officer in uniform is partially in the picture as he stands next to the car.
Measures in an emergency

Alarm intervention

As soon as an alarm has been verified, a targeted intervention is organized to respond to the threat quickly and effectively. Depending on the type of incident, the alarm center can contact the police, fire department, a security service or an internal company department.

  • Choosing the right intervention agency is crucial in order to respond quickly and appropriately to the incident and minimize damage.

Effective alarm intervention requires not only the selection of the appropriate location, but also careful coordination and clear processes. This ensures that no valuable time is lost in an emergency and that damage or losses are kept to a minimum.

Alerting process

Frequently asked questions

What is an alerting process and why is it important?

What does alarm verification mean and how is it carried out?

What are the advantages of video-verified alarm triggering?

How are alarm messages forwarded to the relevant departments?

Which technologies are used for alarm transmission?

Can the alerting process be adapted to my company's requirements?

How does the alarm transmission work in the event of a power failure?

Two smiling men, Manuel Zingg and Samuel Zimmermann, sit next to each other in an office with a plant in the background. Both are wearing black clothing and appear relaxed and friendly.
Contact us

Security questions? We are happy to help you.

Whether you need individual advice or have specific questions about our solutions - we are at your disposal in person. Let's find out together how we can best meet your security requirements. Simply contact us and we will find the right solution for you.

Manuel Zingg & Samuel Zimmermann

Co-Founder & Head of Technology