All Collections
Compliance, Licensing, Trials
Security Controls for Verkada Alarms
Security Controls for Verkada Alarms

This article explains security controls for Verkada Alarms data

Updated over a week ago

Verkada Alarms gives customers peace of mind by providing 24/7 professional monitoring with video verification of events and emergency dispatch services, where available. Users of alarms grant access to their data to Verkada and its partners to review events and notify contacts based on the rules set up in Verkada Command. Learn more about the Roles and Permissions for Alarms.

Org Admins can grant access to the following types of data:

  • In the event of an alarm event, the monitoring agent receives metadata about the customer account, including the location of the facility and contact information; data from Verkada devices, including cameras, access control units, air quality sensors, and intrusion sensors.

  • When an alarm event is triggered, still images, video, and audio data from cameras associated with the event are securely shared with Verkada’s monitoring partners via a unique URL that expires as soon as the alarm is resolved or after 24 hours.

  • Image and audio data is maintained in Verkada’s environment and is not stored by the central station.

  • If audio is enabled on cameras linked to the alarm event, the monitoring agent has access to both image and audio data.

  • Conversations with agents are recorded and used for safety, quality, and training purposes.

Customer data is secured at the central station through the following controls:

  • Monitoring is conducted via 3 U.S.-based, UL-listed, redundant central stations with TMA 5 Diamond-certified quality controls.

  • Central station personnel undergo pre-employment background checks and extensive training prior to responding to alarm notifications.

  • No recording devices are allowed inside the central station.

Related resources

Need more help? Contact Verkada Support

Did this answer your question?