All Collections
Compliance, Licensing, Trials
Security controls for Verkada Alarms
Security controls for Verkada Alarms
This article explains security controls for Verkada Alarms data
Updated over a week ago

Verkada Alarms gives customers peace of mind by providing 24/7 professional monitoring with video verification of events and emergency dispatch services, where available. Users of Alarms grant access to their data to Verkada and its partners to review events and notify contacts based on the rules set up in Command.

Customers grant access to the following types of data:

  • In the event of an alarm event, the monitoring agent receives metadata about the customer account including the location of the facility and contact information as well as data from Verkada devices, including cameras, access control units, air quality sensors, and intrusion sensors.

  • When an alarm event is triggered, still images, video, and audio data from cameras associated with the event will be securely shared with Verkada’s monitoring partners via a unique URL that expires as soon as the alarm is resolved or after 24 hours.

  • Image and audio data is maintained in Verkada’s environment and is not stored by the central station.

  • If audio is enabled on cameras linked to the alarm event, the monitoring agent will have access to both image and audio data.

  • Conversations with agents are recorded and used for safety, quality, and training purposes.

Customer data is secured at the central station through the following controls:

  • Monitoring is conducted via three U.S.-based, UL-listed, redundant central stations with TMA 5 Diamond-certified quality controls

  • Central station personnel undergo pre-employment background checks and extensive training prior to responding to alarm notifications

  • No recording devices are allowed inside the central station

Did this answer your question?