Alarm.com Unveils Ambient Insights for Alarm Response

New Service Harnesses AI and Machine Learning Capabilities to Deliver Additional Information to Monitoring Stations and First Responders

Alarm.com has introduced Ambient Insights for alarm response, a new solution that recognizes activity around a property and delivers contextual information to monitoring stations in the event of an alarm. Monitoring stations can use this real-time data to prioritize alarms and dispatch police, fire or emergency medical services to properties faster. Ambient Insights also allows for responses to a wider range of emergencies and reduces dispatches for false alarms.

For every alarm signal, Alarm.com can determine whether the alarm may have been caused by unusual activity, and the likelihood that the alarm may be cancelled by the property owner. With Ambient Insights, monitoring stations can use this information to assess and prioritize alarms within their queues and allow time for a customer to cancel a possible false alarm. Combined with other contextual data provided by Alarm.com’s visual verification service and alarm response portal, Ambient Insights also empowers monitoring stations to provide relevant information to public safety dispatchers and first responders.

“Alarm.com has long applied machine intelligence to generate contextually aware insights proactively for property owners,” said Dan Kerzner, chief product officer at Alarm.com. “Ambient Insights for alarm response are the next step in our multi-year vision to use AI and adaptive machine learning to define the next generation of smart monitored security. We’re especially proud of this solution as it allows for a better customer experience and helps the industry reduce false alarm dispatches.”

Ambient Insights for alarm response builds on the success of the company’s Insights Engine, a proprietary machine learning capability that safeguards homes and businesses by identifying patterns and insights in the growing set of data generated by devices and sensors in a connected property. By learning the unique activity patterns of any home or business, Alarm.com-powered systems can respond to unusual activity on the property owner’s behalf. Now with the expansion of Ambient Insights to include alarm response, Alarm.com seeks to improve public safety and enhance the value of professionally monitored security.

“We’re thrilled with this latest innovation from Alarm.com, which is going to revolutionize emergency response and enable security providers to offer an even smarter, more differentiated customer experience,” said Pam Petrow, president and CEO of Vector Security. “The public safety implications are key. We’ll be able to get the right information to the right people at the right time in critical moments—precisely when it matters most.”

Alongside numerous other award-winning Alarm.com security features, Ambient Insights delivers important information to both property owners and monitoring station operators, enabling Alarm.com-powered solutions to deliver unmatched protection. The new solution will complement ongoing initiatives by security industry committees to speed and streamline alarm response, including The Monitoring Association's new proposed Alarm Validation Standard. By providing Ambient Insights to monitoring stations earlier in the alarm response process, Alarm.com aims to maximize the downstream benefits of this information for first responders and property owners.

“From my 20-plus years in public safety, this is exactly what we’ve needed all along,” said Alicia Burns, public safety technology alliance manager for Alarm.com. “Ambient Insights for alarms, in conjunction with The Monitoring Association's proposed Alarm Validation Standard, will provide significant opportunities to make it possible for alarm responders to make better-informed decisions.”

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

OSZAR »