Edwin Holmes created the first system of burglar alarms monitored by a central controller in New York City in the 1870s.

Alarm and monitoring technology, while still rooted in the basic concepts of home and property security, has come a long way.

Determining what type of monitoring system best suits your needs can be daunting, but Gallaher can create the right solution for your business.

First, here’s a primer on the finer points of monitoring:

What do you want monitored?

You might need a fire system because of building code requirements, or you might need to monitor air temperature, for instance, in a pharmacy warehouse. We offer a range of options for your needs, including monitoring of key times and events. If an alarm hasn’t disarmed by 8:45 a.m., for example, a manager can receive a phone call. If the system hasn’t shut down by 8 p.m., we can also call a manager.

What transmission type is best for your business?

Edwin Holmes’ 1880s alarm system relied on phone lines. Surprisingly, that’s still often the case today. Phone lines are the slowest and least reliable monitoring and communications method, and we can help you upgrade to cellular, radio or IP-based monitoring. We can even provide our proprietary Intelli-G radio network, by far the fastest, most secure and reliable form of transmission. Fire-monitoring via phone line will soon be phased out in some municipalities possibly as early as 2018.

Where is your central monitoring station?

Many companies’ options are based out of state, but we use reliable and local monitoring stations.

Have you read your contract?

Beware the “gotcha” language in some contracts. We write our own contracts, and the customer signs with us. That means we can tailor contracts, or waive some terms and conditions, that other national brands might not be able to do. We can be flexible, and you don’t have to worry about poring over a four-page contract rife with lawyerly fine print. Your contract with us – and ours with you – is one page, front and back, and clear and concise.

A quick guide to key monitoring concepts

Here are some common words and phrases associated with our monitoring services you may encounter while researching your best options with Gallaher:

Monitoring – The sending of signals or data to a Central Station.

Central Station – Secured Alarm Call Center that dispatches first responders and notifies customers and service companies of signals on their account.

Signals – Information sent from a panel at a customer site to a Central Station about a specific status. Can be good or bad — a check-in signal is good, a trouble signal means something is wrong with the system. Signals can come from all sorts of equipment, including security panels, fire panels, access control, and video systems.

Panel – The computer or “brains” of a fire, burglary, or access control system. In video it’s typically called an NVR (Network Video Recorder) or DVR (Digital Video Recorder). Could also be an elevator controller, emergency phone, environmental device (like monitoring a temperature in a pharmacy refrigerator), or any number of other options.

Operator – Central Station employee who analyzes and takes action on signals.

Video Verification – A video clip or live video stream sent to a central station allowing monitors to see what’s actually going on at the monitored site. If something’s wrong, when they call responders it’s a much higher priority call — a “verified dispatch,” the same as a robbery in progress.

Police get a lot of false alarms, so it’s the lowest priority call they have. If a call comes in as verified it’s a much higher priority.

Transmission of Signals – Signals can be sent to a Central Station through phone lines, cellular, radio, or IP means.

Hosted Video – A service offered to provide video surveillance systems that are live fed and backed up to the cloud. Essentially the customer is using our video server to have a video system and they have client software on site to allow them to view, search, and playback live and recorded video.

Hosted Access – A service offered to provide Access Control systems that are controlled and backed up to the cloud. Essentially the customer is using our access control server to have an access system and they have client software on the site to allow them to use access control systems, view history and make changes to the system.