Using Cloud Applications for Alarm Systems: Understanding the Risks

Using Cloud Applications for Alarm Systems: Understanding the Risks

Many alarm systems today offer cloud applications such as BlueEye, Insite Gold, Pocket Secure, and others to provide additional functionality and convenience for monitoring your alarm system. However, it's important to understand the risks and limitations associated with these applications.

Cloud applications are provided by the relevant manufacturer, and as a service provider, we have no control over their service, uptime, or updates. While these applications can provide additional benefits, they should not be solely relied upon for monitoring purposes.

The use of cloud applications can be subject to outages caused by internet connectivity issues or other external factors that are outside our control. Additionally, these applications may not be suitable for monitoring for insurance or compliance purposes.

We recommend that you use these applications as a supplementary tool and not as a replacement for professional monitoring services. It's essential to have a comprehensive alarm system monitoring plan in place that includes both professional monitoring and supplementary tools such as these applications.

Please note that we are not responsible for any issues or problems that may arise from the use of these applications, and we encourage you to contact the manufacturer directly for any technical support or assistance.
If you choose to use cloud applications for monitoring your alarm system, here are some additional tips to keep in mind:
  1. Regularly check the functionality of your cloud application to ensure that it's working correctly and consistently. You may not receive notifications or alerts if the application goes down.
  2. Keep your alarm system up to date with the latest firmware updates and security patches to minimise the risk of vulnerabilities.
  3. Use a reliable internet connection to ensure that the cloud application can connect to your alarm system consistently.
  4. Always have a backup plan in place in case the cloud application is not available, such as contacting your professional monitoring service directly.
In summary, while cloud applications can provide additional benefits for monitoring your alarm system, they should be used as a supplementary tool and not as a replacement for professional monitoring services. Please be aware of the risks and limitations associated with these applications and contact the manufacturer directly for any technical support or assistance.

    • Related Articles

    • Paradox Magellan - Other Alarm Types

      This article does not apply to systems with touchscreen keypads Your Paradox system has different types of alarms available other than just intruder alarms. Fire Alarms Upon a fire alarm, the bell/siren will emit three “squawks” at 2 second intervals ...
    • Understanding your Hills/NX/Reliance Alarm Keypad

      Understanding the Lights on Your Keypad Your security system is equipped with several lights that provide important information about the system's status. Understanding what each light indicates will help you use the system more effectively and ...
    • Additonal Functions of Hills/DAS/NX Reliance Alarm Systems

      Reliance alarms are fitted with a host of additional features. Each feature is explained here, including the instructions for activation. Door Chime Chime mode provides an audio warning when a protected area is entered. The door chime is turned on or ...
    • Remote Controls for Magellan and Spectra Systems

      Overview Magellan and Spectra systems supports four types of remote controls; the REM1, REM2, REM3 and REM15.  The REM1 and REM15 are the most basic remote controls, with the ability to perform five actions (e.g. arming, disarming, activating a PGM, ...
    • Bosch Solutions 16 Alarm Systems - Adding and Deleting User Codes

      This article is for alarms with these type of keypads This guide is for users familiar with Bosch Alarm Systems. It covers the process of adding and deleting user codes for the system. It is important to note that only the Master Code holder can add ...