An intrusion detection system composed of configuration:
1. connection to the central station for the transmission of the alarm signals that can be through conventional, cell phone or internet.
2 monitoring 24 hours and notice to customer in the event of occurrence of alarm.
3. national coverage.
* Teams are owned by the customer.