It consists of an intrusion detection system composed of configuration:
1. connection to the central station for the transmission of the alarm signals, which can be through conventional, cell phone or internet.
2 24-hour and the attendance of staff in case of occurrence of alarm monitoring.
* Teams are owned by the customer.