Home Security Blog

Posted By

Alarm Grid is here again with its latest video recap! We have a lot of videos featuring touchscreen keypads this week, though some other topics are covered as well. As usual, Jorge, Jarrett, and yours truly are all represented. Let's check out the latest Alarm Grid videos from the team!

Pairing a 2GIG SP2 with the 2GIG GC3e

Jarrett helps you pair a 2GIG SP2 Keypad with a 2GIG GC3e Security System. Adding the SP2 Keypad will provide you with a secondary on-site location for controlling your GC3e System. You might consider installing it by your front door, by your garage door, by your back door, or in your master bedroom. Remember that the SP2 is for security functions only, and it cannot perform automation commands. The wireless keypad pairs with the GC3e through WIFI or by using an Access Point (AP).


How to Tell If a Keypad Has an RF Receiver Built-In

Jorge explains how you can determine if your alarm system keypad has a built-in RF receiver. It can be easy to confuse a keypad like the Honeywell 6160RF, which has an integrated receiver, with a similar-looking keypad that does not, such as the Honeywell 6160. If you have a hardwired alarm system, then the benefit of adding a wireless receiver is that you will be able to begin pairing compatible wireless sensors with the system. And if your keypad has a built-in receiver, then you won't need to add a standalone receiver unit.


Remove a PG9914 From its Mounting Bracket

Jarrett shows you how to remove a DSC PG9914 PowerG Motion Detection Sensor from its mounting bracket. Like all motion sensors, properly positioning and mounting the PG9914 is very important for achieving the results you want. If it is positioned improperly, then it may cause false alarms, or it may not activate when movement is present in the area. Proper mounting is also crucial if you intend to use the motion sensor for pet immunity. The PG9914 supports pet immunity of up to 85 pounds.


Determining if Your Keypad is Alphanumeric

Jorge explains the difference between an Alphanumeric Keypad like the Honeywell 6160 and a Fixed English Keypad like the Honeywell 6150. Both keypad types are good for arming and disarming and bypassing sensors. But only an Alphanumeric Keypad is good for menu-driven programming. This is because an Alphanumeric Keypad will display the relevant information as you move through the menus. If you try to program on a Fixed English Keypad, you will basically be operating blindly.


Checking the ECP and RIS Address on the Tuxedo Touch

Jorge teaches you how to check the ECP Address and the RIS Address for a Honeywell Tuxedo Touch Keypad. These settings are important when you go to set up the Tuxedo Touch with a Honeywell VISTA Security System and Total Connect 2.0. The ECP Address is used for setting up the Tuxedo Touch as a keypad controller on the VISTA System, and the RIS Address is used for setting up the Tuxedo Touch as an automation controller on Total Connect 2.0.


Disarming Using the Tuxedo Touch Keypad

Jorge shows you how to disarm your Honeywell VISTA Alarm System by using a connected Honeywell Tuxedo Touch Keypad. Since the Tuxedo Touch is a wired touchscreen keypad controller for the system, it needs to be able to perform all the standard security functions. These include arming and disarming the system. When you are disarming, you are taking the system out of a secured state so that burglary/intrusion zones are unable to cause alarms on the system.

Bypassing Zones Using a Honeywell Tuxedo Touch Keypad

Jorge explains how to bypass zones using a Honeywell Tuxedo Touch Keypad. When the zone associated with a sensor is bypassed, that sensor is ignored by the system. In other words, the system will not provide any response if that sensor is faulted. You must bypass or restore any faulted zones prior to arming the system. Bypassing is often preferred over deleting a zone entirely, as you do not have to reprogram a zone after bypassing. You can just unbypass the zone later on and use it as normal.


Providing AC Power to an Alarm System

I explain how AC power is provided to an alarm system. AC power comes from a plug-in transformer that connects to an alarm panel using wire. The transformer takes the high-voltage power provided from the outlet, and it transforms it into low-voltage power that is suitable for powering a security system. The power travels down the wire and reaches the panel. This represents the primary power source for an alarm system. If AC power is lost, then a backup battery can keep the system running temporarily until AC power is restored.

Tags: , , , , , , , ,

Comments


Posted By

Resideo, which trades on the New York Stock Exchange (NYSE) under the acronym REZI, saw its stock price increase by more than 40% during market trading on November 5, 2020. The substantial price boost occurred thanks to an excellent third quarter (Q3) that greatly exceeded expectations.


In the company's most recent earnings report, Resideo stated that it had achieved roughly $1.36 billion in revenue for Q3. This is much higher than the consensus estimate of $1.15 billion. Resideo has enjoyed a 10% increase in revenue year over year. The company says that it expects Q4 revenue to be between $1.36 billion and $1.41 billion.

Thanks to this positive news, REZI opened Thursday at $14.20 after closing at just $11.35 the day prior. REZI enjoyed further increases throughout most of Thursday trading, as the stock price soon rose above $15. The price stayed in the $15 range during most of the day, though it did exceed the $16 threshold at times.

Resideo President and CEO Jay Geldmacher said in a recent press release, "Our revenue performance and the progress with our ongoing transformation and cost reduction initiatives enabled us to strengthen our liquidity position, and in late October we made all outstanding reimbursement agreement payments to Honeywell... While we are closely monitoring our operations and supply chain for impacts related to the COVID-19 pandemic, we are encouraged by the strong demand trends we are seeing across our end markets as we close out 2020.”

The reimbursement agreement payments that Geldmacher is referring to come from an agreement between Honeywell and Resideo after Resideo was spun-off from Honeywell in late 2018. At the end of October 2020, Resideo paid Honeywell $35 million for a payment that was deferred on April 30, 2020, as well as an additional $35 million for a regularly scheduled payment.

Resideo also mentioned some highlights in its earnings report. Their ADI Global Distribution segment saw an 11% revenue increase to $790 million. Their Products & Solutions segment enjoyed a 12% revenue increse to $572 million. Their gross margin rate increased by 200 basis points (BPS) to 27.2%. Operating income for the company is up 122% year over year, with net income up 838% year over year, and diluted earnings per share (EPS) up 900% year over year. And their adjusted EBITDA increased by 65% to $188 million.

Alarm Grid supports many Resideo Security Systems for alarm monitoring service. If you want to learn how you can monitor your home or business, please contact our team via email at support@alarmgrid.com. We check our email from 9am to 8pm ET M-F. We look forward to hearing from you!

Tags: , ,

Comments


Posted By

Network security is more important than ever, as hackers constantly strive to expose vulnerabilities and steal personal information. If your alarm system is associated with an interactive platform, then a flaw in network security could give an intruder easy access to your home or business.


The key to protecting your network and your personal information is to have multiple layers of security in place. You shouldn't just rely on one single security method, even if that one method is known for being very secure. If a vulnerability or an opening is ever exposed within that method's framework, then you could be left vulnerable.

An example of this can be seen in a vulnerability that was discovered in SonicWall Network Security Appliance (NSA) devices last month. This left more than 800,000 VPN appliances vulnerable. A patch has since been applied to these affected SonicWall devices, but that doesn't change the fact that many users were running unsecured VPNs for quite some time. Another example occurred last September, when it was found that FortiGate VPNs are vulnerable to Man-In-The-Middle (MITM) attacks when used in their default configuration.

This doesn't mean that using a VPN is a bad idea. Having a VPN in place is a great way to protect your network and your personal information. But it's important to understand that a VPN should be one of multiple protection layers keeping you safe. That way, even if your VPN fails, you will still have other mechanisms providing protection.

Network vulnerabilities can have severe consequences. Hackers can use vulnerabilities to access your personal information, including your passwords, credit card info, browsing history, and virtually all other data that you have shared with your network. In the context of a monitored security system, this can include information associated with an interactive service platform, such as Total Connect 2.0 or Alarm.com. Keep in mind that if an intruder accesses your TC2 or ADC account, they can disarm your system at-will and freely access your home or business. Having access to TC2 or ADC is basically the same as having a system code!

Fortunately, there are multiple security provisions you can set up to protect yourself. A strong VPN is a nice start. You should also set up firewalls as an added layer of security. And of course, always use secure, difficult-to-guess passwords, and never share them across different websites. You may also want to consider using two-factor authentication when available. Just yesterday, we made a post about two-factor authentication on Alarm.com. That is also an excellent way to keep your account protected.

Remember, protecting your network is your responsibility. Nobody else will do it for you. But we're here to help you. If you're monitored with Alarm Grid, feel free to reach out to us for more tips on keeping your private data safe. You may also contact us if you are interested in starting new monitoring service. Emailing our team at support@alarmgrid.com is the best way to get a prompt response. Keep in mind that we check our email from 9am to 8pm M-F. We look forward to hearing from you!

Tags: , ,

Comments


Posted By

We have learned that Alarm.com now allows users to receive two-factor authentication (2FA) links via email when logging into the Alarm.com website. This is in addition to the two-factor authentication via text message when accessing the Alarm.com platform. You can set up the feature in ADC.


When two-factor authentication is enabled for your Alarm.com account, your login process will have an added layer of security. Upon logging into your Alarm.com account via the website or mobile app on a device that you haven't saved, you will need to verify yourself by providing a secret access code. You will get this code via text message or email, depending upon how you have set up the 2FA feature. In other words, accessing your Alarm.com account on a new device will require your username, password, and access to either your phone or email. This is great for keeping your Alarm.com account as secure as possible.

Remember, 2FA will only be required when you access Alarm.com from a new device. For example, if you frequently access Alarm.com using the same web browser on your computer, and you tell Alarm.com that the device can be safely trusted, then you will only need to perform 2FA the first time you login, as well as anytime you login after clearing your cookies. Some users are hesitant to enable 2FA, because they don't want to have to go through the inconvenience of entering a secret code every time. Fortunately, that isn't a concern, as Alarm.com can remember your usual devices and skip the process for these trusted devices. You can also tell Alarm.com to trust your phone so that you will only need to perform 2FA if you get a new phone or if you are using a different mobile device than usual to access your account. Whenever you access Alarm.com through a new device, after completing the 2FA process, Alarm.com will ask you if you want to save that device so that you do not have to complete 2FA every time. This protects your account, while still maximizing convenience.

If you want to enable two-factor authentication for your Alarm.com account, start by logging into the Alarm.com website. Choose Settings on the left-hand side of the screen, then choose Login Information, and then Two-Factor Authentication. Then set up the feature through email address or text message by following the on-screen prompts. If you have questions, email us at support@alarmgrid.com. This email is also great if you are interested in starting new monitoring service for access to Alarm.com. We look forward to hearing from you!

Tags: , ,

Comments


Posted By

A few months ago, we made a post stating how a recent batch of Encore FF345 Smoke and CO Detector Listening Modules were not compatible with Honeywell Alarm Systems. It now appears that this issue has been fixed, and new units should properly work with Honeywell Systems as intended.

Due to the original issue, FF345 units with a date code of 01/2020 are unable to enroll with Honeywell Alarm Systems. These units will work properly with 2GIG Alarm Panels, but they are incompatible with the Honeywell Systems that they are advertised to work with. These units may also be incompatible with the 345 MHz Qolsys IQ Panel 2 Plus, which should also support these units, but this has been neither tested nor confirmed. Additionally, FF345 units with date codes ranging from 02/2020 to 08/2020 are likely also affected, but we are unable to confirm this.

Starting with date code 09/2020, a fix was implemented to make these units once again compatible with Honeywell Alarm Systems. Any FF345 unit with a date code of 09/2020 or later should be able to enroll with compatible Honeywell Panels. We have tested units with the 09/2020 date code, and we found that they were able to enroll with Honeywell Lyric and Honeywell LYNX Touch Systems as intended. However, our testing revealed that using these sensors may result in an E380 Sensor Trouble Condition occurring. The trouble condition may appear after a Fire Alarm or CO Alarm has been cleared on the system. The alarm condition is cleared by disarming the system twice. Upon further investigation, we found that the trouble Condition may clear on its own after some time, or a user can get it to clear manually with a third system disarm. This shouldn't have a major impact on performance, but it is important to keep the issue in mind if you intend on using an FF345 device manufactured from 09/2020 onward with a Honeywell Security System.

Remember, FF345 units with a date code older than 01/2020 should have no issue working with Honeywell Security Systems. Units with a date code of 01/2020 are known to not work with Honeywell Systems, and any unit with a date code from 02/2020 to 08/2020 is believed to be impacted as well. Units with a date code of 09/2020 or newer should work with any compatible Honeywell System, but they may experience the E380 Sensor Trouble Condition after an associated Fire Alarm or CO Alarm has been cleared. To check the date code on an FF345 unit, please refer to this helpful FAQ. That guide will tell you everything you need to know about checking the manufacture date on your FF345 so that you can determine if the unit is affected by the aforementioned issue.

If you have any questions about the FF345, or if you are looking to set up monitoring service for fire and/or CO detection, please email us at support@alarmgrid.com. We check our email from 9am to 8pm ET M-F. We look forward to hearing from you!

Tags: , , , ,

Comments


Posted By

Alarm Grid is here with a video recap as usual! We only have a few videos this time around, and all feature yours truly. But don't worry, as we have some more videos featuring Jorge and Jarrett on the way soon. But for now we hope you enjoy these videos from October 28th. Let's take a look!


Duress Code Function On the 2GIG GC2e

I explain how the duress code works on the 2GIG GC2e Security System. The duress code feature is useful if you have a system that is monitored with central station service. When you enter the duress code, a secret alert is sent to the central station to indicate that you need help right away. Nothing appears on the GC2e Panel, so it's a great way to discreetly request immediate assistance. The duress code is hard-coded to user slot 8 on the GC2e.


Different Alarm Types On Security Systems

I explain how there are different types of alarms on security systems. The alarm types that can occur on a security system include burglary/intrusion alarms, police panic alarms, life-safety alarms, and auxiliary alarms. The response provided by a central station operator will depend on what type of alarm occurs on the system. For example, a very different response is warranted for a life-safety alarm like a fire alarm or CO alarm, than what is needed for a burglary/intrusion alarm.


How an Alarm System Backup Battery Works

I explain the purpose and function of a backup battery on a security system. The backup battery keeps the system running when AC power is lost due to an electrical outage or the plug-in transformer being disconnected. The battery slowly stores power while the system is running on AC power. That way, it is ready to activate as soon as primary power is lost. Batteries vary in terms of how long they can keep a system running. Some batteries can maintain alarm system power on their own for at least 24 hours.

Tags: , , , , , , , , , , , , , , ,

Comments


Posted By

Security, Sales, & Integration recently published an article outlining the 3G Sunset and the importance of upgrading to LTE. One question we are often asked is how long LTE networks will be kept in-service. Thanks to this informative article from SSI, we now have a pretty good estimate.


According to the information presented in the article, LTE networks are expected to have a lifespan that extends through at least the mid-2030s, if not longer. We have said many times before that LTE networks should be kept in service well into the very distant future, and now we have somewhat of a more precise timeline. It is also important to note that we understand this "mid-2030s" estimate to be on the conservative side. There is a good chance that the LTE networks might be supported even beyond that point in time. But given that we are in the year 2020, and have a "mid-2030s" estimate for the LTE lifespan, we can say that anyone who purchases an LTE communicator for their security system at this point in time should expect it to work for at least the next 15 years.

We need to stress here that this is nothing official. This is just information being published in an SSI article. This is not an official statement from a cellular service provider, and we advise taking it with a grain of salt. But given our understanding on the subject, this mid-2030s estimate strikes us as legitimate. The article also states that all 3G cellular networks will be shut down no later than December 31, 2022. This also lines up with what we have been hearing. At the time of this writing in late October 2020, we are slightly more than two (2) years away from the final end of 3G. We have said it many times before, and we will say it again. You need to upgrade to LTE as soon as possible to avoid a loss of monitoring service.

On that note, it's also fair for us to begin thinking about what lies beyond LTE. It's no secret that 5G networks are being rolled out across the country, and they will soon become the norm for cellular communication. At this time, we have not heard of any alarm manufacturer offering a 5G communicator, though we wouldn't be surprised for it to happen soon. But it's not a sure thing that a 5G communicator would be available before the end of 3G. That is why we are pushing so hard for users to make the upgrade to LTE. We don't want any of our monitored customers to be left behind in the transition. While the eventual promise of 5G might seem exciting and flashy, the important thing here is keeping your security system working and having your home or business stay protected. And from what we can tell, LTE will provide exactly that until at least the mid-2030s, possibly even beyond that.

If you are interested in getting starte with alarm monitoring service, or if you are needing to upgrade your existing system to LTE, please email us at support@alarmgrid.com. Our team is here to check email from 9am to 8pm ET M-F. We look forward to hearing from you!

Tags: , , , , , , , , , , , , ,

Comments


Posted By

2GIG has recently updated their logo to provide a more "modern" look. The change is very subtle, as it only includes thinner text, with virtually no other adjustments. This comes ahead of the release of the new 2GIG Security System, the 2GIG Edge, which should be available in February 2021.


Our main takeaway here is that 2GIG is really trying to invoke a "modern" and "clean" image, without making any major changes that may result in a loss of identity or brand recognition. The company most likely wants to refresh its branding ahead of their new panel release. We're sure 2GIG is hard at work on their new alarm panel, though it will take an incredible effort to overthrow the existing Qolsys IQ Panel 2 Plus as the top security system option for use with Alarm.com. It seems 2GIG is holding nothing back ahead of the anticipated release.

Unfortunately, we don't have any new details on the 2GIG Edge at this time. We promise to check-in with 2GIG soon to see if we can learn more. We also have no word on how the new Edge will affect the existing 2GIG GC2e and 2GIG GC3e Security Systems. It's fair to expect that the 2GIG Edge will have a completely revamped programming setup, so it may or may not replace their existing offerings. For now, we strongly recommend checking out our prior post with an in-depth discussion on the 2GIG Edge, which can be seen in its entirety here.

You may also recall that the parent company of 2GIG also performed its own rebranding, as Nortek Security & Control simply became Nortek Control. We're not entirely sure if that name change has anything to do with 2GIG revamping its logo, or with the upcoming release of the 2GIG Edge in February 2021, but we wouldn't rule out that possibility. You can learn more about the name change for Nortek Control in this prior blog post.

Remember to please email us at support@alarmgrid.com if you have any questions about the upcoming 2GIG Edge System, any of the other great systems we support, or about alarm monitoring services in general. We check email during our usual business hours of 9am to 8pm ET M-F. We look forward to hearing from you!

Tags: , ,

Comments


Posted By

We actually missed this about a month ago, but it appears Alarm.com has updated their website camera video feed viewer to use native browser streaming. This replaces the old Adobe Flash video viewer. This change does not come as a surprise, as Adobe Flash will soon reach its end of life.


Being able to live-stream the video feed for Alarm.com Security Cameras is one of the most important features of these devices. This can be done using the Alarm.com website or the mobile app. The change being discussed here affects streaming through a web browser and the Alarm.com website. Before, it was only possible to stream Alarm.com Cameras on the website by using the Adobe Flash video viewer. The update provides support for native browser streaming. This will make it easier for most viewers to access their camera feeds.

With Adobe Flash reaching its end of life by the end of the year, this update was basically a no-brainer for Alarm.com. Users will still have the ability to view their cameras using Adobe Flash until the end of the year. At that point, only native browser streaming will be supported for camera streaming through the Alarm.com website. Native browser streaming is easier to maintain, and it does not require users to install and update a Flash plug-in. Native browser streaming support was actually made available towards the end of September, but we never covered the news in our blog prior to now.

When you access your Alarm.com account through the website, the Video section will appear on the left if Video Surveillance has been added to your account. By clicking on this section then Live Video, you will be able to choose a camera for streaming. In the upper-right corner there will be a toggle bar for you to enable or disable the "New Viewer. When the bar is blue, the New Viewer is enabled, and native browser streaming will be used. This is the default option. You can click the toggle bar to turn off the New Viewer and use Adobe Flash streaming. This will only be available until the end of the year. After that, no Flash streaming will be available.


Please note that the New Viewer and native browser streaming only allows the live video stream to be maintained for a few minutes at a time. After that, you will get a message that the stream has "timed out". You will need to refresh the stream to resume viewing. This is normal, and it's just a limitation that comes with Alarm.com Camera streaming. Simply click the "Play" button that appears on the screen to refresh the stream and continue watching.

Also note that while the camera viewer now has native browser streaming available, the streaming video recorder (SVR) timeline page still uses Adobe Flash. Native browser streaming is not yet available for SVR functions on the Alarm.com website. We expect that to change in the near future, as Alarm.com continues to make their transition away from Flash. We do not have an ETA on when that will become available, but we will be sure to provide an update once we learn more.

If you have any questions about Alarm.com Camera streaming, or if you are interested in monitoring service to gain access to Alarm.com, please email us at support@alarmgrid.com. Remember that Alarm Grid customers need either a Platinum Level Plan or a Video-Only Plan to gain access to Alarm.com for camera streaming. Our team is happy to address any questions or concerns you may have via email. We check our email during our usual business hours of 9am to 8pm ET M-F. We look forward to hearing from you!

Tags: , , , , , , , , , , , , , ,

Comments


Posted By

If you have been keeping up with Z-Wave home automation lately, then you have likely at least heard about the S2 Security Protocol. The security suite offers an advanced level of protection to keep smart home devices safe. Today, we're checking out the S2 Protocol to learn more about it.


Before we get into the specifics of Security 2 (S2), it is important to understand which Z-Wave setups will support it. In order to achieve a proper S2 setup, the Z-Wave controller and the paired device itself must both support the S2 Protocol. If either end is not S2-compatible, then the protocol will not be used. If you pair a non-S2 device with a controller that supports S2, then the device will simply pair using the S0 Protocol instead. Likewise if you have a hub that does not support S2, then none of the devices on the network will use S2, including those that technically are capable of supporting the protocol. Not to worry, if you do have an S2-compatible controller, then it is certainly possible to have a mixture of S2 and S0 devices on the same Z-Wave network.

The S2 Security Protocol is optional for 500-Series Z-Wave Plus devices and hubs. In other words, some 500-Series Z-Wave Plus smart home devices and controllers will support S2, while others will not. You need to check the specifications for the exact device and hub that you are working with to see if it is supported. In some cases, it may be possible to perform an over-the-air (OTA) update for a 500-Series accessory or controller so that it can support the S2 protocol, even if it did not previously. An example of this is when you upgrade the Z-Wave firmware on the Qolsys IQ Panel 2 Plus to Version 6.81.03. That is the first Z-Wave firmware version for the system that supports S2. Older versions do not. The panel firmware should be on version 2.5.3 or higher when using S2.

But for 700-Series Z-Wave Plus V2 equipment, support for S2 is required. In order for a device or hub to be certified as 700-Series by the Z-Wave Alliance, it must support the S2 Protocol. Therefore, if you see equipment listed as 700-Series, then you will know for certain that the technology is supported. As of October 2020, we have not seen many Z-Wave Plus V2 controllers or devices available. One 700-Series device that is available now is the 2GIG STZ-1 Thermostat. We hope that more 700-Series equipment will be hitting the market soon.

Looking at what S2 actually entails, you should understand that it isn't just one aspect or factor that makes the protocol what it is. There are many different components coming together to create a single protocol that is extremely secure. But perhaps the single most crucial aspect of S2 is that it is readily built into the Z-Wave framework for use by software developers. This makes it very easy for a developer to implement the technology into any given Z-Wave Plus device. Prior to the introduction of S2, there was no security built into the Z-Wave framework. The only option for a developer was to implement their own security protocol, and this was completely optional. Many develops would elect not to provide any security and just leave automation devices vulnerable. But when a device is listed as S2, you can be absolutely certain that it is meeting an advanced standard of security and protection.

Just like many other secure protocols, S2 makes use of an asymmetric key exchange, which at the simplest level involves a public key and a private key. Any command can be encrypted using the public key, but only the specific private key can unlock it. This ever-crucial private key is protected using Elliptic Curve Diffie-Hellman (ECDH) technology. Thanks to this advanced method, the task of deciphering the key is all but impossible. Additionally, different devices on the same network can be separated into different groups. Each device group can be assigned its own set of encryption keys. Often, devices that require greater security, such as door locks, are included with more secure groups that also require authentication during the network inclusion process. Meanwhile, the support of a highly secure TLS 1.1 Tunnel for all Z-Wave Over IP (Z/IP) traffic removes almost any possibility of cloud vulnerability. For the record, the S2 Protocol is rated at 128-bit AES in terms of overall security level.

One other big factor for the S2 Protocol is that it makes use of a single-frame transmission, which is a massive improvement over the three-frame transmission used by the S0 Protocol. Simply put, single-frame transmission is significantly more efficient than three-frame transmission. The improvement in efficiency allows for extended battery life, enhanced reliability, and a huge cut-down on latency. This means that a device using S2 technology will require less maintenance, including fewer battery changes. It will provide more consistent performance, and experience shorter operation delays. This alone makes S2 vital for anyone looking to achieve the most efficient automation network possible.

Understanding this technology in advanced detail may seem a bit daunting. But you just need to know that S2 makes Z-Wave home automation more secure, faster, and more efficient than ever before. If you have any further questions about S2, or if you want some tips for getting started with home automation, please email us at support@alarmgrid.com. We check our email from 9am to 8pm Eastern Time M-F. Also remember to check our monitoring page if you are interested in learning more about the monitoring services we offer. We look forward to hearing from you!

Tags: , , , , , , , , , , ,

Comments