Contact company icon Add as a preferred source Download PDF version

The Monitoring Association (TMA) welcomed its 110th ECC in the United States on June 22nd. The City of Rockwall ECC in Texas, servicing the Cities of Rockwall, Fate, and Heath, became the 12th ECC in the state of Texas to implement the Automated Secure Alarm Protocol (ASAP).

The Rockwall ECC went live with Rapid Response Monitoring, Vector Security, Tyco (Johnson Controls), Security Central, Alert360, Stanley Security, Guardian Protection, United Central Control, National Monitoring Center, Brinks Home Security, Vivint, Affiliated Monitoring, Protection One & ADT.

Public-Private partnership

Securitas will be on-boarded in the near future. Launched in 2011 as a public-private partnership, TMA’s ASAP service is designed to increase the accuracy and efficiency of calls for service from alarm companies to Emergency Communication Centers (ECCs).

TMA’s ASAP-to-PSAP continues its rapid growth across the U.S.,” stated TMA President Morgan Hertel. “The Irving, TX ECC, which serves a population of approximately 1 million, is anticipated to go live soon.”

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...