Patent attributes
The application is directed to techniques and processes for integrating multiple security systems. For instance, a system may receive first data from a first security system, where the first data indicates that the first security system detected a security event. The system may then analyze the first data to determine a type of the security event, a time frame of the security event, and/or a threat level of the security event. Based at least in part on the analyzing, the system may determine a security procedure for a second security system. The second security system may be located proximate to the first security system and/or may be included in a same security system network as the first security system. The security procedure may include changing a mode of the second security system and/or causing an electronic device of the second security system to generate image data.