Cerberus User Manual
Congratulations on subscribing to the most advanced Home/Office Security system available in the market
today, featuring real‐time Video Verification. Cerberus is easy to install and very simple to operate. Your
security system can be armed and disarmed from anywhere from your phone or your computing device. In the
event of a security breach, Cerberus will immediately notify you and allow you to verify if the security breach is
a criminal break‐in. If through video verification you determine a break‐in has occurred, you can report a
VERIFIED, IN‐PROGRESS emergency to your local police and be confident that they will respond with high
priority.
Cerberus provides an intuitive and easy to use User Interface that is second‐nature to operate by anyone
familiar with an answering machine and Internet browser.
We have endeavoured to make Cerberus so simple to use that a User’s Manual should not normally be
necessary. This manual will act more as a reference guide rather than a mandatory training document should
you have any questions about the operation of the system.
It is assumed that you have already configured your Cerberus system (see Cerberus – Quick‐Start Sheet)
Each Customer has been assigned a Customer Configuration Record attached to the Quick‐Start sheet that
includes:
‐Application Server URL (i.e. www.MyCerberus.com/MyCerberus ) and
‐the IVR phone access number (604‐299‐6290)
The User is also given unique information for logging onto his private pages of the Cerberus Server consisting
of Login:, and Password:
Accessing Methods
There are two methods for accessing and operating Cerberus:
1) IVR – IVR refers to Interactive Voice Response. Using this method a User uses a telephone, cellular
phone, or satellite phone to interact with an automated attendant. This is just like using an automated
answering service. Selecting options from a menu via the keypad, Users can Acknowledge
Emergencies, Arm, Disarm, and check the Status of the Cerberus Security System.
2) COMPUTER – This interface is a very rich WEB interface with significant additional functionality than
the other two methods that operates best on a Hi‐speed Internet connection (typically a desktop or
laptop computer at the home or office). The system is optimized for the Microsoft Internet Explorer
Version 6.0 and more recent.
This document provides operating instructions for all three access methods.
Cerberus – IVR (interactive voice response) User Operation
The Cerberus IVR system permits the User to access Cerberus from any landline Touch Tone phone, cellular
phone, etc. So wherever the User can access a telephone, he or she can use Cerberus. The Cerberus access
telephone number is provided in the Customer Configuration Record.
Calling the IVR System from a Telephone
When the User calls the IVR system he or she is greeted with the Message “Welcome to the Cerberus IVR
System, please enter the Login number followed by the pound sign now.” The User using a telephone, enters
the Login number, and presses the # key on the phone. The IVR system will respond with “Please enter your
password followed by the pound sign now.” Once the User has accessed Cerberus and it has verified the User’s
identity, the IVR system will present the Main menu.