The Essential Coram Glossary

Welcome to the comprehensive glossary for AI Security Systems. Stay ahead of the game with essential resources that will demystify the jargon and empower you to make informed decisions.
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
1
2
3
4
5
6
7
8
9
0

A

Access Control

A system that manages who is allowed to enter or use resources in a physical or digital environment.

Analog Cameras

Traditional cameras that capture and transmit video in analog format. These cameras often use coaxial cables and require conversion to digital for modern viewing and storage.

Annunciator Panel

A panel that displays the status of various system components, often used in security and fire alarm systems.

B

Bandwidth

The capacity of a network to transmit data, typically measured in bits per second (bps).

Bitrate

The amount of data processed per unit of time in video and audio transmissions, typically measured in kilobits per second (kbps).

Blade/Tower

The amount of data processed per unit of time in video and audio transmissions, typically measured in kilobits per second (kbps).

C

Camera Map

A Camera Map is a visual representation of camera locations within a monitored area, often including their coverage zones for better security management and optimization.

Camera Vision

The ability of a camera system to process and interpret visual data for analysis or decision-making. It enables tasks like object detection, recognition, and tracking.

Cat5/Cat6

Cat5 and Cat6 are Ethernet cables for networking. Cat5 supports up to 100 Mbps, while Cat6 handles up to 10 Gbps with better performance and less interference.

CCTV (Closed-Circuit Television)

CCTV is a closed video system for monitoring and recording specific areas. It enhances security, deters crime, and allows real-time or recorded footage review.

Cloud

The cloud refers to remote servers accessed online to store, manage, and process data, offering scalability, cost savings, and accessibility without physical infrastructure.

D

DVR (Digital Video Recorder)

A device that records video in a digital format. Traditional home systems often use DVRs, which can operate offline and may utilize coaxial cables. These systems typically do not require subscriptions.

E

Edge Storage

Refers to storing video data directly on the camera or nearby devices, such as SD cards or NAS (Network Attached Storage). This can provide redundancy and reduce bandwidth usage by storing data locally.

F

Fisheye

A type of wide-angle lens that provides a 180-degree view, often used in security cameras for comprehensive coverage.

G

GPU (Graphics Processing Unit)

A processor designed to handle complex graphics and computational tasks.

GSOC (Global Security Operations Center)

A centralized facility where security professionals monitor and manage security operations on a global scale. These centers use advanced technology to oversee various security systems and respond to incidents.

H

H.264/H.265

Video compression standards that reduce the amount of data required to represent video, allowing for more efficient storage and transmission. H.265, also known as HEVC (High-Efficiency Video Coding), offers better compression than H.264.

HIPAA Compliance

Adherence to the Health Insurance Portability and Accountability Act, ensuring the protection of medical data.

Hybrid-cloud

A computing environment that combines on-premises infrastructure, private cloud services, and public cloud services.

I

IP Address

A unique identifier for a device on a network, enabling communication over the internet.

IP Cameras

IP cameras are digital video cameras that transmit data over networks or the internet. They are ideal for security and surveillance, offering high resolution, remote access, and advanced analytics.

IR (Infrared) Cameras

Cameras equipped with infrared LEDs that enable them to capture video in low-light or no-light conditions. IR cameras are commonly used for nighttime surveillance.

J

Journey Path

The route tracked by a security system, often for monitoring the movement of people or vehicles.

K

Kiosk

A standalone terminal that provides information or services, often used in public areas for self-service.

L

Latency

The delay before a transfer of data begins following an instruction for its transfer.

LLM (Large Language Model)

A type of AI model designed to understand and generate human language.

LPR (License Plate Recognition)

A technology used to automatically read and record license plate information from vehicles. It is commonly used in law enforcement, tolling, and parking management.

M

Machine Vision

The use of computer vision in industrial processes for tasks like inspection and measurement.

MFA (Multi-Factor Authentication)

A security process that requires multiple forms of verification to access a system.

Motion Detection

A feature in cameras that triggers recording or alerts when movement is detected in the camera's field of view. This helps reduce storage requirements and focuses attention on significant events.

Multi-Sensor Cameras

Cameras equipped with multiple sensors to cover various angles and provide a more comprehensive surveillance view.

MSP (Managed Service Providers)

MSPs are companies that manage IT infrastructure and systems for clients, offering services like network management, security, and support, allowing businesses to focus on core operations while ensuring efficient IT management.

N

Natural Language Search

Natural language search allows users to enter queries in everyday language, using NLP to interpret intent and deliver relevant, accurate results.

NDAA Compliance

Adherence to the National Defense Authorization Act, restricting the use of certain foreign-made surveillance equipment.

NFR (Not for Resale)

NFR refers to products provided under the condition they are not to be resold, commonly used for testing, training, demonstrations, or promotions.

NVR (Network Video Recorder)

A device that records video in a digital format to a disk drive, USB flash drive, SD memory card, or other mass storage devices. NVRs are typically used in IP video surveillance systems.

O

ONVIF (Open Network Video Interface Forum)

A standard that ensures interoperability between IP-based security products, such as cameras, from different manufacturers. Compliance with ONVIF standards allows devices to work together seamlessly.

P

Personal Wall

A customizable display or dashboard for monitoring personal security feeds or data.

PoE (Power over Ethernet)

PoE enables Ethernet cables to carry both power and data, simplifying the installation of devices like IP cameras and reducing wiring complexity.

PoE switch

A network switch that provides power over Ethernet to connected devices, such as IP cameras.

Point-to-point

A direct connection between two network devices.

PoS (Point of Sale) Integration

PoS integration links security cameras with PoS systems to monitor transactions and detect fraudulent activities, enhancing security and operational oversight in retail environments.

Q

No items found.

R

RAID5

RAID 5 is a data storage solution using striping with parity to balance performance, capacity, and data protection, ensuring reliability in case of single-drive failure.

Resolution

Resolution defines the detail in an image or video, measured in pixels (e.g., 1080p, 4K). Higher resolutions offer better clarity but require more storage and bandwidth.

Role-based Access Control (RBAC)

A system that restricts access based on a user's role within an organization.

S

Smart Analytics

Advanced software features in cameras that analyze video footage to detect specific activities or patterns, such as intrusion detection, object left behind, and people counting. These analytics enhance security and operational efficiency.

SOC 2 Type 2

A report that assesses a service organization’s controls relevant to security, availability, processing integrity, confidentiality, and privacy.

T

No items found.

U

No items found.

V

VMS (Video Management System)

Software that allows users to monitor, control, and manage multiple video surveillance cameras and recordings. VMS can offer features like video analytics, alerting, and integration with other security systems.

VPN (Virtual Private Network)

A secure connection over the internet that protects data and privacy.

W

WDR (Wide Dynamic Range)

A feature in cameras designed to handle environments with varying lighting conditions. It helps balance light and dark areas in an image, preventing overexposure in bright spots and underexposure in shadows.

WebRTC

A technology enabling real-time communication of audio, video, and data in web browsers without plugins.

X

No items found.

Y

No items found.

Z

No items found.

1

1U/2U

1U and 2U are measurements for rack-mounted equipment heights, with 1U being 1.75 inches and 2U being 3.5 inches, ensuring compatibility and efficient rack space usage.

2

No items found.

3

No items found.

4

No items found.

5

No items found.

6

No items found.

7

No items found.

8

No items found.

9

No items found.

0

No items found.