The Essential Coram Glossary

Welcome to the comprehensive glossary for AI Security Systems. Stay ahead of the game with essential resources that will demystify the jargon and empower you to make informed decisions.

A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
1
2
3
4
5
6
7
8
9
0

A

Access Control

A system that manages who is allowed to enter or use resources in a physical or digital environment.

Analog Cameras

Traditional cameras that capture and transmit video in analog format. These cameras often use coaxial cables and require conversion to digital for modern viewing and storage.

Annunciator Panel

A panel that displays the status of various system components, often used in security and fire alarm systems.

B

Bandwidth

The capacity of a network to transmit data, typically measured in bits per second (bps).

Bitrate

The amount of data processed per unit of time in video and audio transmissions, typically measured in kilobits per second (kbps).

Blade/Tower

The amount of data processed per unit of time in video and audio transmissions, typically measured in kilobits per second (kbps).

C

Camera Map

A visual representation of camera locations within a monitored area.

Camera Vision

The capability of a camera system to process and interpret visual data.

Cat5/Cat6

Categories of twisted pair cables used for network connections, with Cat6 offering higher performance than Cat5.

CCTV (Closed-Circuit Television)

Video surveillance systems that transmit signals to a specific set of monitors. Used for security and monitoring, CCTV systems can be analog or digital and are commonly employed in businesses, public spaces, and private properties.

Cloud

Remote servers accessed over the internet to store, manage, and process data.

D

DVR (Digital Video Recorder)

A device that records video in a digital format. Traditional home systems often use DVRs, which can operate offline and may utilize coaxial cables. These systems typically do not require subscriptions.

E

Edge Storage

Refers to storing video data directly on the camera or nearby devices, such as SD cards or NAS (Network Attached Storage). This can provide redundancy and reduce bandwidth usage by storing data locally.

F

Fisheye

A type of wide-angle lens that provides a 180-degree view, often used in security cameras for comprehensive coverage.

G

GPU (Graphics Processing Unit)

A processor designed to handle complex graphics and computational tasks.

GSOC (Global Security Operations Center)

A centralized facility where security professionals monitor and manage security operations on a global scale. These centers use advanced technology to oversee various security systems and respond to incidents.

H

H.264/H.265

Video compression standards that reduce the amount of data required to represent video, allowing for more efficient storage and transmission. H.265, also known as HEVC (High-Efficiency Video Coding), offers better compression than H.264.

HIPAA Compliance

Adherence to the Health Insurance Portability and Accountability Act, ensuring the protection of medical data.

Hybrid-cloud

A computing environment that combines on-premises infrastructure, private cloud services, and public cloud services.

I

IP Address

A unique identifier for a device on a network, enabling communication over the internet.

IP Cameras (Internet Protocol Cameras)

Digital video cameras that send and receive data over a network or the internet. They are commonly used for surveillance and security purposes and offer features such as high resolution, remote access, and advanced analytics.

IR (Infrared) Cameras

Cameras equipped with infrared LEDs that enable them to capture video in low-light or no-light conditions. IR cameras are commonly used for nighttime surveillance.

J

Journey Path

The route tracked by a security system, often for monitoring the movement of people or vehicles.

K

Kiosk

A standalone terminal that provides information or services, often used in public areas for self-service.

L

Latency

The delay before a transfer of data begins following an instruction for its transfer.

LLM (Large Language Model)

A type of AI model designed to understand and generate human language.

LPR (License Plate Recognition)

A technology used to automatically read and record license plate information from vehicles. It is commonly used in law enforcement, tolling, and parking management.

M

Machine Vision

The use of computer vision in industrial processes for tasks like inspection and measurement.

MFA (Multi-Factor Authentication)

A security process that requires multiple forms of verification to access a system.

Motion Detection

A feature in cameras that triggers recording or alerts when movement is detected in the camera's field of view. This helps reduce storage requirements and focuses attention on significant events.

Multi Sensor

Cameras equipped with multiple sensors to cover various angles and provide a more comprehensive surveillance view.

MSP (Managed Service Providers)

Managed Service Providers (MSPs) are companies that remotely manage a client's IT infrastructure and end-user systems on a proactive basis. Services often include network management, security, monitoring, and support, allowing businesses to focus on core operations while ensuring their IT needs are efficiently handled.

N

Natural Language Search

A search method that allows users to input queries in everyday language and receive relevant results.

NDAA Compliance

Adherence to the National Defense Authorization Act, restricting the use of certain foreign-made surveillance equipment.

NFR (Not for Resale)

Refers to products provided to a customer under the condition that they are not to be resold.

NVR (Network Video Recorder)

A device that records video in a digital format to a disk drive, USB flash drive, SD memory card, or other mass storage devices. NVRs are typically used in IP video surveillance systems.

O

ONVIF (Open Network Video Interface Forum)

A standard that ensures interoperability between IP-based security products, such as cameras, from different manufacturers. Compliance with ONVIF standards allows devices to work together seamlessly.

P

Personal Wall

A customizable display or dashboard for monitoring personal security feeds or data.

PoE (Power over Ethernet)

A technology that allows Ethernet cables to carry electrical power, enabling devices like IP cameras to receive power and data through a single cable. This simplifies installation and reduces wiring complexity.

PoE switch

A network switch that provides power over Ethernet to connected devices, such as IP cameras.

Point-to-point

A direct connection between two network devices.

PoS (Point of Sale) Integration

Integrating security cameras with PoS systems to monitor transactions and detect fraudulent activities. This is commonly used in retail environments to enhance security and operational oversight.

Q

No items found.

R

RAID5

A data storage technology that uses striping with parity, offering a balance between performance, storage capacity, and data protection.

Resolution

The detail an image holds, typically measured in pixels (e.g., 1080p, 4K).

Role-based Access Control (RBAC)

A system that restricts access based on a user's role within an organization.

S

Smart Analytics

Advanced software features in cameras that analyze video footage to detect specific activities or patterns, such as intrusion detection, object left behind, and people counting. These analytics enhance security and operational efficiency.

SOC 2 Type 2

A report that assesses a service organization’s controls relevant to security, availability, processing integrity, confidentiality, and privacy.

T

No items found.

U

No items found.

V

VMS (Video Management System)

Software that allows users to monitor, control, and manage multiple video surveillance cameras and recordings. VMS can offer features like video analytics, alerting, and integration with other security systems.

VPN (Virtual Private Network)

A secure connection over the internet that protects data and privacy.

W

WDR (Wide Dynamic Range)

A feature in cameras designed to handle environments with varying lighting conditions. It helps balance light and dark areas in an image, preventing overexposure in bright spots and underexposure in shadows.

WebRTC

A technology enabling real-time communication of audio, video, and data in web browsers without plugins.

X

No items found.

Y

No items found.

Z

No items found.

1

1U/2U

Measurements for the height of rack-mounted equipment, with 1U being 1.75 inches and 2U being 3.5 inches.

2

No items found.

3

No items found.

4

No items found.

5

No items found.

6

No items found.

7

No items found.

8

No items found.

9

No items found.

0

No items found.