The Essential Coram Glossary

Welcome to the comprehensive glossary for AI Security Systems. Stay ahead of the game with essential resources that will demystify the jargon and empower you to make informed decisions.
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
1
2
3
4
5
6
7
8
9
0

A

Access Control

A system that manages who is allowed to enter or use resources in a physical or digital environment.

Analog Cameras

Traditional cameras that capture and transmit video in analog format. These cameras often use coaxial cables and require conversion to digital for modern viewing and storage.

Annunciator Panel

A panel that displays the status of various system components, often used in security and fire alarm systems.

Access Control List

An Access Control List (ACL) is a security mechanism that defines rules for controlling access to resources by specifying which users or systems can perform specific actions.

AI Camera

An AI camera is an advanced surveillance camera powered by artificial intelligence (AI) to enhance security, automate monitoring, and provide real-time analytics for businesses and organizations.

B

Bandwidth

The capacity of a network to transmit data, typically measured in bits per second (bps).

Bitrate

The amount of data processed per unit of time in video and audio transmissions, typically measured in kilobits per second (kbps).

Blade/Tower

The amount of data processed per unit of time in video and audio transmissions, typically measured in kilobits per second (kbps).

Building Management System (BMS)

A Building Management System (BMS) is a centralized system that monitors and controls a building’s HVAC, lighting, security, and other systems to improve efficiency and automation.

Biometric Authentication

Biometric authentication is a security process that verifies a person’s identity using unique biological traits, such as fingerprints, facial recognition, or iris scans, ensuring secure and convenient access to systems and resources.

C

Camera Map

A Camera Map is a visual representation of camera locations within a monitored area, often including their coverage zones for better security management and optimization.

Camera Vision

The ability of a camera system to process and interpret visual data for analysis or decision-making. It enables tasks like object detection, recognition, and tracking.

Cat5/Cat6

Cat5 and Cat6 are Ethernet cables for networking. Cat5 supports up to 100 Mbps, while Cat6 handles up to 10 Gbps with better performance and less interference.

CCTV (Closed-Circuit Television)

CCTV is a closed video system for monitoring and recording specific areas. It enhances security, deters crime, and allows real-time or recorded footage review.

Cloud

The cloud refers to remote servers accessed online to store, manage, and process data, offering scalability, cost savings, and accessibility without physical infrastructure.

D

DVR (Digital Video Recorder)

A device that records video in a digital format. Traditional home systems often use DVRs, which can operate offline and may utilize coaxial cables. These systems typically do not require subscriptions.

Door Controller

A door controller is an electronic device that manages access to a secured door by verifying credentials and determining whether to grant or deny entry. It is a core component of an access control system.

E

Edge Storage

Refers to storing video data directly on the camera or nearby devices, such as SD cards or NAS (Network Attached Storage). This can provide redundancy and reduce bandwidth usage by storing data locally.

Electric Strike

An electric strike is an access control device that replaces a standard door strike and allows a door to be locked or unlocked electronically, typically in response to a credential, keypad entry, or remote access system.

Electromagnetic Lock (Mag Lock)

An electromagnetic lock (mag lock) is a locking device that uses an electric current to generate a magnetic force, securing a door until power is removed or interrupted. It is widely used in access control systems for high-security applications.

F

Fisheye

A type of wide-angle lens that provides a 180-degree view, often used in security cameras for comprehensive coverage.

G

GPU (Graphics Processing Unit)

A processor designed to handle complex graphics and computational tasks.

GSOC (Global Security Operations Center)

A centralized facility where security professionals monitor and manage security operations on a global scale. These centers use advanced technology to oversee various security systems and respond to incidents.

H

H.264/H.265

Video compression standards that reduce the amount of data required to represent video, allowing for more efficient storage and transmission. H.265, also known as HEVC (High-Efficiency Video Coding), offers better compression than H.264.

HIPAA Compliance

Adherence to the Health Insurance Portability and Accountability Act, ensuring the protection of medical data.

Hybrid-cloud

A computing environment that combines on-premises infrastructure, private cloud services, and public cloud services.

I

IP Address

A unique identifier for a device on a network, enabling communication over the internet.

IP Cameras

IP cameras are digital video cameras that transmit data over networks or the internet. They are ideal for security and surveillance, offering high resolution, remote access, and advanced analytics.

IR (Infrared) Cameras

Cameras equipped with infrared LEDs that enable them to capture video in low-light or no-light conditions. IR cameras are commonly used for nighttime surveillance.

IK Rating

An IK Rating measures the impact resistance of an enclosure or device on a scale from IK00 (no protection) to IK10 (high impact resistance), as per the IEC 62262 standard. It helps determine durability in harsh environments.

J

Journey Path

The route tracked by a security system, often for monitoring the movement of people or vehicles.

K

Kiosk

A standalone terminal that provides information or services, often used in public areas for self-service.

L

Latency

The delay before a transfer of data begins following an instruction for its transfer.

LLM (Large Language Model)

A type of AI model designed to understand and generate human language.

LPR (License Plate Recognition)

A technology used to automatically read and record license plate information from vehicles. It is commonly used in law enforcement, tolling, and parking management.

M

Machine Vision

The use of computer vision in industrial processes for tasks like inspection and measurement.

MFA (Multi-Factor Authentication)

A security process that requires multiple forms of verification to access a system.

Motion Detection

A feature in cameras that triggers recording or alerts when movement is detected in the camera's field of view. This helps reduce storage requirements and focuses attention on significant events.

Multi-Sensor Cameras

Cameras equipped with multiple sensors to cover various angles and provide a more comprehensive surveillance view.

MSP (Managed Service Providers)

A Managed Service Provider (MSP) is a third-party company that remotely manages IT infrastructure, cybersecurity, and end-user systems for businesses, helping them reduce costs and improve efficiency.

N

Natural Language Search

Natural language search allows users to enter queries in everyday language, using NLP to interpret intent and deliver relevant, accurate results.

NDAA Compliance

Adherence to the National Defense Authorization Act, restricting the use of certain foreign-made surveillance equipment.

NFR (Not for Resale)

NFR refers to products provided under the condition they are not to be resold, commonly used for testing, training, demonstrations, or promotions.

NVR (Network Video Recorder)

A device that records video in a digital format to a disk drive, USB flash drive, SD memory card, or other mass storage devices. NVRs are typically used in IP video surveillance systems.

O

ONVIF (Open Network Video Interface Forum)

A standard that ensures interoperability between IP-based security products, such as cameras, from different manufacturers. Compliance with ONVIF standards allows devices to work together seamlessly.

OSINT

OSINT (Open-Source Intelligence) is the collection and analysis of publicly available data for cybersecurity, investigations, and competitive intelligence.

P

Personal Wall

A customizable display or dashboard for monitoring personal security feeds or data.

PoE (Power over Ethernet)

PoE enables Ethernet cables to carry both power and data, simplifying the installation of devices like IP cameras and reducing wiring complexity.

PoE switch

A network switch that provides power over Ethernet to connected devices, such as IP cameras.

Point-to-point

A direct connection between two network devices.

PoS (Point of Sale) Integration

PoS integration links security cameras with PoS systems to monitor transactions and detect fraudulent activities, enhancing security and operational oversight in retail environments.

Q

No items found.

R

RAID5

RAID 5 is a data storage solution using striping with parity to balance performance, capacity, and data protection, ensuring reliability in case of single-drive failure.

Resolution

Resolution defines the detail in an image or video, measured in pixels (e.g., 1080p, 4K). Higher resolutions offer better clarity but require more storage and bandwidth.

Role-based Access Control (RBAC)

A system that restricts access based on a user's role within an organization.

Request to Exit (REX) Device

A Request to Exit (REX) device allows users to unlock a secured door from the inside, typically using a motion sensor, push button, or touchless sensor.

S

Smart Analytics

Advanced software features in cameras that analyze video footage to detect specific activities or patterns, such as intrusion detection, object left behind, and people counting. These analytics enhance security and operational efficiency.

SOC 2 Type 2

A report that assesses a service organization’s controls relevant to security, availability, processing integrity, confidentiality, and privacy.

Smart Card

A smart card is a secure, embedded-chip card used for authentication, access control, and data storage in various systems, including corporate security and banking.

T

No items found.

U

No items found.

V

VMS (Video Management System)

Software that allows users to monitor, control, and manage multiple video surveillance cameras and recordings. VMS can offer features like video analytics, alerting, and integration with other security systems.

VPN (Virtual Private Network)

A secure connection over the internet that protects data and privacy.

W

WDR (Wide Dynamic Range)

A feature in cameras designed to handle environments with varying lighting conditions. It helps balance light and dark areas in an image, preventing overexposure in bright spots and underexposure in shadows.

WebRTC

A technology enabling real-time communication of audio, video, and data in web browsers without plugins.

X

No items found.

Y

No items found.

Z

No items found.

1

1U/2U

1U and 2U are measurements for rack-mounted equipment heights, with 1U being 1.75 inches and 2U being 3.5 inches, ensuring compatibility and efficient rack space usage.

2

No items found.

3

No items found.

4

No items found.

5

No items found.

6

No items found.

7

No items found.

8

No items found.

9

No items found.

0

No items found.