Welcome to the comprehensive glossary for AI Security Systems. Stay ahead of the game with essential resources that will demystify the jargon and empower you to make informed decisions.
A system that manages who is allowed to enter or use resources in a physical or digital environment.
Traditional cameras that capture and transmit video in analog format. These cameras often use coaxial cables and require conversion to digital for modern viewing and storage.
A panel that displays the status of various system components, often used in security and fire alarm systems.
The capacity of a network to transmit data, typically measured in bits per second (bps).
The amount of data processed per unit of time in video and audio transmissions, typically measured in kilobits per second (kbps).
The amount of data processed per unit of time in video and audio transmissions, typically measured in kilobits per second (kbps).
A visual representation of camera locations within a monitored area.
The capability of a camera system to process and interpret visual data.
Categories of twisted pair cables used for network connections, with Cat6 offering higher performance than Cat5.
Video surveillance systems that transmit signals to a specific set of monitors. Used for security and monitoring, CCTV systems can be analog or digital and are commonly employed in businesses, public spaces, and private properties.
Remote servers accessed over the internet to store, manage, and process data.
A device that records video in a digital format. Traditional home systems often use DVRs, which can operate offline and may utilize coaxial cables. These systems typically do not require subscriptions.
Refers to storing video data directly on the camera or nearby devices, such as SD cards or NAS (Network Attached Storage). This can provide redundancy and reduce bandwidth usage by storing data locally.
A type of wide-angle lens that provides a 180-degree view, often used in security cameras for comprehensive coverage.
A processor designed to handle complex graphics and computational tasks.
A centralized facility where security professionals monitor and manage security operations on a global scale. These centers use advanced technology to oversee various security systems and respond to incidents.
Video compression standards that reduce the amount of data required to represent video, allowing for more efficient storage and transmission. H.265, also known as HEVC (High-Efficiency Video Coding), offers better compression than H.264.
Adherence to the Health Insurance Portability and Accountability Act, ensuring the protection of medical data.
A computing environment that combines on-premises infrastructure, private cloud services, and public cloud services.
A unique identifier for a device on a network, enabling communication over the internet.
Digital video cameras that send and receive data over a network or the internet. They are commonly used for surveillance and security purposes and offer features such as high resolution, remote access, and advanced analytics.
Cameras equipped with infrared LEDs that enable them to capture video in low-light or no-light conditions. IR cameras are commonly used for nighttime surveillance.
The route tracked by a security system, often for monitoring the movement of people or vehicles.
A standalone terminal that provides information or services, often used in public areas for self-service.
The delay before a transfer of data begins following an instruction for its transfer.
A type of AI model designed to understand and generate human language.
A technology used to automatically read and record license plate information from vehicles. It is commonly used in law enforcement, tolling, and parking management.
The use of computer vision in industrial processes for tasks like inspection and measurement.
A security process that requires multiple forms of verification to access a system.
A feature in cameras that triggers recording or alerts when movement is detected in the camera's field of view. This helps reduce storage requirements and focuses attention on significant events.
Cameras equipped with multiple sensors to cover various angles and provide a more comprehensive surveillance view.
Managed Service Providers (MSPs) are companies that remotely manage a client's IT infrastructure and end-user systems on a proactive basis. Services often include network management, security, monitoring, and support, allowing businesses to focus on core operations while ensuring their IT needs are efficiently handled.
A search method that allows users to input queries in everyday language and receive relevant results.
Adherence to the National Defense Authorization Act, restricting the use of certain foreign-made surveillance equipment.
Refers to products provided to a customer under the condition that they are not to be resold.
A device that records video in a digital format to a disk drive, USB flash drive, SD memory card, or other mass storage devices. NVRs are typically used in IP video surveillance systems.
A standard that ensures interoperability between IP-based security products, such as cameras, from different manufacturers. Compliance with ONVIF standards allows devices to work together seamlessly.
A customizable display or dashboard for monitoring personal security feeds or data.
A technology that allows Ethernet cables to carry electrical power, enabling devices like IP cameras to receive power and data through a single cable. This simplifies installation and reduces wiring complexity.
A network switch that provides power over Ethernet to connected devices, such as IP cameras.
A direct connection between two network devices.
Integrating security cameras with PoS systems to monitor transactions and detect fraudulent activities. This is commonly used in retail environments to enhance security and operational oversight.
A data storage technology that uses striping with parity, offering a balance between performance, storage capacity, and data protection.
The detail an image holds, typically measured in pixels (e.g., 1080p, 4K).
A system that restricts access based on a user's role within an organization.
Advanced software features in cameras that analyze video footage to detect specific activities or patterns, such as intrusion detection, object left behind, and people counting. These analytics enhance security and operational efficiency.
A report that assesses a service organization’s controls relevant to security, availability, processing integrity, confidentiality, and privacy.
Software that allows users to monitor, control, and manage multiple video surveillance cameras and recordings. VMS can offer features like video analytics, alerting, and integration with other security systems.
A secure connection over the internet that protects data and privacy.
A feature in cameras designed to handle environments with varying lighting conditions. It helps balance light and dark areas in an image, preventing overexposure in bright spots and underexposure in shadows.
A technology enabling real-time communication of audio, video, and data in web browsers without plugins.
Measurements for the height of rack-mounted equipment, with 1U being 1.75 inches and 2U being 3.5 inches.