sst-test-logo-2
AJAX progress indicator
Search:
(clear)
Categories All categories
  • A card or tag granting the holder access to a controlled area.
  • Systems that manage entry to a facility or area based on credentials.
  • A table that tells a computer operating system which access rights each user has to a particular system object.
  • A record of all individuals who have entered or exited a specific area.
  • A system that actively monitors for unauthorized access or activities within a secured area, typically involving motion or heat sensors.
  • In the context of security systems, Artificial Intelligence (AI) refers to the use of machine learning algorithms and data analytics to identify and respond to potential security threats, enhancing the ability to predict, detect, and mitigate risks in a more efficient and automated manner.(...)
  • The use of artificial intelligence to analyze vast amounts of data to identify, assess, and respond to emerging security threats in cloud environments.
  • The channel or route through which an alarm system sends its signals to the monitoring center or the end user. This can be through traditional phone lines, cellular networks, or the internet.
  • Any component of an alarm system that detects an intrusion, hazard, or other condition, such as motion detectors, glass break sensors, or smoke detectors.
  • An occurrence or situation detected by an alarm system that triggers an alert. This could be due to various causes like unauthorized entry, fire, or environmental hazards.
  • Devices that alert occupants or users about an alarm condition. These can include sirens, strobe lights, or message alerts on devices.
  • Central unit controlling a security alarm system.
  • The specific output, often an electronic or digital message, generated by an alarm system when an alarm event is detected. This signal is sent to the alarm panel and, if connected, to a monitoring service.
  • A component within an alarm system that sends an alarm signal to the alarm panel or directly to a monitoring center.
  • A process or technology used to confirm the legitimacy of an alarm signal before emergency services are dispatched. This can help reduce false alarms.
  • To activate or enable an alarm system, making it ready to detect and report specific conditions or intrusions.
  • The process or steps taken to activate the alarm system. This typically involves entering a code, using a key fob, or using a smart device application.
  • In the context of security systems, Artificial Intelligence (AI) refers to the use of machine learning algorithms and data analytics to identify and respond to potential security threats, enhancing the ability to predict, detect, and mitigate risks in a more efficient and automated manner.(...)
  • A feature in some alarm systems that allows the monitoring center to listen in on the premises after an alarm is triggered. This is used to verify if the alarm is legitimate and to gather more information about the situation.
  • A secondary system used to ensure system functionality in the event of failure or outage of the primary security system.
  • A long, typically automated arm used for controlling vehicle access at checkpoints or parking facilities.
  • Device that boosts wireless signals in buildings.
  • Use of unique biological characteristics, such as fingerprints, to verify identity for security purposes.
  • A device that reads an individual's unique biological traits.
  • Identification methods using unique physical characteristics, like fingerprints.
  • A Building Management System (BMS), also known as a Building Automation System (BAS), is a computer-based control system installed in buildings that manages and monitors the building's mechanical and electrical equipment such as ventilation, lighting, power systems, fire systems, and security(...)
  • A function in security systems that allows users to deactivate certain sensors or zones. This is useful in situations where a particular area or sensor needs to be temporarily ignored without disabling the entire system.
  • A system that alerts when a cable is cut or manipulated.
  • A device that detects the presence of carbon monoxide (CO) gas, to prevent CO poisoning. These detectors are critical in homes and buildings that use gas heating or have attached garages.
  • A device that reads data stored on a magnetic stripe or chip on a security card.
  • A video surveillance system transmitting within a closed network.
  • A screen used to view video feeds from CCTV cameras.
  • A method of alarm system communication that uses cellular networks instead of landlines or the internet. This is often used as a more secure and reliable alternative.
  • A facility where alarm signals are received and handled. Personnel at these stations can contact emergency services, property owners, or relevant authorities in response to alarm signals.
  • SECURITY SYSTEMS: In security terminology, the act of setting the alarm system to its armed state, indicating that the protected premises are closed and secured. SALES PROCESS: In sales process terminology, the stage or technique used by a salesperson to finalize a deal, persuading the(...)
  • Techniques and tools designed to detect and prevent unauthorized transfer of data out of cloud environments.
  • The process of connecting and synchronizing security infrastructure and services with cloud-based platforms, allowing for centralized management, enhanced data analytics, and real-time monitoring and response. This integration facilitates improved scalability, flexibility, and efficiency in(...)
  • An integrated suite of security tools designed specifically for the protection of applications built in cloud-native environments, encompassing both cloud security posture management and workload protection.
  • The use of automated tools and processes to manage security tasks in cloud environments, aiming to reduce human error and enhance security efficiency.
  • A security process that continuously monitors and manages the security posture of cloud environments to ensure compliance and protect against threats.
  • The process of identifying and documenting the relationships and dependencies between various cloud services and resources, critical for understanding and mitigating security risks.
  • A security solution that provides protection for workloads (applications, resources, and services) in cloud environments, including monitoring and threat defense.
  • Security practices focused on ensuring the integrity and security of container images used in cloud-based application deployments.
  • The integration of physical security systems, such as surveillance and access controls, with network security measures, to create a unified and comprehensive approach to protecting against both physical and cyber threats.
  • Practice of secure communication using codes.
  • A mathematical procedure for performing encryption and decryption.
  • A strategy and technology for managing all your company's relationships and interactions with current and potential customers, aimed at improving business relationships, assisting in customer retention, and driving sales growth.
  • The practice of protecting internet-connected systems, including hardware, software, and data, from digital attacks.
  • A widely used method of data encryption.
  • A form of encrypted data used as a means of access control, typically in electronic lock systems.
  • Electronic signature validating the integrity and authenticity of a document.
  • A device used in surveillance systems to record video footage from analog cameras onto a digital storage medium, such as a hard disk drive. Unlike Network Video Recorders (NVRs) that work with IP cameras over a network, DVRs process video data at the recorder itself, requiring direct physical(...)
  • Measures and technologies to protect against DDoS attacks.
  • A sensor that detects when a door is opened or closed.
  • Refers to security devices that use two different types of technology to detect intrusions or hazards. Common in motion detectors, this approach reduces false alarms.
  • A special code entered into an alarm system, signaling that the user is under threat and is being forced to disarm the system. This alerts the monitoring center of a potential hostage situation.
  • Device recording video in a digital format.
  • A device at the boundary of a network that acts as the entry point to another network, often equipped with security features.
  • Systems designed to manage and control the exit of individuals from a facility or area.
  • Anti-theft system used in retail stores.
  • A locking device operated through electric current.
  • Process of encoding data to prevent unauthorized access.
  • A procedure where the monitoring center makes multiple attempts to contact the premise or the owner before dispatching emergency services, to reduce false alarms.
  • The use of sensors to monitor environmental conditions like temperature, humidity, or water presence, often to prevent damage or to ensure safety.
  • Measures to protect data and control access over an Ethernet network.
  • Technology identifying individuals from facial features.
  • A biometric software application capable of uniquely identifying or verifying a person by comparing and analyzing patterns based on the person's facial contours.
  • A security feature ensuring a device remains locked during a power failure.
  • The frequency with which a security system generates false alarms.
  • A security model that allows for the sharing and management of security policies and resources across multiple cloud environments and service providers.
  • A sensor that uses optical fibers for detection.
  • A panel or device in a fire alarm system that displays the status and location of fire alarm signals, supervisory signals, and trouble signals. This helps in quick identification and response to fire-related incidents.
  • Security system that controls incoming and outgoing network traffic.
  • A device used to block or interfere with radio communications.
  • Mechanical device blocking vehicle access through a controlled point.
  • A mechanism that opens or closes gates, often remotely controlled for security purposes.
  • The use of GPS or RFID technology to create a virtual geographic boundary.
  • A sensor that detects the sound or vibrations of breaking glass, commonly used in intrusion detection systems.
  • A security feature where a physical response is made by security personnel in response to an alarm or detected threat.
  • A system tracking the movements and activities of security personnel.
  • Unauthorized intrusion into a computer or network.
  • The process of securing a system by reducing its surface of vulnerability, which is larger when a system performs more functions.
  • A type of fire detection device that senses and responds to changes in ambient temperature, typically used in areas where smoke detectors may cause false alarms, like kitchens.
  • A device enabling human input to electronic systems, often used in access control.
  • A manually activated alarm device designed for situations such as a robbery or holdup, allowing an individual under duress to covertly signal for help.
  • Use of holograms as a method of authentication or to enhance security features.
  • A security mechanism set to detect unauthorized use of information systems.
  • A framework for business processes that facilitates the management of electronic identities.
  • A security approach in cloud environments where resources and configurations are made non-changeable after deployment, to prevent tampering and enhance security.
  • Sensor detecting heat and movement through infrared rays.
  • A device that emits infrared light, often used to improve visibility for surveillance cameras in low-light conditions.
  • A specialized code used by technicians to access the programming and configuration settings of an alarm system. This code allows the installer to set up and modify the system's parameters.
  • A communication tool that allows for two-way communication, often used in access control to verify the identity of visitors.
  • In the context of security systems, the Internet of Things (IoT) refers to the network of interconnected physical devices embedded with sensors, software, and other technologies, which are used to collect and exchange data, enhancing the ability to monitor, detect, and respond to security(...)
  • The process and technology used to identify unauthorized entry or activities in a protected area, such as a building or a network. This typically involves sensors, alarms, and monitoring systems that detect and alert security personnel to potential security breaches.
  • Software or hardware detecting unauthorized access.
  • In the context of security systems, the Internet of Things (IoT) refers to the network of interconnected physical devices embedded with sensors, software, and other technologies, which are used to collect and exchange data, enhancing the ability to monitor, detect, and respond to security(...)
  • A type of digital video camera used for surveillance, which can send and receive data via a computer network and the Internet.
  • A suite of protocols for securing Internet Protocol communications.
  • A feature in wireless security systems that identifies the presence of jamming signals.
  • The measurement and analysis of the variability of a network's latency, often used in network security.
  • A small, portable device used for security access or control.
  • The handling and safeguarding of cryptographic keys.
  • A lock operated by a keycard, a flat, rectangular plastic card with identical dimensions to that of a credit card.
  • A device used to input numerical codes for access or system control.
  • Use of laser beams as a perimeter intrusion detection system.
  • A technology that uses optical character recognition on images to read vehicle registration plates, often used in traffic law enforcement, toll booths, and access control.
  • A security system designed to automatically restrict access to a facility or area in response to a threat.
  • Systems that restrict access to computer networks, system files, and data.
  • A device indicating the opening of a door or window.
  • A device that reads the information encoded in the magnetic stripe of a card.
  • A small room or set of doors where the first set of doors must close before the second set opens, used to secure sensitive areas.
  • A network topology in which each node relays data for the network. Used in wireless security systems, it allows for continuous connections and reconfiguration around broken or blocked paths.
  • A security technique that divides cloud networks into smaller zones to maintain separate access for separate parts of the network, improving security within cloud environments.
  • A motion detection device that uses microwave signals to detect changes in a monitored area, often used in combination with other types of sensors to reduce false alarms.
  • Sensor detecting movement in an area.
  • Technology following movement within a camera's field of view.
  • The management and governance of user identities and access across multiple cloud platforms, ensuring that access rights are consistent and secure.
  • The process of encoding messages or information in such a way that only authorized parties can access it, particularly important in securing communication over a network.
  • A system that controls incoming and outgoing network traffic based on predetermined security rules.
  • Measures to protect data during transmission over a network.
  • A specialized device used in video surveillance systems for recording and storing video footage captured by IP (Internet Protocol) cameras. Unlike its counterpart, the Digital Video Recorder (DVR), an NVR relies on a network to receive video data, allowing for remote viewing and management of(...)
  • Short-range wireless connectivity technology used in access control systems.
  • A method of guaranteeing message transmission between parties via digital signature.
  • A security practice where surveillance and alarm systems are monitored by a team located outside the premises, often used to ensure round-the-clock security.
  • Features in security systems that log and report the times when the system is armed (closed) or disarmed (opened), often used in commercial settings for tracking and security purposes.
  • Security practices and technologies used to protect systems that monitor and control physical devices.
  • A barrier with sensors detecting and controlling pedestrian traffic flow.
  • A device allowing users to quickly call for help in an emergency.
  • A feature in alarm systems allowing the division of a security system into sections that can be armed and disarmed independently, providing flexibility and control in larger installations.
  • Systems designed to detect the presence of an intruder attempting to breach a perimeter, such as a fence or wall surrounding a property.
  • Systems designed to protect the external boundaries of a facility.
  • A feature in motion detectors that allows them to ignore the movement of pets to prevent false alarms, usually by excluding detections below a certain size or weight threshold.
  • PIR stands for Passive Infrared sensor. A PIR sensor is a device that detects motion by monitoring changes in the infrared (heat) levels emitted by surrounding objects.
  • Traditional analog telephone service.
  • A device that reads information from a contactless card or fob.
  • A type of surveillance camera that is capable of remote directional and zoom control, allowing it to move left or right (pan), up and down (tilt), and zoom in on objects or subjects to capture detailed views.
  • A set of roles, policies, and procedures needed to create, manage, and revoke digital certificates and manage public-key encryption.
  • Encryption methods designed to be secure against the potential future threat of quantum computing, which could render current encryption algorithms obsolete.
  • Technology used to control queues or lines, often seen in high-security areas.
  • A type of tracking system that uses smart barcodes to identify items, commonly used in inventory management and security systems.
  • The duplication of critical components of a system with the intention of increasing reliability.
  • Watching a location or system from a distance using technology.
  • A device in wireless security systems that extends the range of the wireless signal, ensuring that distant sensors remain in contact with the central alarm system.
  • The use of radio frequency signals to disrupt electronic devices.
  • Use of electromagnetic fields to identify and track tags.
  • Tools and techniques used to detect rootkits, which are malicious software programs.
  • A cloud-native networking and security framework that combines comprehensive WAN capabilities with comprehensive network security functions to support the dynamic, secure access needs of organizations.
  • A thorough examination of a business or home's existing security measures to identify vulnerabilities and propose enhancements.
  • A device detecting vibrations, often used for intrusion detection.
  • A text messaging service component of most telephone, internet, and mobile device systems, used in security systems for alerts and notifications.
  • A card with an embedded microchip used for identification or access.
  • Integrated systems that combine home automation and security, allowing for remote monitoring and control of security devices such as cameras, alarms, and locks through a smart device.
  • A manipulative tactic used to deceive individuals into divulging confidential or personal information for fraudulent purposes.
  • Training and policies designed to recognize and prevent social engineering attacks.
  • A setting in security systems that activates certain sensors while deactivating others, allowing occupants to move freely inside while still maintaining security.
  • A type of signal used in security and fire alarm systems to indicate a change or fault in the system's components, such as low battery, loss of connectivity, or malfunction. It's essential for maintaining the system's integrity and ensuring proper operation.
  • Devices that protect electrical equipment from voltage spikes.
  • Monitoring of behavior and activities for security purposes.
  • In security system terminology, a takeover refers to the process of replacing or upgrading an existing security system with a new system or service provider, often while utilizing some of the existing security infrastructure.
  • A device detecting unauthorized manipulation of a system.
  • "TOC" stands for "Total Cost of Ownership." This term encompasses all the costs associated with purchasing, installing, operating, maintaining, and upgrading a security system over its entire lifespan.
  • A camera that uses infrared radiation to capture images, often used in security systems to detect individuals or objects in low-light conditions or through obstructions like smoke or foliage.
  • A camera that detects heat patterns for surveillance purposes.
  • An alert generated by a security system indicating a problem or malfunction within the system itself, such as a wiring issue, communication failure, or sensor fault. It's a critical feature for proactive maintenance and security assurance.
  • Security process requiring two different authentication methods.
  • A security process where the user provides two different authentication factors.
  • A communication device used for transmitting and receiving voice or data.
  • Device using ultrasonic waves to measure distance or detect movement.
  • A surveillance camera designed to resist tampering or physical attacks, typically used in high-risk areas.
  • Software that analyzes video to detect and determine temporal events.
  • A crucial component of modern security and surveillance systems, designed to manage, record, and analyze video feeds from multiple cameras. It allows for real-time monitoring, video playback, and integration with other security solutions to enhance overall safety and operational efficiency.
  • Technology analyzing video images to detect movement.
  • A security feature where video footage is used to verify the cause of an alarm event. This helps in determining the nature of the incident and whether it is a false alarm or a real emergency.
  • A technology that creates a safe and encrypted connection over a less secure network.
  • A system used to track the usage of a building or site by specific visitors, enhancing security by recording visitor information, the purpose of their visit, and the person visited.
  • Process of identifying weaknesses in a security system.
  • A list of entities authorized to access a particular system or area.
  • A standard for electronic card readers and sensors.
  • A network of distributed sensors communicating wirelessly.
  • The use of x-rays to inspect the interior of objects for security purposes.
  • A directional antenna used to improve wireless reception in security systems.
  • A security vulnerability unknown to those who should be interested in its mitigation.
  • A security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter.
  • Specific area monitored by a security system.
  • A method to deactivate certain zones of a security system temporarily.
  • A label or identification assigned to a specific zone in a security system, typically used to easily identify the location of a sensor or alarm trigger within a larger system.
  • A device used in security systems to increase the number of zones that can be monitored by the system's control panel. It allows for the addition of more sensors without the need for an entirely new control panel, making it an efficient way to scale up a system.
X