Glossary

Quick Links

A

Access Control
A system or method that verifies identities and grants or restricts entry to physical or digital locations.

Advanced Video Analytics
Software that uses algorithms and AI to interpret video footage for tasks such as intrusion detection, object tracking, and behavioral analysis.

Alarm Verification
A process that confirms whether an alarm event is valid using video, audio, or sensor confirmation to reduce false dispatches.

B

Biometric Authentication
A security technique that verifies identity based on unique biological traits such as fingerprints, facial geometry, or iris patterns.

Body-Worn Camera
A wearable device used by security personnel to record interactions and provide real-time or stored video evidence.

Badge Reader
A device that scans RFID, proximity, or smartcard badges to control access to secured areas.

C

Cloud Video Surveillance
A system where video footage is stored, managed, and accessed through cloud infrastructure instead of on-premises hardware.

Cyber-Physical Security
A unified approach that integrates IT security with physical protection systems to defend against blended threats.

Credential Management
The administration and lifecycle tracking of access credentials such as cards, fobs, biometrics, and PIN codes.

D

Door Controller
An electronic device that processes access requests and sends lock or unlock signals to a controlled door.

Data Encryption
The cryptographic process of encoding data to protect sensitive information in transit or at rest.

Digital Evidence Management
Systems used to securely store, catalog, share, and control access to digital media collected during investigations.

E

Emergency Lockdown System
A security function that rapidly secures doors and facilities during immediate threats to protect occupants.

Edge Device
A sensor, camera, or controller that processes data locally before sending it to a central server or cloud environment.

Event Logging
The process of recording system activities such as access events, alarms, and user actions for auditing and investigations.

F

Facial Recognition
Software that identifies or verifies individuals by analyzing features captured from video or images.

False Alarm Reduction
Policies and technologies designed to minimize erroneous alarm signals that waste responder resources.

G

Geolocation Tracking
Technology that determines the physical location of personnel, devices, or tagged assets in real time.

Guard Management System
Software used to monitor guard patrols, assign tasks, verify checkpoints, and document incidents.

H

Hardened Infrastructure
Physical or digital systems strengthened to resist tampering, cyberattacks, or forced entry.

Hybrid Cloud Security
A security architecture that blends on-premises hardware with cloud-based services for video, access control, and analytics.

I

Intrusion Detection System (IDS)
A network of sensors and controllers that detect unauthorized entry or suspicious activity within secured environments.

Intercom Door Station
A device enabling audio or video communication at entry points for secure visitor verification.

Incident Response Plan
A structured approach for managing and resolving security breaches, threats, or system failures.

L

License Plate Recognition (LPR)
Technology that scans and interprets license plates for access control, parking management, and investigations.

Lockdown Procedure
A protocol activated during emergencies to restrict movement and secure all entry points.

M

Mantrap
A two-door secured vestibule that allows only one person at a time to pass through, often used for high-security areas.

Mobile Access Credential
A secure virtual ID stored on a smartphone or wearable that replaces traditional access cards.

Monitoring Center
A facility staffed with operators who continuously watch alarms, video feeds, and security events.

N

Network Video Recorder (NVR)
A system that receives and stores IP camera video streams on digital storage devices.

NFC Authentication
Use of near-field communication technology for secure contactless access with smartphones or cards.

O

On-Premises Security System
Hardware and software located physically within a facility and managed by internal staff rather than hosted in the cloud.

Overwatch Camera
A high-mounted camera providing broad area surveillance to capture movement patterns and incidents.

P

Panic Alarm
A discreet button or device that triggers an immediate alert to security or law enforcement when activated.

Perimeter Intrusion Detection
Technology such as sensors, radars, and analytics that monitor the outer boundaries of a property for unauthorized access.

Physical Security Information Management (PSIM)
Software that integrates data from multiple security systems into a single operating dashboard.

R

Redundant Storage
Multiple backup systems used to preserve video and security data in case of equipment failure.

Remote Video Monitoring
A service where security personnel view live or recorded video feeds from off-site monitoring centers.

S

Security Operations Center (SOC)
A centralized facility where security staff monitor video, alarms, and systems 24/7.

Smart Lock
An electronically controlled lock that can be operated via mobile device, PIN, or network command.

Situational Intelligence
The real-time combination of video, sensors, access data, and analytics to enhance decision-making during security incidents.

Surveillance Coverage Analysis
An evaluation of camera placement and visibility to identify blind spots and improve monitoring effectiveness.

T

Thermal Imaging Camera
A device that detects heat signatures and is used for perimeter monitoring, search operations, or low-light surveillance.

Two-Person Integrity
A security control requiring two authorized individuals to be present when accessing sensitive locations or data.

V

Video Management System (VMS)
Software used to record, view, search, and manage video from multiple cameras across a site.

Video Verification
The use of real-time or recorded video to confirm whether an alarm event represents an actual threat.

Visitor Management System
Software used to register visitors, print badges, and track entries and exits.

W

Wireless Locking System
A battery-powered door lock that communicates wirelessly with access control systems, reducing installation costs.

Watchlist Monitoring
The process of automatically screening individuals against predefined lists of banned, flagged, or high-risk persons.

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.