authorized user
An authorized user is a user who can see (has the right to
access) the entities contained in a partition. Users can only exercise their privileges
on entities they can see.
Access control health history
The Access control health
history task is a maintenance task that reports on events related to the
health of access control entities. Unlike the events in the Health
history report, the events in the Access control health
history report are not generated by the Health Monitor role, identified
by an event number, or categorized by severity.
access control unit
An access control unit entity represents an intelligent
access control device, such as a Synergis™
appliance, an Axis Powered by Genetec door controller, or an HID network controller,
that communicates directly with the Access Manager over an IP network. An access control
unit operates autonomously when it is disconnected from the Access
Manager.
Also known as: door
controller
Access control unit events
The Access control unit events
task is a maintenance task that reports on events pertaining to selected access control
units.
Access Manager
The Access Manager role manages and monitors access
control units on the system.
access point
An access point is any entry (or exit) point to a physical
area where access can be monitored and governed by access rules. An access point is
typically a door side.
access right
An access right is the basic right users must have over any
part of the system before they can do anything with it. Other rights, such as viewing
and modifying entity configurations, are granted through privileges. In the context of a Synergis™ system, an access right is
the right granted to a cardholder to pass through an access point at a given date and
time.
access rule
An access rule entity defines a list of cardholders to whom
access is either granted or denied based on a schedule. Access rules can be applied to
secured areas and doors for entries and exits, or to intrusion detection areas for
arming and disarming.
Access rule configuration
The Access rule configuration
task is a maintenance task that reports on entities and access points affected by a
given access rule.
Access troubleshooter
Access troubleshooter is a tool that helps you
detect and diagnose access configuration problems. With this tool, you can find out
about the following:
- Who is allowed to pass through an access point at a given date and time
- Which access points a cardholder is allowed to use at a given date and time
- Why a given cardholder can or cannot use an access point at a given date and time
action
An action is a user-programmable function that can be triggered as an
automatic response to an event, such as door held open for too long or object left
unattended, or that can be executed according to a specific time table.
active alarm
An active alarm is an alarm that has not yet been
acknowledged.
Active Directory
Active Directory is a directory service created by
Microsoft, and a type of role that imports users and cardholders from an Active
Directory and keeps them synchronized.
Active Directory (AD)
Acronym:
AD
Activity trails
The Activity trails task is a
maintenance task that reports on the user activity related to video, access control, and ALPR
functionality. This task can provide information such as who played back which video
recordings, who used the Hotlist and permit editor, who enabled hotlist filtering, and much
more.
Advanced Systems Format
The Advanced Systems Format (ASF) is a video streaming format from
Microsoft. The ASF format can only be played in media players that support this format,
such as Windows Media Player.
Advanced Systems Format (ASF)
Acronym:
ASF
agent
An agent is a subprocess created by a Security Center role to run
simultaneously on multiple servers for the purpose of sharing its load.
alarm
An alarm entity describes a particular type of trouble situation
that requires immediate attention and how it can be handled in Security Center. For example, an alarm can indicate
which entities (usually cameras and doors) best describe the situation, who must be
notified, how it must be displayed to the user, and so on.
alarm acknowledgement
An alarm acknowledgement is the final user response
to an alarm that ends its lifecycle and removes it from the active alarm list. In
Security Center, we have two variants of
alarm acknowledgements: default and alternative. Each variant is associated to a
different event so that specific actions can be programmed based on the alarm
response selected by the user.
Alarm monitoring
The Alarm monitoring task is an
operation task that you can use to monitor and respond to alarms (acknowledge, forward,
snooze, and so on) in real time, and to review past alarms.
Alarm report
The Alarm report task is an
investigation task that you can use to search and view current and past
alarms.
analog monitor
An analog monitor entity represents a monitor that
displays video from an analog source, such as a video decoder or an analog camera. This term
is used in Security Center to refer to monitors that
are not controlled by a computer.
antipassback
Antipassback is an access restriction placed on a secured
area that prevents a cardholder from entering an area that they have not yet exited
from, and vice versa.
Archiver
The Archiver role is responsible for the discovery, status
polling, and control of video units. The Archiver also manages the video archive and
performs motion detection if it is not done on the unit itself.
Archiver events
The Archiver events task is a
maintenance task that reports on events pertaining to selected Archiver
roles.
Archives
The Archives task is an investigation task
that you can use to find and view video archives by camera and time
range.
Archive storage details
The Archive storage details
task is a maintenance task that reports on the video files (file name, start and end time,
file size, protection status, and so on) used to store video archive. Using this task, you can
also change the protection status of these video files.
archive transfer
Archive transfer is the process of transferring your video
data from one location to another. The video is recorded and stored on the video unit
itself or on an Archiver storage disk, and then the recordings are transferred to
another location.
area
In Security Center, an area
entity represents a concept or a physical location (room, floor, building, site, and so
on) used for grouping other entities in the system.
Area activities
The Area activities task is an
investigation task that reports on access control events pertaining to selected
areas.
Area presence
The Area presence is and investigation
task that provides a snapshot of all cardholders and visitors currently present in a
selected area.
area view
The area view is a view that organizes the commonly used entities
such as doors, cameras, tile plugins, intrusion detection areas, zones, and so on, by
areas. This view is primarily created for the day to day work of the security
operators.
asset
An asset entity represents any valuable object with an RFID tag
attached, thus allowing it to be tracked by an asset management
software.
asynchronous video
Asynchronous video is simultaneous playback video from
more than one camera that are not synchronized in time.
audio decoder
An audio decoder is a device or software that decodes compressed
audio streams for playback. Synonym of speaker.
audio encoder
An audio encoder is a device or software that encodes audio
streams using a compression algorithm. Synonym of microphone.
Audit trails
The Audit trails task is a maintenance
task that reports on the configuration changes of the selected entities in the system.
The report also indicates the user who made the changes.
automatic enrollment
Automatic enrollment is when new IP units on a network are
automatically discovered by and added to Security Center. The role that is responsible
for the units broadcasts a discovery request on a specific port, and the units
listening on that port respond with a message that contains the connection information
about themselves. The role then uses the information to configure the connection to the
unit and enable communication.
automatic license plate recognition
Automatic license plate recognition (ALPR) is an image processing
technology used to read license plate numbers. ALPR converts license plate numbers
cropped from camera images into a database searchable format.
automatic license plate recognition (ALPR)
Acronym: ALPR
AutoVu™
The AutoVu™ automatic
license plate recognition (ALPR) system automates license plate reading and
identification, making it easier for law enforcement and for municipal and commercial
organizations to locate vehicles of interest and enforce parking restrictions. Designed
for both fixed and mobile installations, the AutoVu™ system is ideal for a variety of applications
and entities, including law enforcement, municipal, and commercial
organizations.
Auxiliary Archiver
The Auxiliary Archiver role supplements the video
archive produced by the Archiver role. Unlike the Archiver role, the Auxiliary Archiver role
is not bound to any particular discovery port, therefore, it can archive any camera in
the system, including cameras federated from other Security Center systems. The Auxiliary Archiver role cannot
operate independently; it requires the Archiver role to communicate with video
units.
Badge designer
The Badge designer is the tool that you can use to design
and modify badge templates.
badge template
A badge template is an entity used to configure a printing
template for badges.
bookmark
A bookmark is an indicator of an event or incident that is used
to mark a specific point in time in a recorded video sequence. A bookmark also contains a
short text description that can be used to search for and review the video sequences at a
later time.
Bookmarks
The Bookmarks task is an investigation
task that searches for bookmarks related to selected cameras within a specified time
range.
broadcast
Broadcast is the communication between a single sender and all
receivers on a network.
camera (Security Center)
A camera entity represents a single video source in the system.
The video source can either be an IP camera, or an analog camera that connects to the
video encoder of a video unit. Multiple video streams can be generated from the same
video source.
camera blocking
Camera blocking is an Omnicast™ feature that lets you restrict the viewing
of video (live or playback) from certain cameras to users with a minimum user
level.
Camera configuration
The Camera configuration task
is a maintenance task that reports on the properties and settings of local cameras in
your system (manufacturer, resolution, frame rate, stream usage, and so
on).
Camera events
The Camera events task is an
investigation task that reports on events pertaining to selected cameras within a
specified time range.
camera sequence
A camera sequence is an entity that defines a list of
cameras that are displayed one after another in a rotating fashion within a single tile
in Security Desk.
canvas
Canvas is one of the panes found in the Security Desk's task workspace.
The canvas is used to display multimedia information, such as videos, maps, and
pictures. It is further divided into three panels: the tiles, the dashboard, and the
properties.
Card and PIN
Card and PIN is an access point mode that requires a cardholder to
present their card, and then enter a personal identification number (PIN).
cardholder
A cardholder entity represents a person who can enter and
exit secured areas by virtue of their credentials (typically access cards) and whose
activities can be tracked.
Cardholder access rights
The Cardholder access rights
task is a maintenance task that reports on which cardholders and cardholder groups are
granted or denied access to selected areas, doors, and elevators.
Cardholder activities
The Cardholder activities task
is an investigation task that reports on cardholder activities, such as access denied,
first person in, last person out, antipassback violation, and so on.
Cardholder configuration
The Cardholder
configuration is a maintenance task that reports on cardholder
properties, such as first name, last name, picture, status, custom properties, and so
on.
cardholder group
A cardholder group is an entity that defines the common
access rights of a group of cardholders.
Cardholder management
The Cardholder management task
is an operation task. You can use this task to create, modify, and delete cardholders.
With this task, you can also manage a cardholders' credentials, including temporary
replacement cards.
cash register
A cash register entity represents a single cash register
(or terminal) in a point of sale system.
certificate
Designates one of the following: (1) digital
certificate; (2) SDK certificate.
Config Tool
Config Tool is
the Security Center administrative application used to
manage all Security Center users and to configure all
Security Center entities such as areas, cameras,
doors, schedules, cardholders, patrol vehicles, ALPR units, and hardware
devices.
Conflict resolution utility
The Conflict resolution utility is a tool that
helps you resolve conflicts caused by importing users and cardholders from an Active
Directory.
controlled exit
A controlled exit is when credentials are necessary to leave a
secured area.
controller module
Controller module is the processing component of
Synergis™ Master Controller with IP capability. This module comes
pre-loaded with the controller firmware and the web-based administration tool, Synergis™ Appliance Portal.
Copy configuration tool
The Copy configuration tool helps you save
configuration time by copying the settings of one entity to many others that partially
share the same settings.
credential
A credential entity represents a proximity card, a biometrics
template, or a PIN required to gain access to a secured area. A credential can only be
assigned to one cardholder at a time.
Credential activities
The Credential activities task
is an investigation task that reports on credential related activities, such as access
denied due to expired, inactive, lost, or stolen credentialsl, and so
on.
credential code
A credential code is a textual representation of the
credential, typically indicating the Facility code and the Card number. For credentials
using custom card formats, the user can choose what to include in the credential
code.
Credential configuration
The Credential configuration
task is a maintenance task that reports on credential properties, such as status,
assigned cardholder, card format, credential code, custom properties, and so
on.
Credential management
The Credential management task
is an operation task. You can use this task to create, modify, and delete credentials.
With this task, you can also print badges and enroll large numbers of card credentials
into the system, either by scanning them at a designated card reader or by entering a
range of values.
Credential request history
The Credential request
history task is an investigation task that reports on which users
requested, canceled, or printed cardholder credentials.
custom event
A custom event is an event added after the initial system
installation. Events defined at system installation are called system events. Custom
events can be user-defined or automatically added through plugin installations. Unlike
system events, custom events can be renamed and deleted.
custom field
A custom field is a user-defined property that is associated
with an entity type and is used to store additional information that is useful to your
organization.
database server
A database server is an application that manages
databases and handles data requests made by client applications. Security Center uses Microsoft SQL Server as its
database server.
debounce
A debounce is the amount of time an input can be in a changed
state (for example, from active to inactive) before the state change is reported.
Electrical switches often cause temporarily unstable signals when changing states,
possibly confusing the logical circuitry. Debouncing is used to filter out unstable
signals by ignoring all state changes that are shorter than a certain period (in
milliseconds).
degraded mode
Degraded mode is an offline operation mode of the interface
module when the connection to the Synergis™ unit
is lost. The interface module grants access to all credentials matching a specified
facility code.
dependent mode
Dependent mode is an online operation mode of the
interface module where the Synergis™ unit makes all access control decisions. Not all
interface modules can operate in dependent mode.
dewarping
Dewarping is the transformation used to straighten a digital image
taken with a fisheye lens.
digital signature
A digital signature is cryptographic metadata added to
video frames by the Archiver or Auxiliary Archiver to ensure their authenticity. If a
video sequence is manipulated by adding, deleting, or modifying frames, the signature of
the modified content will differ from the original, indicating that the video
sequence has been tampered with.
Directory
The Directory role identifies a Security Center system. It manages all entity
configurations and system-wide settings.
Only a single instance of this role is permitted on
your system. The server hosting the Directory role is called the main server, and
must be set up first. All other servers you add in Security Center are called
expansion servers, and must connect to the main server to be part of the same
system.
Directory Manager
The Directory Manager role manages the Directory
failover and load balancing to produce the high availability characteristics in Security Center.
Directory server
A Directory server is any one of the multiple servers
simultaneously running the Directory role in a high availability
configuration.
discovery port
A discovery port is a port used by certain Security Center roles
(Access Manager, Archiver, ALPR Manager) to find the units they are responsible for on
the LAN. No two discovery ports can be the same on one system.
door
A door entity represents a physical barrier. Often, this is an
actual door but it could also be a gate, a turnstile, or any other controllable barrier.
Each door has two sides, named In and Out by default. Each side is an
access point (entrance or exit) to a secured area.
Door activities
The Door activities task is an
investigation task that generates reports on door-related activities, such as access
denied, door forced open, door open too long, hardware tamper, and so
on.
door contact
A door contact monitors the state of a door, whether it is open or
closed. It can also be used to detect an improper state, such as door open too
long.
door side
Every door has two sides, named In and Out by default.
Each side is an access point to an area. For example, passing through one side leads
into an area, and passing through the other side leads out of that area. For the
purposes of access management, the credentials that are required to pass through a door
in one direction are not necessarily the same that are required to pass through in the
opposite direction.
Door troubleshooter
The Door troubleshooter task is
a maintenance task that lists all the cardholders who have access to a particular door
side or elevator floor at a specific date and time.
Driver Development Kit
Driver Development Kit is a SDK for creating device
drivers.
Driver Development Kit (DDK)
Acronym:
DDK
duress
A duress is a special code used to disarm an alarm system. This code
quietly alerts the monitoring station that the alarm system was disarmed under
threat.
edge recording
Edge recording is the process of recording and storing
recorded videos on the peripheral device, thus removing the need for a centralized recording
server or unit. With edge recording, you can store video directly on the camera’s internal
storage device (SD card) or on a network attached storage volume (NAS volume).
electric door strike
An electric door strike is an electric device that releases
the door latch when current is applied.
elevator
An elevator is an entity that provides access control
properties to elevators. For an elevator, each floor is considered an access
point.
Elevator activities
The Elevator activities task is
an investigation task that reports on elevator related activities, such as access
denied, floor accessed, unit is offline, hardware tamper, and so on.
enforce
To enforce is to take action following a confirmed hit. For example, a
parking officer can enforce a scofflaw violation (unpaid parking tickets) by placing a
wheel boot on the vehicle.
entity
Entities are the basic building blocks of Security Center. Everything
that requires configuration is represented by an entity. An entity can represent a
physical device, such as a camera or a door, or an abstract concept, such as an alarm, a
schedule, a user, a role, a plugin, or an add-on.
entity tree
An entity tree is the graphical representation of Security Center
entities in a tree structure, illustrating the hierarchical nature of their
relationships.
event
In the context of Security Center, an event indicates the occurrence of an
activity or incident, such as access denied to a cardholder or motion detected on a camera.
Events are automatically logged in Security Center.
Every event has an entity as its main focus, called the event source.
event-to-action
An event-to-action links an action to an event. For example, you
can configure Security Center to trigger an
alarm when a door is forced open.
expansion server
An expansion server is any server machine in a Security Center
system that does not host the Directory role. The purpose of the expansion server is to
add to the processing power of the system.
failover
Failover is a backup operational mode in which a role (system
function) is automatically transferred from its primary server to a secondary server
that is on standby. This transfer between servers occurs only if the primary server
becomes unavailable, either through failure or through scheduled downtime.
federated entity
A federated entity is any entity that is imported from an
independent system through one of the Federation™
roles.
federated system
A federated system is a independent system (Omnicast™ or
Security Center) that is unified under your
local Security Center through a Federation™ role, so that the local users can view and
control its entities as if they belong to their local system.
Federation™
The Federation™ feature
joins multiple, independent Genetec™ IP
security systems into a single virtual system. With this feature, users on the central
Security Center system can view and control entities that belong to remote
systems.
Forensic search
The Forensic search task is an
investigation task that searches for video sequences based on video analytics
events.
four-port RS-485 module
A four-port RS-485 module is a RS-485
communication component of Synergis™ Master Controller with four ports
(or channels) named A, B, C, and D. The number of interface modules you can connect to
each channel depends on the type of hardware you have.
free access
A free access is an access point state where no credentials are
necessary to enter a secured area. The door is unlocked. This is typically used during
normal business hours, as a temporary measure during maintenance, or when the access
control system is first powered up and is yet to be configured.
free exit
A free exit is an access point state where no credentials are
necessary to leave a secured area. The person releases the door by turning the doorknob,
or by pressing the REX button, and walks out. An automatic door closer shuts the door so
it can be locked after being opened.
G64
G64 is a Security Center format used by archiving roles (Archiver and
Auxiliary Archiver) to store video sequences issued from a single camera. This data
format supports audio, bookmarks, metadata overlays, timestamps, motion and event
markers, and variable frame rate and resolution.
Genetec™ Server
Genetec™ Server is the Windows service that is at the core of Security Center architecture, and that must be installed on
every computer that is part of the Security Center's
pool of servers. Every such server is a generic computing resource capable of taking on any
role (set of functions) you assign to it.
Genetec™ Video Player
Genetec™ Video Player is
a standalone media player you can use to view G64 and G64x video files exported from
Security Desk. You can also use it to
view video on a computer that does not have Security Center installed.
ghost camera
A ghost camera is an entity used as a substitute camera.
This entity is automatically created by the Archiver when video archives are detected for a
camera whose definition has been deleted from the Directory, either accidentally or because
the physical device no longer exists. Ghost cameras cannot be configured, and only exist so
users can reference the video archive that would otherwise not be associated to any
camera.
Geographic Information System
Geographic Information System (GIS) is a
system that captures spatial geographical data. Map Manager can connect to third-party
vendors that provide GIS services in order to bring maps and all types of geographically
referenced data to Security Center.
Geographic Information System (GIS)
Acronym:
GIS
Global Cardholder Synchronizer
The Global Cardholder Synchronizer role ensures the
two-way synchronization of shared cardholders and their related entities between the
local system (sharing guest) where it resides and the central system (sharing
host).
Global Cardholder Synchronizer (GCS)
Acronym: GCS
global entity
A global entity is an entity that is shared across multiple
independent Security Center systems by virtue of its membership to a global partition.
Only cardholders, cardholder groups, credentials, and badge templates are eligible for
sharing.
global partition
Global partition is a partition that is shared across multiple
independent Security Center systems by the partition owner, called the sharing
host.
hardware integration package
A hardware integration package, or HIP, is an
update that can be applied to Security Center.
It enables the management of new functionalities (for example, new video unit types),
without requiring an upgrade to the next Security Center release.
hardware integration package (HIP)
Acronym:
HIP
Hardware inventory
The Hardware inventory task is a
maintenance task that reports on the characteristics (unit model, firmware version, IP
address, time zone, and so on) of access control, video, intrusion detection, and ALPR
units in your system.
hardware zone
A hardware zone is a zone entity in which the I/O linking is
executed by a single access control unit. A hardware zone works independently of the
Access Manager, and consequently, cannot be armed or disarmed from Security Desk.
Health history
The Health history task is a
maintenance task that reports on health issues.
Health Monitor
The Health Monitor role monitors system entities such as
servers, roles, units, and client applications for health issues.
Health statistics
The Health statistics task is a
maintenance task that gives you an overall view of the health of your system by
reporting on the availability of selected system entities such as roles, video units,
and access control units.
high availability
High availability is a design approach that enables a system
to perform at a higher than normal operational level. This often involves failover and
load balancing.
hot action
A hot action is an action mapped to a PC keyboard function key
(Ctrl+F1 through Ctrl+F12) in Security Desk for quick access.
hotspot
A hotspot is a map object that represents an area on the map
which requires special attention. Clicking on a hotspot displays associated fixed and
PTZ cameras.
identity provider
An identity provider is a trusted, external system that
administers user accounts, and is responsible for providing user authentication and
identity information to relying applications over a distributed network.
Import tool
The Import tool is the tool that you can use to import
cardholders, cardholder groups, and credentials from a comma-separated values (CSV)
file.
inactive entity
An inactive entity is an entity that is shaded in red in the
entity browser. It signals that the real world entity it represents is either not
working, offline, or incorrectly configured.
incident
An incident is an unexpected event reported by a Security Desk user.
Incident reports can use formatted text and include events and entities as support
material.
Incidents
The Incidents task is an investigation
task that you can use to search, review, and modify incident reports created by Security Desk users.
interface module
An interface module is a third-party security device that
communicates with an access control unit over IP or RS-485, and provides additional
input, output, and reader connections to the unit.
interlock
An interlock (also known as sally port or airlock) is an
access restriction placed on a secured area that permits only one perimeter door to be
open at any given time.
intrusion detection area
An intrusion detection area entity represents a
zone (sometimes called an area) or a partition (group of sensors) on an intrusion
panel.
Intrusion detection area activities
The Intrusion detection area
activities task is an investigation task that reports on activities
(master arm, perimeter arm, duress, input trouble, and so on) in selected intrusion
detection areas.
intrusion detection unit
An intrusion detection unit entity represents an
intrusion device (intrusion panel, control panel, receiver, and so on) that is monitored
and controlled by the Intrusion Manager role.
Intrusion detection unit events
The Intrusion detection unit
events task is an investigation task that reports on events (AC fail,
battery fail, unit lost, input trouble, and so on) related to selected intrusion
detection units.
Intrusion Manager
The Intrusion Manager role monitors and controls
intrusion detection units. It listens to the events reported by the units, provides live
reports to Security Center, and logs the events
in a database for future reporting.
intrusion panel
An intrusion panel (also known as alarm
panel or control panel) is a wall-mounted unit where the alarm sensors
(motion sensors, smoke detectors, door sensors, and so on) and wiring of the intrusion
alarms are connected and managed.
Also known as: alarm
panel
I/O configuration
The I/O configuration task is a
maintenance task that reports on the I/O configurations (controlled access points,
doors, and elevators) of access control units.
I/O linking
I/O (input/output) linking is controlling an output relay based on
the combined state (normal, active, or trouble) of a group of monitored inputs. A
standard application is to sound a buzzer (through an output relay) when any window on
the ground floor of a building is shattered (assuming that each window is monitored by a
"glass break" sensor connected to an input).
IP camera
An IP camera is a video encoder unit incorporating a
camera.
IPv4
IPv4 is the first generation Internet protocol using a 32-bit address
space.
IPv6
IPv6 is a 128-bit Internet protocol that uses eight groups of four
hexadecimal digits for address space.
Keyhole Markup Language
Keyhole Markup Language (KML) is a file format
used to display geographic data in an Earth browser such as Google Earth and Google
Maps.
Keyhole Markup Language (KML)
Acronym:
KML
license key
A license key is the software key used to unlock the Security Center software. The license key is specifically generated for each computer where the
Directory role is installed. To obtain your license key, you need the System ID
(which identifies your system) and the Validation key (which identifies your
computer).
license plate inventory
A license plate inventory is a list of license plate
numbers of vehicles found in a parking facility within a given time period, showing
where each vehicle is parked (sector and row).
load balancing
Load balancing is the distribution of workload across multiple
computers.
logical ID
Logical ID is a unique ID assigned to each entity in the system for
ease of reference. Logical IDs are only unique within a particular entity
type.
macro
A macro is an entity that encapsulates a C# program that adds
custom functionalities to Security Center.
main server
The main server is the only server in a Security Center
system hosting the Directory role. All other servers on the system must connect to the
main server to be part of the same system. In a high availability configuration where
multiple servers host the Directory role, it is the only server that can write to the
Directory database.
map link
A map link is a map object that brings you to another map with a
single click.
map mode
Map mode is a Security Desk canvas operating mode that replaces tiles
and controls with a geographical map showing all active, georeferenced events in your
system. Switching to Map mode is a feature that comes with
AutoVu™, Correlation, or Genetec Mission Control™, and requires a license for one of these
major features.
map object
Map objects are graphical representations on your maps of
Security Center entities or geographical features, such as cities, highways, rivers, and so
on. With map objects, you can interact with your system without leaving your
map.
map view
A map view is a defined section of a map.
master arm
Master arm is arming an intrusion detection area in such a way that all sensors attributed to the area would set the alarm off if one of them is triggered.
Also known as: Away
arming
Media Router
The Media Router role is the central role that handles all
stream requests (audio and video) in Security Center.
It establishes streaming sessions between the stream source, such as a camera or an Archiver,
and its requesters (client applications). Routing decisions are based on the location (IP
address) and the transmission capabilities of all parties involved (source, destinations,
networks, and servers).
Mobile Admin
(Obsolete as of SC 5.8 GA) Mobile Admin is a web-based
administration tool used to configure the Mobile Server.
Genetec™ Mobile
Official name of the map-based Security Center mobile application for Android and
iOS devices.
mobile credential
A mobile credential is a credential on a smartphone that uses
Bluetooth or Near Field Communication (NFC) technology to access secured
areas.
Mobile License Plate Inventory
Mobile License Plate Inventory (MLPI) is
the Genetec Patroller™ software installation that is
configured for collecting license plates and other vehicle information for creating and
maintaining a license plate inventory for a large parking area or parking
garage.
Mobile License Plate Inventory (MLPI)
Acronym:
MLPI
Mobile Server
The Mobile Server role provides Security Center access on mobile
devices.
monitor group
A monitor group is an entity used to designate analog
monitors for alarm display. Besides the monitor groups, the only other way to display
alarms in real time is to use the Alarm monitoring task in Security Desk.
monitor ID
Monitor ID is an ID used to uniquely identify a workstation screen
controlled by Security Desk.
Monitoring
The Monitoring task is an operation task
that you can use to monitor and respond to real-time events that relate to selected entities.
Using the Monitoring task, you can also monitor and respond to
alarms.
motion detection
Motion detection is the feature that watches for changes in a
series of video images. The definition of what constitutes motion in a video can be
based on highly sophisticated criteria.
Motion search
The Motion search task is an
investigation task that searches for motion detected in specific areas of a camera's
field of view.
motion zone
A motion zone is a user defined areas within a video image where
motion should be detected.
Move unit
Move unit tool is used to move units from one manager role to
another. The move preserves all unit configurations and data. After the move, the new
manager immediately takes on the command and control function of the unit, while the old
manager continues to manage the unit data collected before the move.
network
The network entity is used to capture the characteristics of the
networks used by your system so that proper stream routing decisions can be
made.
network address translation
Network address translation is the process of
modifying network address information in datagram (IP) packet headers while in transit across
a traffic routing device, for the purpose of remapping one IP address space into
another.
network address translation (NAT)
Acronym: NAT
network view
The network view is a browser view that illustrates your network
environment by showing each server under the network they belong to.
notification tray
The notification tray contains icons that allow quick access
to certain system features, and also displays indicators for system events and status
information. The notification tray display settings are saved as part of your user
profile and apply to both Security Desk and Config Tool.
Omnicast™
Security Center
Omnicast™ is the IP video management system
(VMS) that provides organizations of all sizes the ability to deploy a surveillance
system adapted to their needs. Supporting a wide range of IP cameras, it addresses the
growing demand for HD video and analytics, all the while protecting individual
privacy.
Omnicast™ compatibility pack
Omnicast™ compatibility pack is the software component
that you need to install to make Security Center
compatible with an Omnicast™ 4.x system. Please note Omnicast™ 4.8 has reached End of Life.
For more information, see the Genetec™ Product Lifecyle
page.
Omnicast™ Federation™
The Omnicast™
Federation™ role connects an Omnicast™ 4.x system to Security Center. That way, the Omnicast™ entities and events can be used in your
Security Center system. Please note
Omnicast™ 4.8 has reached End of Life. For more information, see the Genetec™ Product Lifecyle page.
output behavior
An output behavior is an entity that defines a custom
output signal format, such as a pulse with a delay and duration.
parking facility
A parking facility entity defines a large parking area
as a number of sectors and rows for the purpose of inventory tracking.
partition
A partition is an entity in Security Center that defines a set of entities that
are only visible to a specific group of users. For example, a partition could include
all areas, doors, cameras, and zones in one building.
People counting
The People counting task is an
operation task that keeps count in real-time of the number of cardholders in all secured
areas of your system.
perimeter arm
Perimeter arm is arming an intrusion detection area in such a way that only sensors attributed to the area perimeter set the alarm off if triggered. Other sensors, such as motion sensors inside the area, are ignored.
Plan Manager
(Obsolete) Plan Manager is a module of Security Center that provides interactive mapping
functionality to better visualize your security environment. The Plan Manager module has
been replaced by the Security Center role, Map
Manager, since version 5.4 GA.
plugin
A plugin (in lowercase) is a software component that adds a
specific feature to an existing program. Depending on the context, plugin can refer
either to the software component itself or to the software package used to install the
software component.
plugin role
A plugin role adds optional features to Security Center. A plugin role is created by using
the Plugin role template. By default, it is represented by an orange puzzle piece
in the Roles view of the System task.
Before you can create a plugin role, the software
package specific to that role must be installed on your system.
Point of sale
Point of sale (POS) is a system that typically refers to the
hardware and software used for checkouts - the equivalent of an electronic cash
register. These systems are used to capture detailed transactions, authorize payments,
track inventory, audit sales, and manage employees. Point of sale systems are used in
supermarkets, restaurants, hotels, stadiums, casinos, retail
establishments.
Point of sale (POS)
Acronym:
POS
primary server
The primary server is the default server chosen to perform
a specific function (or role) in the system. To increase the system's fault-tolerance, the
primary server can be protected by a secondary server on standby. When the primary server
becomes unavailable, the secondary server automatically takes over.
private IP address
A private IP address is an IP address chosen from a
range of addresses that are only valid for use on a LAN. The ranges for a private IP
address are: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.16.255.255, and 192.168.0.0
to 192.168.255.255. Routers on the Internet are normally configured to discard any
traffic using private IP addresses.
private task
A private task is a saved task that is only visible to the
user who created it.
privilege
Privileges define what users can do, such as arming zones,
blocking cameras, and unlocking doors, over the part of the system they have access
rights to.
public task
A public task is a saved task that can be shared and reused among multiple Security Center users.
reader
A reader is a sensor that reads the credential for an access control
system. For example, this can be a card reader, or a biometrics scanner.
recording mode
Recording mode is the criteria by which the system
schedules the recording of video streams. There are four possible recording modes:
- Continuous. Records continuously.
- On motion/Manual. Records according to motion detection settings, and when a user or system action requests it.
- Manual. Records only when a user or system action requests it.
- Off. No recording is permitted.
recording state
Recording state is the current recording status of a given
camera. There are four possible recording states: Enabled, Disabled,
Currently recording (unlocked), and Currently recording
(locked).
redirector
A redirector is a server assigned to host a redirector agent
created by the Media Router role.
redirector agent
A redirector agent is an agent created by the Media Router
role to redirect data streams from one IP endpoint to another.
redundant archiving
Redundant archiving is an option to enhance the
availability of video and audio archives during failover and to protect against data
loss. If you enable this option, all servers assigned to an Archiver role archive video,
and audio, at the same time.
Remote
The Remote task is an operation task that
you can use to remotely monitor and control other Security Desk applications in your system that
are running the Monitoring task or the Alarm
monitoring task.
Report Manager
The Report Manager role automates report emailing and
printing based on schedules.
report pane
The report pane is one of the panes found in the Security Desk workspace. It displays query
results or real-time events in a tabular form.
request to exit
Request to exit (REX) is a door release button normally located
on the inside of a secured area that when pressed, allows a person to exit the secured
area without having to show any credential. This can also be the signal from a motion
detector. It is also the signal received by the controller for a request to
exit.
request to exit (REX)
Acronym:
REX
role
A role is a software component that performs a specific job within
Security Center. To execute a role, you must assign one or more servers to host
it.
roles and units view
The roles and units view is a browser view that lists the
roles on your system with the units they control as child entities.
route
A route is a setting that configures the transmission capabilities
between two end points in a network for the purpose of routing media
streams.
schedule
A schedule is an entity that defines a set of time constraints
that can be applied to a multitude of situations in the system. Each time constraint is
defined by a date coverage (daily, weekly, ordinal, or specific) and a time coverage (all day,
fixed range, daytime, and nighttime).
scheduled task
A scheduled task is an entity that defines an action that
executes automatically on a specific date and time, or according to a recurring
schedule.
Software Development Kit
The Software Development Kit (SDK) is what end-users use to develop
custom applications or custom application extensions for Security Center.
Software Development Kit (SDK)
Acronym:
SDK
secondary server
A secondary server is an alternative server on standby
intended to replace the primary server in case the latter becomes
unavailable.
Also known as: standby
server
Security Center
Security Center
is a truly unified platform that blends IP video surveillance, access control, automatic
license plate recognition, intrusion detection, and communications within one intuitive and
modular solution. By taking advantage of a unified approach to security, your organization
becomes more efficient, makes better decisions, and responds to situations and threats with
greater confidence.
Security Center Federation™
The Security Center
Federation™ role connects a remote independent Security Center system to your local Security Center system. That way, the remote system's
entities and events can be used in your local system.
Security Center Mobile
(Obsolete) See Mobile Server and Genetec™ Mobile.
security clearance
A security clearance is a numerical value used to further
restrict the access to an area when a threat level is in effect. Cardholders can only
enter an area if their security clearance is equal or higher than the minimum security
clearance set on the area.
Security Desk
Security Desk
is the unified user interface of Security Center. It
provides consistent operator flow across all of the Security Center main systems, Omnicast™, Synergis™,
and AutoVu™. The unique task-based design of Security Desk lets operators efficiently control and
monitor multiple security and public safety applications.
server
In Security Center, a
server entity represents a computer on which the Genetec™ Server service is
installed.
Server Admin
Server Admin
is the web application running on every server machine in Security Center that you use to configure the Genetec™ Server settings. You use this same application
to configure the Directory role on the main server.
sharing guest
A sharing guest is a Security Center system that has been
given the rights to view and modify entities owned by another Security Center system,
called the sharing host. Sharing is done by placing the entities in a global
partition.
sharing host
A sharing host is a Security Center system that gives the right to other
Security Center systems to view and modify
its entities by putting them up for sharing in a global partition.
Synergis™ Appliance Portal
The Synergis™ Appliance Portal
is the web-based administration tool used to configure and administer the Synergis™ appliance and upgrade its
firmware.
standard schedule
A standard schedule is a schedule entity that can be
used in all situations. Its only limitation is that it does not support daytime or
nighttime coverage.
strict antipassback
A strict antipassback is an antipassback option. When
enabled, a passback event is generated when a cardholder attempts to leave an area that
they were never granted access to. When disabled, Security Center only generates
passback events for cardholders entering an area that they never exited.
supervised mode
Supervised mode is an online operation mode of the
interface module where the interface module makes decisions based on the access control
settings previously downloaded from the Synergis™ unit. The interface module reports its
activities in real time to the unit, and allows the unit to override a decision if it
contradicts the current settings in the unit. Not all interface modules can operate in
supervised mode.
synchronous video
A synchronous video is a simultaneous live video or playback
video from more than one camera that are synchronized in time.
Synergis™
Security Center
Synergis™ is the IP access control system (ACS) that
heightens your organization’s physical security and increases your readiness to respond to
threats. Synergis™ supports an ever-growing portfolio
of third-party door control hardware and electronic locks. Using Synergis™, you can leverage your existing investment in
network and security equipment.
Synergis™ Master Controller
Synergis™ Master Controller
(SMC) is an access control appliance of Genetec Inc. that supports various third-party
interface modules over IP and RS-485. SMC is seamlessly integrated with Security Center and can make access control decisions
independently of the Access Manager.
Synergis™ Master Controller (SMC)
Acronym:
SMC
System
The System task is an administration
task that you can use to configure roles, macros, schedules, and other system entities
and settings.
system event
A system event is a predefined event that indicates the occurrence
of an activity or incident. System events are defined by the system and cannot be
renamed or deleted.
System status
The System status task is a
maintenance task that you can use to monitor the status of all entities of a given type
in real time and to interact with them.
tailgating
Tailgating designates one of the following: tailgating
(access control) or tailgating (analytics).
task
A task is the central concept on which the entire Security Center user interface is built. Each task
corresponds to one aspect of your work as a security professional. For example, use a
monitoring task to monitor system events in real-time, use an investigation task to discover
suspicious activity patterns, or use an administration task to configure your system. All
tasks can be customized and multiple tasks can be carried out simultaneously.
taskbar
A taskbar is a user interface element of the Security Center client application window, composed
of the Home tab and the active task list. The taskbar can be
configured to be displayed on any edge of the application window.
task cycling
A task cycling is a Security Desk feature that automatically
cycles through all tasks in the active task list following a fixed dwell
time.
task workspace
A task workspace is an area in the Security Center client application window reserved
for the current task. The workspace is typically divided into the following panes:
canvas, report pane, controls, and area view.
temporary access rule
A temporary access rule is an access rule that has
an activation and an expiration time. Temporary access rules are suited for situations
where permanent cardholders need to have temporary or seasonal access to restricted
areas. These access rules are automatically deleted seven days after they expire to
avoid cluttering the system.
threat level
Threat level is an emergency handling procedure that a Security Desk operator can enact on one area or the entire system to deal promptly with a
potentially dangerous situation, such as a fire or a shooting.
tile
A tile is an individual window within the canvas, used to display a
single entity. The entity displayed is typically the video from a camera, a map, or
anything of a graphical nature. The look and feel of the tile depends on the displayed
entity.
tile ID
The tile ID is the number displayed at the upper left corner of the
tile. This number uniquely identifies each tile within the canvas.
tile mode
Tile mode is the main Security Desk canvas operating mode that
presents information in separate tiles.
tile pattern
The tile pattern is the arrangement of tiles within the
canvas.
tile plugin
A tile plugin is a software component that runs inside a
Security Desk tile. By default, it is
represented by a green puzzle piece in the area view.
Time and attendance
The Time and attendance task is
an investigation task that reports on who has been inside a selected area and the total
duration of their stay within a given time range.
timed antipassback
Timed antipassback is an antipassback option. When
Security Center considers a cardholder to be already in an area, a passback event is
generated when the cardholder attempts to access the same area again during the time
delay defined by Presence timeout. When the time delay has expired, the
cardholder can once again pass into the area without generating a passback
event.
timeline
A timeline is a graphic illustration of a video sequence,
showing where in time, motion and bookmarks are found. Thumbnails can also be added to
the timeline to help the user select the segment of interest.
twilight schedule
A twilight schedule is a schedule entity that supports
both daytime and nighttime coverages. A twilight schedule cannot be used in all
situations. Its primary function is to control video related behaviors.
unit
A unit is a hardware device that communicates over an IP network that can
be directly controlled by a Security Center role. We distinguish four types of
units in Security Center:
- Access control units, managed by the Access Manager role
- Video units, managed by the Archiver role
- ALPR units, managed by the ALPR Manager role
- Intrusion detection units, managed by the Intrusion Manager role
Unit discovery tool
Starting with Security Center 5.4 GA the Unit discovery tool has
been replaced by the Unit enrollment tool.
Unit replacement
Unit replacement is a tool that you can use to replace a
failed hardware device with a compatible one, while ensuring that the data associated to the
old unit gets transferred to the new one. For an access control unit, the configuration of the
old unit is copied to the new unit. For a video unit, the video archive associated to the old
unit is now associated to the new unit, but the unit configuration is not
copied.
unlock schedule
An unlock schedule defines the periods of time when free access
is granted through an access point (door side or elevator floor).
unreconciled read
An unreconciled read is an MLPI license plate read that
has not been committed to an inventory.
user
A user is an entity that identifies a person who uses Security Center applications and defines the rights
and privileges that person has on the system. Users can be created manually or imported
from an Active Directory.
user group
A user group is an entity that defines a group of users who
share common properties and privileges. By becoming member of a group, a user automatically
inherits all the properties of the group. A user can be a member of multiple user groups. User
groups can also be nested.
user level (Security Center)
A user level is a numeric value assigned to users to restrict their ability to perform certain operations, such as controlling a camera PTZ, viewing the video feed from a camera, or staying logged on when a threat level is set. Level 1 is the highest user level, with the most privileges.
validation key
A validation key is a serial number uniquely identifying a
computer that must be provided to obtain the license key.
video analytics
Video analytics is the software technology that is used
to analyze video for specific information about its content. Examples of video analytics
include counting the number of people crossing a line, detection of unattended objects,
or the direction of people walking or running.
video archive
A video archive is a collection of video, audio, and
metadata streams managed by an Archiver or Auxilliary Archiver role. These collections
are catalogued in the archive database that includes camera events linked to the
recordings.
video decoder
A video decoder is a device that converts a digital video stream
into analog signals (NTSC or PAL) for display on an analog monitor. The video decoder is
one of the many devices found on a video decoding unit.
video encoder (Security Center)
A video encoder is a device that converts an analog video
source to a digital format by using a standard compression algorithm, such as H.264, MPEG-4,
MPEG-2, or M-JPEG. The video encoder is one of the many devices found on a video encoding
unit.
video file
A video file is a file created by an archiving role (Archiver
or Auxiliary Archiver) to store archived video. The file extension is G64 or G64x. You
need Security Desk or the Genetec™ Video Player to view video files.
Video file explorer
The Video file explorer is an
investigation task that you can use to browse through your file system for video files
(G64 and G64x), and to play, convert to ASF, and verify the authenticity of these
files.
video sequence
A video sequence is any recorded video stream of a certain
duration.
video stream
A video stream is an entity representing a specific video
quality configuration (data format, image resolution, bit rate, frame rate, and so on)
on a camera.
video unit
A video unit is a video encoding or decoding device that is
capable of communicating over an IP network and that can incorporate one or more video
encoders.
The high-end encoding models also include their own recording and video analytics
capabilities. Cameras (IP or analog), video encoders, and video decoders are all
examples of video units. In Security Center, a video unit refers to an entity
that represents a video encoding or decoding device.
virtual zone
A virtual zone is a zone entity where the I/O linking is done by
software. The input and output devices can belong to different units of different types.
A virtual zone is controlled by the Zone Manager and only works when all the units are
online. It can be armed and disarmed from Security Desk.
Visit details
The Visit details task is an
investigation task that reports on the stay (check-in and check-out time) of current and
past visitors.
Visitor activities
The Visitor activities task is an
investigation task that reports on visitor activities (access denied, first person in,
last person out, antipassback violation, and so on).
Visitor management
The Visitor management task is
the operation task that you can use to check in, check out, and modify visitors, as well
as manage their credentials, including temporary replacement cards.
visual reporting
Visual reporting is dynamic charts or graphs in Security Desk
that deliver insights that you act on. You can perform searches and investigate
situations using these visual and user-friendly reports. The visual report data can be
analyzed to help identify activity patterns and enhance your
understanding.
visual tracking
Visual tracking is a Security Center feature that lets you follow an individual in
live or playback mode through areas of your facility that are monitored by
cameras.
VSIP port
The VSIP port is the name given to the discovery port of Verint
units. A given Archiver can be configured to listen to multiple VSIP
ports.
Watchdog
Genetec™ Watchdog
is a Security Center service installed alongside the
Genetec™ Server service on every server
computer. Genetec™ Watchdog monitors the Genetec™ Server service, and restarts it if abnormal
conditions are detected.
Web-based SDK
The Web-based SDK role exposes the Security Center SDK methods and
objects as web services to support cross-platform development.
Web Client
Security Center
Web Client is the web application that
gives users remote access to Security Center so
that they can monitor videos, investigate events related to various system entities,
search for and investigate alarms, and manage cardholders, visitors, and credentials.
Users can log on to Web Client from any computer that has a supported web browser
installed.
Web Map Service
Web Map Service (WMS) is a standard protocol for serving
georeferenced map images over the Internet that are generated by a map server using data
from a GIS database.
Web Map Service (WMS)
Acronym:
WMS
wheel imaging
Wheel imaging is a virtual tire-chalking technology that takes
images of the wheels of vehicles to prove whether they have moved between two license
plate reads.
widget
A widget is a component of the graphical user interface (GUI) with
which the user interacts.
Windows Communication Foundation
Windows Communication Foundation (WCF) is
a communication architecture used to enable applications, in one machine or for multiple
machines connected by a network, to communicate. Genetec Patroller™ uses WCF to communicate wirelessly with
Security Center.
Windows Communication Foundation (WCF)
Acronym:
WCF
zone
A zone is an entity that monitors a set of inputs and triggers
events based on their combined states. These events can be used to control output
relays.
Zone activities
The Zone activities task is an
investigation task that reports on zone related activities (zone armed, zone disarmed,
lock released, lock secured, and so on).
Zone Manager
The Zone Manager role manages virtual zones and triggers
events or output relays based on the inputs configured for each zone. It also logs the zone
events in a database for zone activity reports.
Zone occupancy
The Zone occupancy task is an
investigation task that reports on the number of vehicles parked in a selected parking
area, and the percentage of occupancy.