container
A container is an isolated user space on a container platform
running an instance of a particular container image.
container image
A container image is a static file that includes all the
executable code, libraries, and platform settings needed to run an isolated process on a
container platform, such as Docker.
container platform
A container platform is an IT infrastructure where you
can run applications in isolated user spaces, called containers. Container platforms are
usually more cost-effective than running multiple virtual machines.
container registry
The container registry is the cloud service that
stores and distributes production container images.
Genetecâ„¢ Container Image List Provider
The Genetecâ„¢ Container Image List Provider is a
service developed by Genetec Inc. to retrieve
the list of supported container images from the container registry.
Inter-System Gateway
The Inter-System (IS) Gateway is a Windows service that
provides Security Center applications, access to
independent systems running as containers on a virtualization platform.
Inter-System (IS) Gateway
IS Gateway
plugin
A plugin (in lowercase) is a software component that adds a
specific feature to an existing program. Depending on the context, plugin can refer
either to the software component itself or to the software package used to install the
software component.
plugin role
A plugin role adds optional features to Security Center. A plugin role is created by using
the Plugin role template. By default, it is represented by an orange puzzle piece
in the Roles view of the System task.
Before you can create a plugin role, the software
package specific to that role must be installed on your system.
Restricted Security Area Surveillance
The Restricted Security Area (RSA) Surveillance plugin
integrates third-party tracking systems into the Security Center ecosystem.
Restricted Security Area (RSA) Surveillance
RSA Surveillance
tracking system
A tracking system is a device or a system of devices
used to monitor restricted areas to detect intrusions. There are two categories of tracking
systems. The first detects perimeter violations using sensors on the perimeter fence. The
second detects foreign objects entering and moving through a restricted area using radar,
lasers, cameras that have video analytics, and thermal sensors.