Glossary for Inter-System Gateway - Inter-System Gateway 1.1

Inter-System Gateway Configuration Guide 1.1

Applies to
Inter-System Gateway 1.1
Last updated
Content type
Guides > Plugin and extension guides
Inter-System Gateway
Plugin and extension guides


A container is an isolated user space on a container platform running an instance of a particular container image.

container image

A container image is a static file that includes all the executable code, libraries, and platform settings needed to run an isolated process on a container platform, such as Docker.

container platform

A container platform is an IT infrastructure where you can run applications in isolated user spaces, called containers. Container platforms are usually more cost-effective than running multiple virtual machines.

container registry

The container registry is the cloud service that stores and distributes production container images.

Genetecâ„¢ Container Image List Provider

The Genetecâ„¢ Container Image List Provider is a service developed by Genetec Inc. to retrieve the list of supported container images from the container registry.

Inter-System Gateway

The Inter-System (IS) Gateway is a Windows service that provides Security Center applications, access to independent systems running as containers on a virtualization platform.

Inter-System (IS) Gateway

IS Gateway


A plugin (in lowercase) is a software component that adds a specific feature to an existing program. Depending on the context, plugin can refer either to the software component itself or to the software package used to install the software component.

plugin role

A plugin role adds optional features to Security Center. A plugin role is created by using the Plugin role template. By default, it is represented by an orange puzzle piece in the Roles view of the System task. Before you can create a plugin role, the software package specific to that role must be installed on your system.

Restricted Security Area Surveillance

The Restricted Security Area Surveillance (RSA Surveillance) plugin integrates tracking systems into Security Center. A tracking system might use radars, lasers, heat sensors, and cameras to detect activity in restricted areas and on the perimeter of a property.

Restricted Security Area Surveillance (RSA Surveillance)

Acronym: RSA

RSA Surveillance

tracking system

A tracking system is a device or a system of devices used to monitor restricted areas to detect intrusions. There are two categories of tracking systems. The first detects perimeter violations using sensors on the perimeter fence. The second detects foreign objects entering and moving through a restricted area using radar, lasers, cameras that have video analytics, and thermal sensors.