A container is an isolated user space on a container platform running an instance of a particular container image.
A container image is a static file that includes all the executable code, libraries, and platform settings needed to run an isolated process on a container platform, such as Docker.
A container platform is an IT infrastructure where you can run applications in isolated user spaces, called containers. Container platforms are usually more cost-effective than running multiple virtual machines.
The container registry is the cloud service that stores and distributes production container images.
Genetec™ Container Image List Provider
The Genetec™ Container Image List Provider is a service developed by Genetec Inc. to retrieve the list of supported container images from the container registry.
The Inter-System (IS) Gateway is a Windows service that provides Security Center applications, access to independent systems running as containers on a virtualization platform.
Inter-System (IS) Gateway
A plugin (in lowercase) is a software component that adds a specific feature to an existing program. Depending on the context, plugin can refer either to the software component itself or to the software package used to install the software component.
A plugin role adds optional features to Security Center. A plugin role is created by using the Plugin role template. By default, it is represented by an orange puzzle piece in the Roles view of the System task. Before you can create a plugin role, the software package specific to that role must be installed on your system.
Restricted Security Area Surveillance
The Restricted Security Area Surveillance (RSA Surveillance) plugin integrates tracking systems into Security Center. A tracking system might use radars, lasers, heat sensors, and cameras to detect activity in restricted areas and on the perimeter of a property.
Restricted Security Area Surveillance (RSA Surveillance)
A tracking system is a device or a system of devices used to monitor restricted areas to detect intrusions. There are two categories of tracking systems. The first detects perimeter violations using sensors on the perimeter fence. The second detects foreign objects entering and moving through a restricted area using radar, lasers, cameras that have video analytics, and thermal sensors.