Featured
- Access control In physical security, access control (AC) is the restriction of who or what can enter a space. ...
- Case management Case management is the act of consistently documenting incidents with detailed records, often using specialized case management...
- EBR Exception-based reporting (EBR) is analyzing data with various software packages to find unusual and potentially problematic values....
- Fraudulent Transaction Detection What is fraudulent transaction detection? Fraudulent transaction detection is the process of identifying and preventing unauthorized or...
- Incident Response Automation What is incident response automation? Incident response automation is the use of artificial intelligence and predefined workflows...
- Intrusion detection In physical security, intrusion detection is using technology to identify unauthorized entrance into a facility. What is...
- Loss prevention Loss prevention is a set of processes used by businesses to preserve their profit, generally in reference...
- Loss Prevention Analytics What are loss prevention analytics? Loss prevention analytics is the use of data analysis, AI, and video...
- Parking Lot Monitoring System What is a parking lot monitoring system? A parking lot monitoring system is a security and management...
- Perimeter Intrusion Detection What is perimeter intrusion detection? Perimeter intrusion detection is a security system that monitors the boundaries of...
Browse More Popular Topics
- 4K Security Camera
- Access control
- AI camera
- AI in security
- AI security camera
- AI Video Analytics
- AI Video Security
- Analog camera
- Bandwidth Consumption
- Bandwidth Optimization
- Behavior Analytics
- Bullet camera
- Business Health Metrics
- Camera Health Monitoring
- Camera Linking
- Camera stats
- Case management
- Cash handling
- CCTV Camera
- Cloud computing
- Cloud NAS
- Cloud video storage
- CMS
- Conversion rates
- Covert Camera
- Cross-Camera Tracking
- Customer Dwell Time
- CVBS
- Data Redundancy
- Data-Driven Security
- Deep Learning Video Analytics
- Digital zoom
- Dome camera
- Drive-thru analytics
- Drive-thru timer
- DVR
- Dwell Time Analysis
- EBR
- Edge Storage
- Employee theft
- End of life
- External theft
- Facial Recognition
- False alarm
- Fisheye camera
- Foot Traffic Analysis
- Frame Rate (FPS)
- Fraudulent Transaction Detection
- H.264 Compression
- H.265 Compression
- Heat Mapping
- Hybrid Cloud Storage
- Incident Response Automation
- Infrared Camera (IR)
- Internal theft
- Intrusion detection
- IoT Security
- IP camera
- License Plate Capture (LPC)
- License plate recognition
- Loitering Detection
- Loss prevention
- Loss Prevention Analytics
- Managed service provider
- Multisensor Camera
- Network Attached Storage (NAS)
- NVR
- Object Classification
- ONVIF
- Organized retail crime
- Parking Lot Monitoring System
- People counting
- Perimeter Intrusion Detection
- Pixel
- PoE
- Point of sale
- Privacy Masking
- PTZ camera
- Queue Monitoring
- Real-Time Threat Detection
- Remote monitoring
- Resolution
- Retail Heatmap
- Return Fraud Detection
- Sales reducing activities (SRAs)
- Sales reducing transactions (SRTs)
- Security perimeter
- Shrinkage
- Speed of service
- Tamper Detection
- Technology agnostic
- Text inserter
- Text overlay
- Thermal Camera
- Thresholding
- Total cost of ownership
- Traffic counting
- Turret camera
- TVI
- Verified alarms
- Video alarm
- Video analytics
- Video content analytics
- Video Encryption
- Video retention
- Virtual tripwire
- VMaaS
- VMS
- VSaaS
- Wide Range Dynamic (WDR)
- Wide-Angle Lens
- WiFi camera
- WIFI Smart Camera
- Wired camera
- Zero Trust Security Model