AC power is a form of electricity that is supplied from a plug-in transformer and is measured by the number of cycles it produces.
Access Control is a form of security that restricts access to unauthorized users at predetermined checkpoints, usually doorways, or building lobbies. Varying levels of access can be granted to personnel based on their needs and responsibilities.
One of the larger wholesale monitoring companies in the United States, Affiliated Monitoring is characterized by its strong focus on the PERS industry and PERS event, Catalyst.
An alarm can take both audible and visual forms to emit warnings to device users and alarm monitoring centers alike. Alarms typically use loud and bright signals to avoid any confusion about whether or not there is an emergency.
Batteries can be used to power wireless alarm devices or security system control panels as backup power sources or primary sources. Lithium batteries generally last longer than traditional alkaline alarm batteries.
The Alarm Communication Path is the method a security system uses to communicate with a monitoring center. The Plain Old Telephone Service (POTS) is the most common type of communication path that is used in security systems.
With advances in wireless technologies, other more secure communication paths such as cellular alarm monitoring are gaining popularity. Internet protocol (IP) monitoring and dual path (Cellular/IP) monitoring are some other communication paths that do not require a hardwired telephone line to be present at the property.
In addition to the central panel where the security system is controlled, additional peripheral devices can be attached to the panel to detect emergency events and communicate them to the panel. Some examples of devices are glass break sensors, door sensors and fire detectors.
Once an emergency has been detected by a device, an alarm event is communicated to the control panel which forwards the signal to the central station.
An indicator that measures the health of an installation company's signal traffic. Calculated weekly or monthly, an alarm factor is calculated by dividing the total number of accounts by the number of signals received by the monitoring center. Companies that have a poor alarm factor may have installation issues or poor customer education systems in place.
One option security systems can include is an audible or visual alarm system that alerts people in a designated area. They are designed to be exceptionally loud and/or bright in order to remove any doubt about the nature of the alarm (e.g. sirens, speakers, strobes, etc.).
The first event that occurs, once an emergency has been detected, is initiated by an alarm device and transmitted by a control panel to a monitoring center. Depending on the type of signal and account instructions, the operator will either call the subscriber or alert emergency services immediately.
Within the alarm device itself, another electronic device wirelessly transmits an alarm signal from an alarm device to a burglar alarm control panel. Without the transmitter, the detection has no communication path to take.
Once an alarm is received by the central station, depending on the type of alarm, it must first be verified to ensure that an actual intrusion has taken place. One way operators can investigate is by leveraging an integrated video feed, which utilizes cameras that are installed in the same area as the alarm device so the central station operators can review the feed to determine what caused the alarm.
Audio verification utilizes microphones that record audio which operators can review. Call verification requires that an operator connect with a user to verify the alarm.
Within a building space, the ambient temperature measures the environment surrounding an alarm device. In addition to home and commercial automation, temperature measurement is crucial for environmental monitoring where regulation compliance maintains the life of a product.
Local police officers are responsible for the investigation and apprehension of people who break laws. An apprehension is the arrest of a suspected criminal which results from the police department responding to an alarm.
In order to activate an alarm system, it must be "armed." In other words, so that a device can be armed, it must be activated so it is ready to detect an alarm event.
The arming sequence is the amount of time a security system takes to go from its armed status to its disarmed status.
Also known as machine intelligence, it is a form of intelligence that is demonstrated by machines. Essentially, machines using artificial intelligence are capable of perceiving its environment and taking actions that help it to achieve a goal.
Once a predetermined parameter has been broken, and a signal has been sent to the alarm panel, an audible alarm emits a high pitched sound to alert people in a given area that an emergency situation has occurred or is occurring.
Once an alarm has been triggered, an operator can use recorded audio from the area an alarm was triggered in order to investigate its validity. This does not always paint a clear picture since burglars do not need to make a lot of noise when entering a premises.
Programmed to activate different types of distress signals (Burglar, Fire, Hold Up/Panic, Medical). Always work, regardless of whether or not the main security system is armed.
When someone other than a primary user needs to disarm a system when visiting, a lower-authority user code can arm the security system anytime, but can only disarm the system if the babysitter code was used to arm it. . Once the system has been armed with a normal user code the babysitter code will no longer function to disarm it.
In the event that a device loses connection to electricity, a back-up alarm battery ensures that a security system will continue to work after losing AC power. Back-up alarm batteries typically power a system for a 24-hour period.
In an internet connection, bandwidth is the capacity of the transmission medium stated in bits per second and as a frequency. It can also be the amount of data that can be transmitted in a fixed amount of time. For digital devices, the bandwidth is usually expressed in bits per second (bps) or bytes per second. For analog devices, the bandwidth is expressed in cycles per second, or Hertz (Hz).
Used on some locks; provides greater security than a numbered code on a standard lock. Only the individual with the exact fingerprint, DNA, or different type of identifying input can open the lock.
An alternative to using passcode access methods, biometrics is the mehtod of identifying an individual based on physiological or behavioral inputs such as matching eye patterns, fingerprints or voice tone.
Originally designed to protect virtual currency transactions, blockchain introduces unparallelled security features that can be leveraged in IoT devices. It uses multiple networks to create an coded message that requires network consensus before it can be changed.
Someone who gains unauthorized access to a residential or commercial area to steal items of value.
An unauthorized entry of a secure location which results in the damage and/or theft of property.
Securing the property and assets of a business or organization using burglar alarm systems, access control systems, and/or video surveillance. Businesses, due to the large number of people using the security systems, often need multiple user codes and sometimes utilize scheduled arming and disarming.
To bypass a zone is to remove it from service by directing the security system to ignore a specified area. A bypass can be automatically removed when the security system is disarmed.
The california Alarm Associaiton is a body of individuals who contribute to the maintenance and improvement of the security alarm industry. IN addition to the scholarships, training and group improvement initiatives, the CAA works with legislative organizations to take appropriate legal action for the benefit and wellbeing of security alarm companies.
After an alarm signal is received in the central station, the operator makes several call verifications to investigate whether or not a received signal is due to a false alarm. The first call made is usually to the site where the alarm occurred. If the call is answered, the operator asks for a password from a pre-assigned person. If there the call goes unanswered, depending on local dispatch regulations, a call will be made to have police investigate the situation. If the local regulations require it, the operator will try several other phone numbers to try and reach someone. In some jurisdictions, operators are required to call at least two different phone numbers before requesting dispatch. This is called Enhanced verification, and it has been found to significantly reduce false alarms.
In order to have calls from the wholesale monitoring center appear to come from the customer-facing company, the wholesale monitoring center can provide Caller ID Injection. This service helps increase answer rates and improve customer experience because the name correlates with the company the customer chose to work with.
A device that detects the presence of the toxic gas carbon monoxide, a colorless and odorless compound which is lethal at high concentration. If enough carbon monoxide is detected, the device sounds an alarm, giving people in the area a chance to ventilate the area or safely leave the building. Carbon monoxide is produced from incomplete combustion of fossil fuels.
A twisted cable that is designed to withstand a high signal rate. It is commonly referred to as Cat-5 wire and has since been superseded by the “Category 5e” specification. The Cat-5 cable is most frequently used to construct computer networks, and is also used to carry additional signals such as basic voice services, token ring, and ATM data.
A type of alarm communication path that uses a digital cellular network to send alarm signals from the control panel to a monitoring center's cellular receivers. This type of alarm monitoring requires a digital cellular communicator that is hardwired into the security system and a cellular monitoring contract. Cellular monitoring does not require phone lines, and there is no chance of the purposeful or accidental cutting of your alarm communication line. Therefore, cellular monitoring is one of the most reliable ways to monitor a security system. Cellular devices can also be mobile, providing an opportunity for the central station to monitor the physical location of the devices as necessary.
A person who works in a central monitoring station whose job is to respond to incoming alarm signals and follow appropriate dispatch procedures. The best central station operators are empathetic, pay close attention to detail and have a deep passion for service.
When a disaster hits, central station redundancy ensures that device users will continue to be protected, even if a major system in the central monitoring station loses functionality.
In order to properly protect subscribers, central station technology must consist of an advanced array of primary and backup systems that eliminate downtime in the event of a natural disaster or system malfunction, otherwise known as redundancy. Central station technology serves as the backbone to any monitoring operation.
An industry event that covers more than electronic security, "CES is the world's gathering place for all those who thrive on the business of consumer technologies. It has served as the proving ground for innovators and breakthrough technologies for 50 years." CES is one of the largest events that alarm-monitoring businesses attend, reaching more than 185K attendees and 4.4K exhibiting companies.
A form of security system that is specifically designed for office spaces, warehouses, restaurants, retail spaces and others. Commercial security systems typically differ from residential systems in the way they are scaled to accommodate multiple users and a collection of sensors in specific areas for better emergency detection.
The central unit that controls the sensors and detectors it is connected to. In essence, it is the brain of the entire security system. Each sensor reports to the control panel so it can translate them and determine if they need to be forwarded to the central monitoring station.
One of the largest wholesale monitoring companies in the United States, COPS Monitoring is best known for its heavy focus in the security monitoring industry. Because of its single large client, COPS has a heavy concentration risk factor, leaving its other clients at potential risk if the client were to switch providers.
See TMA - The Monitoring Association.
A sensor that is dedicated to identifying significant changes in environmental factors such as: gas levels, temperature, brightness and sound frequencies. Detectors that belong to a monitored system always communicate to a central panel.
An electronic device that delivers a cellular connection between a security system and the central monitoring station. Cellular communicators have built-in SIM cards and leverage pre-existing wireless networks. It sends alarm signals from the security system to the central monitoring station without the need for a POTS line. Because of its lack of wires, a cellular communicator is much more secure than a traditional wires that can be cut.
A related collection of technologies that transmits data through a local telephone network. DSL can be used at the same time–and on the same telephone line with regular telephone transmissions–as it uses high frequency, while telephone lines use low frequency. Alarm communications can be transmitted over DSL but they require a special filter to prevent interference between the two.
The action of turning off the control panel of a security system. In this stage, none of the sensors will be monitoring alarm events like opening doors, breaking glass, and more.
The operating service that relays event information to emergency responders like the fire department and the police department. Dispatch is also the action that is made which requests emergency assistance.
A more contemporary form of security system that does not require extensive installation skills such as running wires, configuring complex systems or setting up professional monitoring services. DIY systems are the preferred style of security for residential users since the systems are mobile and do not require professional monitoring.
Made of a transmitter and a magnet, the contact sensor tracks the opening of windows or doors and communicates events to the central panel.
A collection of switches that allow you to configure the circuit board of an emergency detection device or alarm control panel in order to activate and change its functionality.
An electronic device that provides both internet protocol (IP) and cellular connection points for alarm monitoring purposes. This type of communicator hardware typically uses the IP path as the primary method because an IP signal can be constantly polled for connectivity. As soon as the IP signal is lost, the alarm communicator automatically switches to the cellular pathway. That method requires the use of a built-in SIM card to communicate over an existing wireless network. A cellular/IP communicator sends alarm signals from the security system to the central monitoring station without the need for a POTS line. Dual path monitoring is more reliable than monitoring over a phone line because it has redundant signal communication paths.
A silent method of alerting the monitoring center operator that the user is in need of emergency help without letting the perpetrator know. Using this method, the user enters a four digit code into the control panel that tells the operator to send emergency help immediately. From the perpetrator’s perspective, the code simply disarms the system.
The Electronic Security Association is the largest trade association for security and life safety companies in the United States. The ESA provides training, government advocacy, advice and tools to help members grow their businesses. ESA members employ more than 500,000 individuals and serve more than 34 million clients.
The electronic security expo is one of the largest trade shows for security and life safety companies. It is a national show that is designed to help professionals find learning resources, network with new potential partners, and know what is coming next.
A form of alarm verification where a central station operator places two phone calls before requesting emergency dispatch services. ECV is quickly being adopted by jurisdictions across the country since it has proven to be an effective form of false alarm reduction and helps lower the costs that cities and states waste responding to false alarms.
When a user enters an area that is monitored by a security system, a built-in delay begins counting to give the user time to enter the required passcode. Implementing entry/exit delays helps to avoid setting off alarms when it’s not necessary. Predetermined delays can last 15 to 120 seconds before the alarm signal is sent to the central station.
A zone in a home or commercial space that is used to enter or exit the premises. In homes, these zones monitor front and back doors as well as garage doors. For commercial spaces, these zones usually protect the front door and back doors.
Environmental monitoring is a form of monitoring that measures gas levels, light, temperatures or water presence. Each type of sensor measures environmental factors that signal undesired changes and even threats to human health. Some examples of environmental sensors can be found in hospital refrigerators to protect medication, mine shafts to check for deadly gases, manufacturing plants for regulation compliance and even homes to check for flooding.
As one of the largest tradeshows in the electronic security industry, ESX delivers education, entertainment and keynote speakers. One of its biggest selling points is being the show that's big, but not too big. In comparison to shows like ISC West or CES, ESX seems to meet the middle ground in size that many attendees look for.
The most common type of internet network connection point that is commonly used in internet-based alarm systems, and especially Internet of Things devices.
A device that extends the capabilities and scalability of a security system. It typically refers to zone expanders which provide additional zones for a security system beyond the manufactured default.
An audible alert system that reaches much higher decibels than indoor alarms. These are designed to alert people in the surrounding area of an emergency event.
An advanced capability that is now being implemented in security cameras to help law enforcement locate individuals. Facial Recognition technology will eventually be able to recognize people and perform several smart functions like adjusting temperature in a room, unlocking doors and even sending emergency alerts.
Factory Mutual is a world leader in third-party testing and certification services. They specialize in property-loss prevention products and services in the commercial and industrial spaces. Their inspection processes are backed by scientific research and on-site testing.
In the alarm monitoring industry, a false alarm is a report to local dispatch services that is was not caused by a real emergency event. False alarms are caused by a handful of factors and cost cities millions of dollars per year. Significant efforts to reduce false alarms should be made in order to avoid restrictive legislation that puts subscriber lives at risk and that cost companies millions in fine-related money.
After the central station operator calls the site where an alarm was triggered, if the event was a false alarm, the user can provide a word, name, or number to verify its status.
Refers to the automated method of verifying a match between an individual’s fingerprints and stored data on file. Fingerprints are one of many forms of biometrics used to identify an individual and verify their identity.
An alarm that is caused by an active fire alarm system that detects smoke, a significant rise in temperature or the effects of fire. A monitored fire alarm system notifies the occupants in a home or commercial space, notifies persons in the surrounding area, summons the fire service, and controls all the fire alarm components in a building. Fire alarm systems include alarm devices, alarm notification devices, fire alarm control panels, fire annunciators, power supplies, and wiring.
The fire alarm control panel is the central computer or “brains” of a fire alarm system. Every device on the security system reports back to the control panel with supervisory signals and alarm signals. An FACP can be connected with a central monitoring station through several unique signal communication paths, reducing the chances of the signal being lost on the way to the central monitoring station.
When a fire starts, the installed detection system is designed to alert the occupants of a building and send a signal the central station where it is monitored. Fire alarm monitoring is designed to remove the worry and human error from the people involved in the emergency scenario and deliver fire department help as quickly as possible.
A type of security system that contains a fire alarm control panel, alarm devices, alarm notification devices, fire alarm control panels, fire annunciators, power supplies, and wiring. Most fire alarm systems must be designed and installed to the codes of the local jurisdiction because they are meant for life safety purposes.
A fire alarm system device that provides remote control capability of critical system functions such as system reset, signal silence, acknowledge, and drill.
A security system device that consists of an alarm transmitter and a probe that detects the presence of water. The transmitter can have a hardwired or wireless setup and is typically mounted far above the level water would ever be expected so the transmitter’s circuitry is safe. The probe is then mounted a few inches off the ground so that flooding is detected as early as possible.
See Factory Mutual
A security system device that sends an emergency signal when the temperature of a given space drops below a critical point. Different from temperature sensors, freeze sensors are only designed to detect low temperatures. Freeze sensors are most commonly used to monitor rooms with water pipes in order to prevent the pipes from breaking.
GPRS is a packet-based wireless communication service. It is based on Global System for Mobile Communication (GSM) and complements existing services like Short Message Service (SMS) and Multimedia Messaging Service (MMS). GPRS packet based services are faster and cost less than circuit-switched services since communication channels are used on a shared-use, as-packets-are-needed basis instead of dedicated to one user at a time.
A security system device that detects the sound frequency made by breaking glass. A glassbreak detector houses a highly sensitive microphone that can detect the exact frequency of broken glass. GDBs, along with motion detectors, are devices used for interior monitoring to provide another layer of protection beyond exterior monitoring. One GBD can usually protect every window in a room and should be mounted on the wall across from the windows it is meant to protect. GBDs are preferable over motion detectors when large animals live in the alarms premise, since they work while the security system is in stay mode without causing false alarms.
A piece of legislation that was adopted by the European Parliament in April 2016 that regulates how companies protect EU citizens' personal data. The GDPR is a heavy-hitting topic since it affects even companies that aren't based out of the European Union and sets a precedent for businesses around the globe.
The global positioning system is a free service provided by the United States government. It is structured by several satellites that orbit the earth and require cloudless skies to function. GPS monitoring is frequently implemented in PERS devices, crash detection and lone worker devices so emergency help can be sent to the exact location of the incident.
An advanced personal assistant that is capable of setting appointments, understanding accents and holding adaptive conversation with people. Google Duplex is the most advanced personal assistant available to users and surpasses the capabilities of Siri.
A form of monitoring that identifies the location of a user’s device after an emergency event. GPS monitoring not only leverages the existing Global Positioning System network of orbiting satellites, but can also use cellular networks to track a user’s location. In a typical monitoring scenario, cellular locating is more accurate because of its ability to track users inside of buildings and even under cloudy skies.
A burglar alarm or fire alarm device that detects a preset high temperature or a rapid rate-of-rise (ROR) in temperature. Heat detectors can be either electrical or mechanical in operation. The most common types are thermocouple and electro-pneumatic, both of which respond to changes in ambient temperature. If the ambient temperature rises above a predetermined threshold, then an alarm signal is triggered. Heat detectors are better than smoke detectors for areas where smoke would normally be found such as a kitchen or smoking lounge, since they do not produce as many false alarms.
A form of panic button that is similar to a duress code without the complexity of a passcode. When a holdup switch is activated, it sends an alarm to the central monitoring station and requires the immediate dispatch request. These devices are usually mounted underneath a checkout counter or underneath a bank teller’s workstation so that a person in distress can discreetly activate it. When a holdup switch is activated, it does not create an audible alarm so that the intruder is not made aware.
A form of protection from burglaries, intrusions and environmental hazards that uses devices to detect movement, changes in environmental statuses, unauthorized entryway access or the breaking of glass.
A type of alarm detection device that is most often found in motion detectors. Infrared detectors are designed to distinguish changes in electromagnetic radiation as opposed to normal light changes. LEDs used on security cameras often use infrared technology to emit more light.
A four digit code that is used to access the programming functions on a security system’s control panel. Once a user access the programming menu, the system can be taken over by competing security companies and even high-tech intruders to disarm the system. It is good practice, therefore to keep the installer code a secret.
The ISDN is an international communications standard for sending voice, video, and data over digital telephone lines or traditional telephone copper wire.
The internet of things is a term that describes a network of devices that are connected to the internet. As it becomes more popular, the IoT reduces the number of devices that are connected by wires and increases opportunities for companies to implement innovative ways to improve business processes, monitor more effectively and reduce the chances of manual system takeovers. However, as new technology advances, IoT devices present new challenges as people with nefarious intent can access vulnerabilities in devices to access a network.
A data-oriented protocol used for communicating across a packet switched inter-network.
A unique 12 digit code that identifies a computer or device on an IP network. XXX.XXX.XXX.XXX is the format IP addresses take with each group of Xs representing a number between 0 and 255. IP networks use the IP address to forward messages between different devices on the network.
An alarm communication path that uses an Ethernet connection to send an alarm signal over the internet from the control panel to a central monitoring station’s IP receivers. This type of alarm monitoring requires an IP communicator hardwired into the security system and an internet monitoring contract. The benefits of internet monitoring are that no phone line is required which reduces the possibility a communication line being cut on purpose or accident. In addition, internet communication is not expensive, and it is fully supervised so the connection is constantly polled by the central station received.
A type of smoke detection that used in most smoke detectors since it is inexpensive and even better at detecting smaller amounts of smoke produced by fires. Smoke detectors using ionization detection use an ionization chamber and a source of ionizing radiation to detect smoke.
As more devices become internet-based as opposed to being connected to traditional landlines, 400;">IoT Monitoring produces additional capabilities that help event monitoring devices do more.
A counterpart to traditional CCTV video feeds, IP video monitoring presents new opportunities for security systems to integrate with central monitoring stations and deliver additional levels of verification during alarm events.
Now separated into two different shows, ISC West and ISC East are some of the largest trade shows for electronic security companies, reaching more than 30K security professionals at ISC West alone. ISC West takes place in Las Vegas every year, while ISC East takes place in New York City.
A remote that can be attached to a key ring and is used to arm and disarm a security system with the touch of a button. Key Fob buttons can usually be programmed for many different functions such as: arming panic alarms, granting access to restricted areas, turning on lights and other tasks.
The person who is responsible for operating a given security system and has the highest-level access to a property or commercial space. It is important that the keyholder has the proper authority and access because in the event that an alarm goes off, they will receive a call from the central station operator and will need to meet with emergency response representatives when they arrive.
The control center for the central panel in a security or fire system. Typically found at every entry area to an alarmed location, keypads often allow one touch arming and disarming as well among other functionalities. Some keypads are more advanced and are capable of following voice-based commands or have touch screens.
A device that is designed to protect someone’s life or property. These devices take many forms. Some of those are: PERS devices (medical alert system), fire alarms, panic buttons and deadly gas detection systems.
A collection of computers and other internet-capable devices that share a communication line within a building or collection of buildings.
An intrusion detection system that is not monitored by a central monitoring station. The local security system style is becoming more popular with the advent of DIY security systems because of the lower cost and ease of installation. Systems that automatically request police dispatch, however, cause serious false alarm problems and make impending legislation more harsh for legitimate monitoring operations.
A battery-powered smoke detector that is not monitored by a central monitoring station. These devices are typically installed in buildings where local codes require a certain number of local smoke detectors that can warn occupants of a potential emergency.
The most powerful four digit user code a security system has. It comes with additional privileges that allow the user to delete other user codes among other things.
A life safety system consisting of an electronic device worn on a bracelet or necklace and a control panel that can auto dial telephone numbers or dial a central monitoring station when the device is activated by the user. Depending on the severity of the situation, alarm monitoring staff will summon friends, family, or emergency personnel.
The Medical Alert Monitoring Association is the only trade association that addresses the needs of the Personal Emergency Response Services industry. AvantGuard’s long-time investment in this industry made it an obvious choice to join MAMA and promote its presence among PERS dealers throughout North America.
A personal emergency response device that allows the user to maintain their monitored status to travel outside of the home and away from the POTS connection. Mobile PERS devices are quickly becoming the standard for monitored PERS devices because of their mobil nature and geolocation capabilities.
A security system that is continually under watch by a professional central monitoring station. Most security systems are designed to first warn the intruders that the intrusion is being tracked, then the monitoring portion follows up with the hope of catching the intruder and investigating the scene.
Monitored smoke detectors go a step further than normal smoke detectors by adding an extra level of protection to the structure and its occupants. While a local smoke detector will only sound a local siren, a monitored smoke detector sounds a local siren and also sends an alarm signal to a central monitoring station so that the local fire department can be sent to investigate the scene.
A security camera that is set to record based on the detection of motion. These cameras can either distinguish pixilation changes to begin the recording, or they can use built-in motion detectors to activate the recording.
A security device that uses passive infrared or microwave detection to detect motion in a monitored premise. Some motion detectors are capable of utilizing dual technology detection and even have pet immunity to prevent false alarms.
A telecommunications standard for transmitting messages that contain multimedia objects such as images, video, audio, or rich text. It is an extension of the SMS standard that allows for longer message lengths and is used most often in sending picture text messages.
What has since been renamed the Electronic Security Association (ESA), the NBFAA is the largest professional non-profit 501(c) 6 trade association in the United States. It exists to represent, promote and enhance the growth and professional development of the electronic life safety, security, and integrated systems industry.
The National Fire Protection Association is the leading source of information and knowledge in the fire and electrical hazard protection industries. It’s core regulating document is commonly known as NFPA 72. All installation companies that work with fire detection systems have to comply with NFPA 72 in order to legally operate.
The core regulating document that addresses smoke alarms and how they should operate. NFPA 72 includes details about requirements for mass notification systems in weather emergencies, terrorist events, biological, chemical, and nuclear emergencies among other threats.
A security system that is programmed for openings and closings will send a signal to a central monitoring station every time the system is armed or disarmed. The central monitoring station can then print out a report of these openings and closings so that the user can monitor the use of his or her security system.
See “standard operating procedures”
A type of smoke detection that is better at detecting smoky or smoldering fires as it detects changes in light. When a room fills with smoke there is less light available to the optical sensor in the smoke detector and an alarm is triggered. This type of smoke detector is not as good at detecting flaming fires because there won’t be enough of a light change to set off the device.
A feature in many security systems that allows the user to request an immediate dispatch. With the panic alarm feature, no call verification is needed since the user has to enter a passcode before the alarm is sent to the central station.
A segmented section of a security system. Users can setup partitions so that one area of the system can be armed while the other areas stay unarmed. For instance, an inventory room can be partitioned from the rest of the store so that while people are working, the main areas are unarmed and the inventory room stays protected.
An alarm device that measures infrared (IR) light radiating from objects in its field of view to sense motion and activate an alarm. Once the PIR motion detector is installed, it settles into a normal state with a normal temperature. Apparent motion is detected when an infrared source with another temperature, such as a human, passes in front of the PIR detector and changes the normal temperature causing an alarm.
An area that is usually assigned to all Exterior sensors and contacts connected to doors and windows. The idea behind protecting the perimeter of a home or business is that intrusions can be detected as soon as possible. With interior protection, users don’t receive an alarm until the intruder walks in front of an interior protection sensor.
A form of personal protection that tracks a person’s personal health status and can be triggered by the user or by the device when it senses a fall. PERS monitoring is a preferred method of personal protection for many seniors who want to maintain their independence and not have to pay to live in an assisted living facility.
A device that allows a user to send an alert to a monitoring center when they are in distress. These events often occur after a fall, emergency health event and even personal attack events. PERS devices have even been adapted to help protect lone workers.
A feature in motion detectors that enables the system to disregard the movement of animals of a specific size in order to reduce false alarms. Pet immunity can usually be obtained by reducing the sensitivity of a motion detector so that a fairly large object would need to be present in order to trigger an alarm.
An alarm communication path that uses a POTS line to send alarm signals from the control panel to the central monitoring station. In order to implement this communication style, the user must have access to a standard phone. Users should be aware, however, that phone line monitoring is susceptible to tampering by intruders because all phone lines are exposed on the outside of homes.
A communication system employed by the United States Federal Emergency Management Agency to alert US citizens of impending terror threats and natural disasters. The first presidential alert took place on Wednesday, October 3 and unknowingly triggered thousands of glass-break sensors because of the similar frequencies each use.
The act of regularly inspecting a security system and its alarm devices to verify that all devices are working properly. Preventative maintenance ensures a security system will work when it is needed.
A quicker dispatch request that can be used by security system users that that utilize additional forms of verification. In these instances, no call verification is needed and therefore the police respond to the alarm immediately. One form of additional verification can be found in integrated video monitoring which delivers a video feed directly to the central monitoring station.
A badge, tag, or card that allows a user to access a restricted area when placed close to a card reader.
An access control device that controls an electronic lock. When a proximity card is placed near a proximity reader access is granted.
A type of heat detector that triggers an alarm when a predetermined amount of change in temperature is registered in a given window of time. (e.g. 20°change in a five-minute period)
A door or window contact that is inlayed into the frame of a door or window to match the surface level. This typically consists of a magnet that is drilled into the side edge of the door or window and an alarm transmitter that is aligned with the magnet and inserted into the door or window frame. This form of door contact provides a clean aesthetic since it cannot be seen when the door or window is closed.
Redundancy: See “Central Station Redundancy"
A control keypad that is not fixed to a wall or control panel. Remote keypads can arm and disarm a security system from a distance. While this form of control is convenient, it provides additional opportunities for unauthorized access and tamporing.
A device that receives an alarm signal and retransmits it at a higher level so it can travel farther distances without losing connectivity. It extends the communication ranges between control panels and the sensors.
A device that provides IP address routing, network address translation, DHCP functions, firewall functions, and LAN connectivity similar to a network switch. If the router is wireless, it can also provide connectivity for all wireless alarm devices on the LAN.
A service provided by a fire alarm monitoring company in which a trained fire alarm system agent is sent out to every fire alarm. Typically the runner service has to be performed within one hour of the initial fire alarm. A technician is sent out to a fire alarm to reset the panel in the event of an alarm or diagnose the electrical problem in the event of a false alarm.
Also known as Security Info Watch (SIW), will be renamed Security Business Magazine. It's mission is to serve as "the path to greater profits for its audience of security business owners and managers who help maintain integration firms."
SDM is one of the largest security-related publications in the alarm monitoring industry that specializes in industry exclusives like the SDM 100 report, industry forecasts and central station excellence awards. In addition to its publication efforts, SDM produces enewsletters, virtual trade shows, and live events.
A device that is used to record activity for an assigned area. These can record onto closed circuit systems or directly onto a cloud server where the recorded footage can be forwarded to a central monitoring station in the event of an alarm.
A professional organization that specializes in installing, servicing, and/or monitoring security systems for residential and/or commercial spaces.
A system comprised of a control panel, sensors and trigger points that monitor for unauthorized behavior. Most security systems use devices like security cameras, smoke detectors, door and window contact sensors, and motion detectors to prevent property damage and theft as well as protect human life and aid local police departments in apprehending offenders.
A form of telecommunications that transmits and receives text messages through the GSM data channel. Secure SMS messages can now be used to connect users on an account to manage alarm events and request or disregard emergency dispatch services.
An electronic security organization, SIA provides educational materails, certifications, industry standards and advocacy for security installers and channel partners. SIA is a principal sponsor of the ISC events and seeks to give its members access to "top-level buyers and influencers."
An alarm that is designed to not make any noise in the event of an intrusion in order to protect occupants of a building and even to give local law enforcement time to arrive and apprehend intruders.
A feature in many security system devices that emits a loud, high-pitched sound that scares away trespassers and alerts nearby witnesses that an alarm event has occurred. These are frequently employed in security and smoke detection systems.
A device that is designed to detect gas that is created by fires and other hazardous sources. Many smoke detectors are capable of tracking carbon monoxide gas, which is a silent killer and in its natural form is unnoticeable to the human nose.
One of the largest industry publications in the alarm monitoring industry that specializes in reporting on news in the security, automation, and fire safety industries. Security Sales and Integration is known for producing content beyond traditional news. Its articles consist of, but are not limited to editorials, technology updates, systems design installation techniques, sales & marketing case studies, statistical research, and operation management.
One of the largest industry publications that specializes in reporting on electronic security-related stories and especially on mergers and acquisitions. Security Systems News has even organized their own industry event called Cloud+ which specializes in cloud-based security, a growing topic in the electronic security industry. Security systems news is owned by United Publications,inc., an umbrella company for brands like industry publication, HME News; and technology conference, TecSec.
Stages is the most advanced monitoring automation software available to central stations in the alarm monitoring industry. It allows central stations to perform a high rate of functions with minimal effort on the operator end.
In order to handle the massive influx of signals that occur because of a hurricane or natural disaster, Storm Queue, a feature in the Stages automation software, partitions low priority signals from high-priority signals.
It stores the service-subscriber key that is used to identify a subscriber for mobile communication devices. The SIM card grants the user access to the wireless network of whichever service provider is used based on the chosen service plan.
An alarm signal that monitors an alarm device or alarm control panel. Wireless security system control panels constantly send out requests to all the programmed devices on the system. When an alarm device does not respond, the control panel sends a supervisory signal to the central monitoring station detailing the device that needs service.
An industry term that describes the process of reprogramming a monitored security system so that it communicates to a different central alarm monitoring station.
A form of security system keypad that that functions as a typical control panel keypad that can also audibly communicate the system status and additional notices to the user in English.
An environmental security system device that sends an alarm when an undesirable and potentially hazardous temperature is reached, or a rapid change in temperature occurs. Temperature sensors are different from freeze sensors because they are able to detect abnormally high and low temperatures.
A camera that is designed to produce an image that shows temperature ranges instead of normal light reflections. Companies like Flir produce thermal imaging cameras for a variety of applications that require the use of temperature visualization.
Previously known as the Central Station Alarm Association (CSAA), the TMA is an organization designed to "advance the professional monitoring industry through educaiton , advocacy, and public safety relationships." The TMA helps the alarm monitoring industry by developing best practices, working with legislators, law enforcement, and emergency responders to develop good relationships.
A designation that is regulated and awarded by The Monitoring Association (TMA). Central stations that receive the five diamond award must adhere to the highest standards of safety and performance including redundancy, false alarm reduction and central station operator training.
A common way to refer to a central monitoring station that has demonstrated the ability to provide monitoring service that complies with UL’s strict standards. UL requirements cover building structure, receiving and monitoring equipment, staffing issues, as well as installation and ongoing service. In order to be able to provide UL complying service, the building, equipment and staffing requirements have to be met at all times. However, the handling of specific signals from specific alarm systems is only audited by UL if a certificate is in effect for that alarm system.
A United-States-based, not-for-profit, and privately owned and operated product safety testing and certification organization. Based in Northbrook, Illinois, Underwriters Laboratories develops standards and test procedures for products, materials, components, assemblies, tools and equipment–chiefly dealing with product safety.
A four digit code used to arm and disarm a security system. Certain security systems allow for multiple user codes so that you can keep track of who armed or disarmed the system.
A method of security monitoring that leverages cameras and a recording system to track activity in a given area. Video recordings can be stored on a DVR or cloud storage solution and can be retrieved in the event of an intrusion or other emergency. With integrated video solutions, video clips can be forwarded to a central station operator who can examine the footage for particular behaviors that warrant emergency dispatch.
The process of verifying that an emergency event has occurred by using video clips from a security camera that is located in the area that an alarm was triggered. Video verification can eliminate false alarms and secure priority dispatch as the authorities are certain that the alarm they are responding to is an actual incident.
A type of alarm that relies on bright flashing lights to warn occupants of a building that an emergency event is occurring. This type of alarm is usually accompanied by an audible alarm so that people with hearing or vision disabilities are all able to exit to a safe area in a timely manner.
See Flood Detector
A service that is commonly included in residential and commercial security systems that adds a second layer of support when an emergency event occurs. Designed to verify situations and deliver help as quickly as possible, wholesale alarm monitoring is charged on a monthly basis and provides an added layer of convenience and security, especially when typical account holders have to handle several tasks when an emergency arises.
A computer network style that covers a broad area (any network whose communication links cross metropolitan, regional, or national boundaries). Or, less formally, a network that uses routers and public communications links. In contrast with personal area networks (PAN’s), local area networks (LAN’s), campus area networks (CAN’s), or metropolitan area networks (MAN’s) which are usually limited to a room, building, campus or specific metropolitan area (e.g., a city) respectively. The largest and most well-known example of a WAN is the Internet.
See Cellular Alarm Monitoring
A security system that does not use any wires. Each alarm device reports back to the control panel using a RF wireless signal and is typically powered by batteries.
Each device on a wireless security system is its own zone. On hardwired security systems, users may have many similar devices on one zone. For instance, every window contact in the living room may be programmed into the same zone. Zones are used to identify which alarm device triggered the alarm event to occur, so that the central station operators can provide specific information to the responding authorities.
A phrase that identifies the type of alarm device connected to a security system as well as the location assigned to that device. A motion detector in the living room might have a zone description of “Living Room Motion.”
Devices that provide additional zones for a security system beyond the control panels default capabilities.
An alarm style that is usually assigned to a zone containing an panic/emergency button (audible emergency).
An alarm style that is usually assigned to a zone containing a button for use in personal emergencies or to a zone containing monitoring devices (i.e.: water or temperature sensors, etc).
An alarm style that is usually assigned to any wireless zone with a carbon monoxide detector. This zone type is always active and cannot be bypassed because of the nature of its role.
An alarm style that sends a report to a central monitoring station but provides no keypad display or audible alarm sounding at the location.
A zone that is permanently active, 24 hours a day (such as a fire zone).
See “TMA Five Diamond Central Station”
A network speed that will eventually succeed 4G LTE between 2019 and 2021. The 5G Sunrise has been on the horizon and is expected to help accelerate the growth of the IoT space, delivering quicker speeds and greater technological capabilities for smart devices that function through an internet connection.