지능형 VMS와 PSIM 소프트웨어의 세계적 선도 개발 기업
구매 문의
문의하기

Glossary

A

Age and Gender Guesstimation 
Age and Gender Guesstimation is a feature within video analytics that employs artificial intelligence to estimate the likely age and gender of individuals captured in video footage. This capability enhances demographic analysis and contributes to a more comprehensive understanding of the observed population.
AI Video Analytics 
AI Video Analytics refers to the application of artificial intelligence techniques to analyze video data. This advanced technology enables automated video content analysis, object recognition, behavior tracking, and other intelligent functionalities, significantly enhancing the capabilities of video surveillance systems.
Alarm Board
An Alarm Board is a centralized display within video management software that presents a consolidated view of active alarms and alerts across the surveillance system. It provides a comprehensive overview, facilitating quick assessment and prioritization of security events for timely intervention.
Alarm Panel
An Alarm Panel is a graphical user interface within video management software that displays and manages real-time alerts and alarms generated by connected security devices and video analytics. It allows operators to monitor and respond promptly to security incidents, ensuring an effective and coordinated response.
ANPR 
ANPR, short for Automatic Number Plate Recognition, is a technology that uses camera analytics software to automatically read and interpret vehicle license plates.
Archive mode 
Archive mode in video surveillance refers to the storage and retrieval of recorded video footage. Video management software incorporates archive mode functionality, allowing users to efficiently store and access video data. This feature ensures that surveillance video analysis software can retrieve specific video segments for investigations, audits, or evidence purposes.
Artificial Intelligence 
Artificial Intelligence (AI) refers to the simulation of human intelligence in machines. In the context of video surveillance, AI is employed to enable systems to perform tasks that typically require human intelligence, such as object recognition, classification, comparison, and other kinds of data analysis.
Autozoom 
Autozoom is a feature available in an intelligent video management software. It utilizes camera analytics software to automatically adjust the zoom level of PTZ (Pan-Tilt-Zoom) cameras based on predefined rules or intelligent video analytics. This feature enables the system to automatically focus on specific objects or areas of interest, providing enhanced situational awareness and accurate video surveillance analytics.

C

Camera metadata 
Camera metadata refers to additional information captured by IP cameras along with video streams. This data includes camera settings, timestamps, location coordinates, camera model information, and other relevant details. Video management software can extract and utilize camera metadata for advanced video analytics, forensic investigations, and integration with other security systems.
Camera Streaming
Camera Streaming refers to the continuous transmission of live video feeds from surveillance cameras to a monitoring or recording system. This real-time streaming capability is fundamental for immediate situational awareness and allows security personnel to monitor events as they unfold.
Case Study
Case Studies involve the analysis and documentation of real-world applications and success stories of video surveillance and security solutions. These studies provide valuable insights into the effectiveness of specific technologies and implementations in addressing security challenges.
CCTV 
CCTV stands for Closed-Circuit Television. It refers to a system of video cameras that capture and transmit video signals within a limited network.
Centralized Reporting
Centralized Reporting is a feature that consolidates and presents comprehensive reports on various aspects of security system operations. This includes analytics results, system health, and user activities, providing a centralized overview for effective monitoring and decision-making.
Client Software
Client Software is the application used by end-users to access and interact with the security or video management system. It provides a user-friendly interface for live video monitoring, playback, and configuration of surveillance settings.
Cloud Cybersecurity
Cloud Cybersecurity involves the implementation of robust security measures to protect data and resources in cloud-based environments. For video surveillance, ensuring secure cloud connectivity is essential to safeguarding video data and system integrity.
Cloud-Based VMS Server
Cloud-Based VMS Servers refer to video management system servers hosted in cloud infrastructure. These servers enable the deployment of video surveillance solutions without the need for extensive on-premises hardware, offering scalability and accessibility from anywhere with an internet connection.
Cloud-Based VMS 
Cloud-Based VMS (Video Management System) operates in cloud environments, providing users with the flexibility to manage and access their video surveillance systems remotely. This approach facilitates easier scalability, maintenance, and cost-effective solutions.
Cross-System Client 
A Cross-System Client is a software application that allows users to access and manage multiple video surveillance systems from a single interface. This streamlines operations for organizations with distributed or multi-site security infrastructure.
Customizable video analytics 
Customizable video analytics refers to the ability to tailor and configure video analytics algorithms and rules according to specific security requirements and application scenarios. Video surveillance analytics software provides customizable video analytics tools that allow users to define specific detection criteria, create rule-based events, and adapt the system to unique operational needs.
Cybersecurity
Cybersecurity refers to the practice of protecting computer systems, networks, and data from cyber threats such as unauthorized access, data breaches, and cyberattacks. In the context of video surveillance, robust cybersecurity measures are crucial to ensure the integrity, confidentiality, and availability of surveillance data and systems.

D

Data Center
Data Centers are facilities that house and manage large-scale data storage and processing infrastructure. In the context of video surveillance, data centers play a crucial role in storing and managing vast amounts of video data securely.
Datacenter Domain Unification
Datacenter Domain Unification involves integrating and unifying video surveillance systems across multiple locations. This ensures a cohesive and centralized management approach, enhancing operational efficiency.
Digital Zoom
Digital Zoom is a feature in video surveillance systems that allows users to electronically magnify a portion of the video image. Unlike optical zoom, which uses physical lenses, digital zoom enhances selected areas of the image digitally.
Drivers Pack 
Drivers Pack comprises software components that enable communication and compatibility between video management software and various hardware devices, such as cameras, encoders, and video recorders.
Dynamic Privacy Masking
Dynamic Privacy Masking is a privacy-enhancing feature in video surveillance that allows for the real-time adjustment of privacy zones within a camera's field of view. This feature enables dynamic obscuring of sensitive areas, ensuring compliance with privacy regulations while maintaining effective surveillance.

E

Edge analytics  
Edge analytics is a method of processing and analyzing video data directly at the edge devices, such as IP cameras or encoders, without the need for centralized processing. Video analytics solutions support edge analytics, enabling real-time detection and analysis of events at the camera level, reducing network bandwidth and improving response times.
Event Notification
Event Notification is a real-time alerting feature in video surveillance and security systems that informs users of specific events or incidents. This proactive notification ensures timely response and intervention.
External Analysis and Accounting Applications 
External Analysis and Accounting Applications refer to third-party software integrated with video management systems for in-depth analysis and accounting purposes. This integration enhances the capabilities of the surveillance system by leveraging specialized external tools.
External Event Support
External Event Support involves integrating video surveillance systems with external event sources such as Point of Sale (POS) and Access Control Systems. This integration allows for synchronized event monitoring and enhanced situational awareness and search capabilities.

F

Face Mask Detection 
Face Mask Detection is a video analytics feature designed to identify and alert when individuals within the video frame are not wearing medical masks. This capability is valuable for enforcing health and safety protocols.
Failover 
Failover is a feature in video management software that provides automatic backup and redundancy in case of system failures or network disruptions. It ensures continuous video recording, monitoring, and event management by seamlessly switching to backup servers or redundant network connections, minimizing downtime and maintaining system reliability.
Fire Alarm Module 
The Fire Alarm Module is a component within video management software that integrates with fire alarm systems. It enables real-time monitoring and response to fire-related events, ensuring a swift and coordinated reaction.
Fire/Smoke Detection 
Fire/Smoke Detection is a video analytics feature that identifies the presence of fire or smoke within the video footage. This capability enhances early detection and response to potential fire incidents.
Fisheye Camera
A Fisheye Camera is a type of surveillance camera that uses a fisheye lens to capture a wide-angle panoramic view. This enables comprehensive coverage of large areas with a single camera.
FrameMerge
FrameMerge is a technology that combines a panoramic view from multiple camera feeds, making it easier to monitor large and extended areas.

G

GDPR 
GDPR stands for General Data Protection Regulation, a comprehensive data protection regulation in the European Union. AxxonSoft's video surveillance and security solutions adhere to GDPR guidelines, ensuring the protection of personal data collected through video analytics, access control systems, and other security-related processes.
GPU Acceleration
GPU Acceleration involves leveraging Graphics Processing Units (GPUs) to accelerate video processing tasks. This technology enhances the performance of video analytics and other computationally intensive operations.

H

Heat Mapping
Heat Map is a visual representation of the distribution of objects or activities within a video frame. This feature is often used in retail analytics and crowd monitoring to identify high-traffic areas.
Homeland Security
Homeland Security involves the implementation of security measures and technologies to protect a country's citizens, infrastructure, and resources from internal and external threats. Video surveillance plays a crucial role in supporting homeland security efforts.
Hosted VSaaS
Hosted Video Surveillance as a Service (VSaaS) usually refers to a cloud-based video surveillance solution where all video footage is stored in the cloud.
Human Behavior Analytics
Human Behavior Analytics involves the application of video analytics to monitor and analyze human behavior within video footage. This may include pose recognition, detection of anomalies and patterns, which helps identify potential threats early on.

I

Image Dewarping
Image Dewarping is a feature that corrects the distortion caused by fisheye lenses in surveillance cameras. This ensures that the captured images are presented in a more natural and visually accurate format.
Intelligent Video Analytics
Intelligent Video Analytics involves the application of advanced algorithms and artificial intelligence to analyze video data. This includes features such as object identification, license plate recognition, and behavior analysis, enabling more sophisticated and automated surveillance.
IP Devices
IP Devices refer to surveillance cameras, encoders, and other equipment that utilize Internet Protocol (IP) for communication. These devices can transmit data over networks, offering flexibility and scalability in video surveillance deployments.

L

LDAP Authentication
LDAP Authentication involves using Lightweight Directory Access Protocol (LDAP) for user authentication in video management software. This ensures secure and centralized user management, making it possible to deduplicate user administration tasks at large companies.
LDAP service 
LDAP service refers to the functionality within video management software that enables the integration and communication with LDAP directories or servers. This service allows for seamless synchronization of user information, roles, and access rights between the video management software and LDAP directories, ensuring consistent and efficient user management.
Live Video Mode 
Live Video Mode refers to the real-time viewing and monitoring of live video streams within video management software. Users can access live video feeds from connected cameras and monitor their surveillance environment in real-time, enabling immediate response to security incidents and ensuring proactive security measures.
Loss Prevention 
Loss prevention refers to strategies and measures implemented to prevent theft, fraud, and shrinkage in retail and commercial environments. Video surveillance and security solutions provide advanced loss prevention features such as video analytics, POS integration, and exception reporting, enabling retailers to detect and deter theft, minimize losses, and enhance profitability.
LPR License Plate Recognition
LPR (License Plate Recognition) is a technology that uses video analytics to automatically read and interpret license plate information from vehicles. This capability enhances security and facilitates applications such as parking management and traffic monitoring.

M

Macros
Macros are predefined sequences of actions or commands within video management software. They allow users to automate repetitive tasks or execute a series of operations with a single command.
Metadata from IP Devices
Metadata from IP Devices includes additional information captured by IP video devices and often refers to video analytics data, such as detector triggers and scene descriptions. This metadata enhances the contextual understanding of video footage.
Mobile client 
Video management software offers a mobile client application that allows users to access the surveillance system from their mobile devices. With the mobile client, users can view live and recorded video, receive push notifications for critical events, and manage the system remotely. This enables security personnel to stay connected and monitor their security environment while on the move.
Multi-Camera Tracking
Multi-Camera Tracking involves the coordinated tracking of objects or individuals across multiple surveillance cameras. This feature provides comprehensive coverage and ensures a seamless view of events as they unfold.
Multi-Site Connectivity
Multi-Site Connectivity involves linking multiple surveillance sites or locations within a unified video management system. This capability allows for centralized monitoring, management, and control of security operations across diverse geographical locations, providing a comprehensive and cohesive security strategy.

N

Network bandwidth 
Network bandwidth refers to the capacity or speed at which data can be transmitted over a network. Video management software can optimize network bandwidth usage by employing advanced video compression algorithms, efficient video streaming protocols, and intelligent network management techniques. This ensures smooth video transmission and minimizes the impact on network performance.
Network Failure Tolerance
Network Failure Tolerance is a system resilience feature that ensures video surveillance operations continue in the event of network failures. This involves mechanisms such as local storage and failover systems to maintain continuity.
Neural Network
A Neural Network is a computational model inspired by the structure and function of the human brain. Neural networks are the basis for AI video analytics and are used for tasks such as object recognition.

O

Object Detection
Object Detection is a video analytics capability that identifies and classifies objects within a video frame. This includes people, vehicles, and other relevant items, contributing to situational awareness.
Object Storage Integration
Object Storage Integration involves connecting video management systems with object storage solutions, including public cloud services, allowing for scalable and cost-effective storage of large volumes of video data. This integration enhances flexibility, enabling organizations to efficiently manage and retain video archives while optimizing storage resources.
Offline Analytics 
Offline Analytics is a feature of video analytics software that allows for the analysis of recorded video footage. Users can apply advanced video analytics algorithms retrospectively to recorded video, enabling the detection and extraction of valuable information from past events. Offline analytics enhances investigative capabilities and provides valuable insights for forensic analysis.
On-Premises VMS Servers
On-Premises VMS Servers are video management system servers installed and operated within an organization's physical infrastructure. This approach provides direct control over the video surveillance environment.
ONVIF Support
ONVIF (Open Network Video Interface Forum) Support ensures compatibility and interoperability between different IP-based video surveillance devices and systems. This standard facilitates seamless integration of diverse equipment within a surveillance ecosystem.
OpenStreetMap & Google Maps Integration
OpenStreetMap and Google Maps Integration involves incorporating map services into video management software. This integration enhances situational awareness by providing a visual representation of camera locations, alarms, and events on a map interface, aiding operators in spatially contextualizing security information.

P

People Counting
People Counting is a video analytics feature that accurately counts the number of individuals entering or exiting a specific area, or simultaneously present in an area. This data is valuable for various applications, including retail analytics and crowd management.
Physical Security System
Physical Security Systems encompass a range of integrated technologies and measures designed to protect people, assets, and property from physical threats. These systems often include components such as video surveillance, access control, intrusion detection, and fire alarm systems, working in unison to provide comprehensive security solutions.
Physical Security 
Physical security refers to the measures and strategies implemented to protect people, assets, and property from physical threats. Video surveillance and security solutions play a critical role in physical security by providing real-time monitoring, event detection, access control integration, and incident management capabilities. These features help organizations enhance their physical security posture and respond effectively to security incidents.
POS Supervision
Point of Sale (POS) Supervision involves integrating video surveillance with point-of-sale systems to monitor and analyze transactions at retail or commercial checkout points. This helps prevent theft, fraud, and enhances overall security by providing visual evidence of transactions and associated activities.
POS Terminal Integration
Integrated POS Terminals refer to the integration of video surveillance systems with Point of Sale terminals. This integration enhances transaction monitoring and provides visual context to associated financial activities.
Pre-Emptive Detection 
Pre-Emptive Detection involves the early identification of potential security threats or anomalies before they escalate. This proactive approach enhances the ability to prevent incidents and respond promptly.
PSIM 
PSIM stands for Physical Security Information Management. AxxonSoft's PSIM software is a comprehensive security management platform that integrates various security systems, such as video surveillance, access control, intrusion detection, and fire alarm systems, into a unified interface. PSIM enables centralized monitoring, event correlation, incident management, and automated response, enhancing situational awareness and improving security operations.
PTZ Camera
PTZ (Pan-Tilt-Zoom) Camera is a type of surveillance camera that allows users to remotely control the pan, tilt, and zoom functions. This flexibility enhances the coverage and monitoring capabilities of the camera, particularly object tracking.

R

Remote Access
Remote Access enables users to access and manage video surveillance systems from a remote location. This feature enhances flexibility and allows for real-time monitoring and response, even when not physically on-site.
Remote Configuration and Monitoring
Remote Configuration and Monitoring enable users to adjust video surveillance settings and monitor system performance from a remote location. This capability streamlines maintenance and troubleshooting tasks.
Remote Video Monitoring
Remote Video Monitoring involves the real-time observation of video feeds from surveillance cameras at a location distant from the physical site. This capability is crucial for effective security management and incident response.
Retail Analytics
Retail Analytics involves the use of video surveillance and analytics tools to gather insights into customer behavior, optimize store layouts, and enhance overall retail operations.

S

Safety & Security Industry
The Safety & Security Industry encompasses businesses and technologies dedicated to providing solutions for protecting people, assets, and property from various threats. Video surveillance is a key component of this industry.
Scalable Video Management Software
Scalable Video Management Software is designed to accommodate the growth of video surveillance systems. It provides flexibility for organizations to expand their surveillance infrastructure while maintaining operational efficiency.
Security Policy
Security Policy refers to a set of guidelines and rules established to ensure the proper use and management of video surveillance systems. These policies contribute to maintaining security, privacy, and regulatory compliance.
Security Solution
Security Solutions encompass a range of technologies, practices, and measures designed to safeguard individuals, organizations, and assets from various security threats. Video surveillance is a fundamental component of comprehensive security solutions.
Silent Servers Update
Silent Servers Update is a feature that allows servers within a video surveillance system to be updated with new software versions or patches without disrupting ongoing operations. This ensures continuous system reliability.
Social Distancing Violation Detection
Social Distancing Violation Detection is a video analytics feature designed to detect instances where individuals breach recommended social distancing guidelines. This capability is particularly relevant for public health and safety applications.
Special Features
Special Features or Smart Modules refer to additional functionalities within video management software that offer specialized capabilities, such as advanced analytics, integrations, or customizations to meet specific requirements.
Storage replication 
Storage replication refers to the process of duplicating data from one storage device to another, ensuring data redundancy and high availability. Video management software supports storage replication, allowing organizations to create backup copies of video footage and data for resilience and disaster recovery purposes. By replicating storage, organizations can mitigate the risk of data loss and ensure continuous access to critical video evidence.
Supported Devices
Supported Devices are the cameras, encoders, and other equipment that are compatible with a particular video management software. This ensures seamless integration and optimal performance of the surveillance system.
System Integrator
System Integrators are professionals or companies specializing in the design, implementation, and maintenance of security systems. They play a crucial role in deploying and optimizing video surveillance solutions for specific organizational needs.
System Integrity Check
System Integrity Check involves regular assessments of the video surveillance system to ensure that all components are functioning correctly and in compliance with security policies. This helps maintain system security and reliability.
System Requirements
System Requirements outline the hardware and software specifications necessary for the proper installation and operation of video management software. Adhering to these requirements ensures optimal system performance.
System Update
System Update involves the process of applying new software versions, patches, or security updates to the video management system. Regular updates enhance system functionality, security, and compatibility.

T

Tag&Track
Tag&Track, also known as PTZ Object Tracking, is a feature that enables PTZ cameras to automatically track and follow moving objects. This enhances the system's ability to monitor dynamic scenarios.
Technical Support
Technical Support involves assistance provided by experts to resolve issues, answer queries, and ensure the proper functioning of video surveillance systems. Prompt and reliable technical support is essential for system reliability.
Third-Party Systems Integration
Integration with Third-Party Systems involves connecting video management software with external systems, such as access control, intrusion detection, and building management systems. This integration enhances overall security capabilities and expands system functionalities.
TLS encryption 
TLS (Transport Layer Security) encryption is a cryptographic protocol used to secure communication channels between video management software and connected devices or clients. TLS encryption ensures the confidentiality, integrity, and authenticity of data transmitted over the network, protecting against unauthorized access, tampering, and interception.

U

UDP and multicasting 
UDP (User Datagram Protocol) and multicasting are network communication protocols used in video management software to efficiently transmit video and data streams across the network. UDP provides a lightweight and low-latency transport mechanism for real-time video streaming, while multicasting allows the simultaneous delivery of video streams to multiple recipients.
User Report System
The User Report System is a feature within video management software that allows users to generate and customize reports on system activities, events, and analytics results. This contributes to comprehensive situation monitoring.
Users and Roles
Users and Roles in Video Management Software (VMS) refer to the system's user management functionality, allowing administrators to create and assign specific roles to users. This feature ensures controlled access, defining permissions and privileges based on user roles, enhancing security and managing system operations effectively.

V

Vehicle Make and Model Recognition
Vehicle Make and Model Recognition is a technology that utilizes video analytics to automatically identify and classify vehicles based on their make and model. This capability enhances security and surveillance by providing detailed information about the types of vehicles present, aiding in investigations and traffic management.
Vertical Security Solutions
Vertical Security Solutions are specialized security applications tailored for specific industries or sectors. These solutions address the unique security needs of vertical markets such as healthcare, finance, transportation, and more, providing industry-specific features and compliance with requirements.
Video Detection Tools
Video Detection Tools are software-based functionalities within video analytics that enable the identification and analysis of specific objects, events, or behaviors in video footage. These tools include features like motion detection, object tracking, and advanced analytics algorithms to enhance the overall intelligence of video surveillance systems.
Video Management Software (VMS)
Video Management Software (VMS) is specialized software used to manage and control video surveillance systems. It allows users to monitor live video, record video, configure cameras and access archived content. VMS increases security, efficiency and surveillance capabilities by providing a centralized platform for monitoring multiple cameras and responding to incidents quickly.
Video Surveillance System
Video Surveillance Systems encompass the entire setup of cameras, recording equipment, and management software designed for capturing, monitoring, and analyzing video footage in real-time or retrospectively. These systems play a crucial role in enhancing security, safety, and situational awareness across various environments.
Video Surveillance
Video Surveillance involves the use of cameras and related technologies to capture, monitor, and analyze visual information for security, safety, and operational purposes. It includes a range of hardware and software components, providing real-time monitoring and archival capabilities for effective security and operations management.
Video Wall Management
Video Wall Management involves the control and configuration of large-scale display systems, known as video walls, comprising multiple screens or monitors. This feature allows operators to organize, arrange, and display video feeds, alarms, or other visual information for comprehensive monitoring and response.
Videowall 
A videowall is a large display system consisting of multiple screens or monitors arranged together to create a single, unified visual display. Videowalls provide a comprehensive and immersive monitoring experience, enabling operators to monitor critical areas and respond effectively to security events.
Visitor Counter
A Visitor Counter is a technology that employs video analytics to count and track the number of people entering or exiting a specific area. This functionality is commonly used in retail environments, museums, and other public spaces to gather insights into visitor traffic patterns.
VSaaS
VSaaS, or Video Surveillance as a Service, is a cloud-based model for delivering video surveillance solutions. VSaaS provides users with the flexibility to access and manage their surveillance systems remotely via the internet, eliminating the need for extensive on-premises hardware and maintenance.
VSaaS Datacenter Platform
VSaaS Datacenter Platform refers to the software infrastructure and services that enable Video Surveillance as a Service (VSaaS) within a centralized data center. This platform enables the delivery of cloud-based video surveillance solutions, offering scalability, accessibility, and remote management for users.