Glossary

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

De-escalation & Conflict Resolution Certification

Official training in de-escalation techniques and conflict resolution.
D

Active Shooter Response Training

Training to handle active shooter situations.
A

Certified Security Supervisor (CSS)

Certification for officers supervising security teams.
C

Security Lighting

Strategic lighting to reduce shadows and improve surveillance.
S

Perimeter Intrusion Detection System (PIDS)

Specialized sensors to detect any breach of a site’s perimeter.
P

Anti-Tailgating Systems

Measures that prevent unauthorized persons from following someone into a secure area.
A

Bollard Installation

Posts installed to prevent unauthorized vehicle access.
B

Chain-of-Command Protocol

Hierarchical structure of decision-making during a crisis situation.
C

Evidence Preservation

Techniques to secure and maintain the integrity of evidence after an incident.
E

Security Memorandum

An official note detailing security directives or recommendations.
S

Continuity of Operations Plan (COOP)

A plan ensuring essential services continue to operate during a crisis.
C

Threat Intelligence

Collection and analysis of information about potential threats targeting the organization.
T

Red Team Assessment

Proactive evaluation by experts simulating attacks to test security measures.
R

Checkpoint Screening

Physical inspections or metal detector checks at access points.
C

Patron Escort

Secure escorting of clients or high-risk individuals in public or private locations.
P

Ingress/Egress Control

Management of entry and exit flows at events to prevent congestion or incidents.
I

Incident Escalation Protocol

Standardized process to alert higher management levels in case of a threat.
I

After-Action Review (AAR)

Post-incident analysis to identify successes and gaps in the response.
A

Critical Incident Management

Structured management of major incidents affecting a site’s security.
C

Multi-Factor Authentication (MFA)

Enhanced access security combining multiple methods (badge + code + biometrics).
M

Visitor Management System (VMS)

Software that records, authorizes, and tracks visitors to a site.
V

Turnstile Access

Automated turnstiles controlled by badges, cards, or biometric authentication.
T

Video Analytics

Automated processing of video feeds to provide proactive alerts.
V

Smart Sensors

Connected sensors that detect intrusion, smoke, vibration, or glass breakage.
S

AI-Powered Analytics

Video analysis assisted by artificial intelligence to detect suspicious behavior or abandoned objects.
A

Drone Surveillance

Aerial monitoring using drones equipped with cameras or thermal sensors.
D

Key Control Officer

An officer responsible for managing and tracking physical or electronic keys for a site.
K

Armed Mobile Patrol

A mobile patrol team equipped with armed personnel for high-risk sites.
A

Canine Security

The use of specially trained dogs for detection, protection, or patrolling duties.
C

Roving Guard

An officer conducting random patrols on a site to create a dynamic deterrent effect.
R

Client Portal

An online platform allowing clients to access real-time reports, patrol logs, and activity data from their security contract.
C

Visitor Log

A digital or physical record of all individuals entering and exiting a secured premises.
V

Use of Force

The legal framework defining the conditions under which a security officer may use physical force to control a situation.
U

First Aid Certified

A security officer trained in emergency first aid, capable of providing immediate care in the event of injury or illness on-site.
F

Certified Protection Officer (CPO)

A recognized professional certification validating advanced competency in security operations and management.
C

PIPEDA

Canada's federal privacy law governing how private organizations collect, use, and disclose personal information.
P

Compliance

Adherence to applicable laws, regulations, and industry standards governing private security operations.
C

Duty of Care

The legal and ethical obligation of a security provider to protect the people and property under their responsibility.
D

Post Orders

Site-specific operational instructions given to a security officer detailing their duties, procedures, and responsibilities.
P

Service Level Agreement (SLA)

A contract defining the expected performance standards and responsibilities of a security service provider.
S

Background Check

A verification of an individual's criminal, professional, and personal history prior to hiring or granting access.
B

Chain of Custody

A documented process ensuring the integrity and traceability of evidence or sensitive items from discovery to use.
C

CPTED

Crime Prevention Through Environmental Design: designing physical spaces to naturally discourage criminal behavior.
C

Defense in Depth

A strategy using multiple redundant defensive layers so that if one fails, others continue to provide protection.
D

Layered Security

A multi-tiered security approach that combines several overlapping measures to reduce overall risk exposure.
L

Perimeter Security

Protection of a site's physical boundaries using fencing, cameras, lighting, barriers, and on-site agents.
P

Deterrence

The preventive effect created by the visible presence of security personnel or surveillance equipment on a site.
D

De-escalation

A communication technique used to reduce tension and prevent a situation from escalating into physical conflict.
D

Evacuation Plan

A formalized procedure outlining how to safely and efficiently evacuate building occupants during an emergency.
E

Emergency Response

A rapid intervention protocol activated when a critical situation occurs on a secured site.
E

Incident Report

An official document recording the facts, individuals involved, and actions taken following a security incident.
I

Site Survey

A preliminary visit to a location to assess its security needs and design a tailored protection plan.
S

Security Audit

A formal, comprehensive review of a security program to evaluate its effectiveness and regulatory compliance.
S

Vulnerability Assessment

Identification of weaknesses and gaps in an existing security setup that could be exploited.
V

Risk Assessment

An analysis of a site's security vulnerabilities and risk factors to determine the appropriate level of protection.
R

Threat Assessment

A structured evaluation of potential threats targeting a site, organization, or individual to guide protective measures.
T

Command Center

A centralized control hub from which security teams coordinate operations, monitor feeds, and dispatch personnel.
C

Electronic Reporting

Digital creation and submission of incident reports directly from the field in real time.
E

Guard Tour System

A checkpoint-based system that verifies security officers are completing their assigned patrol routes on schedule.
G

GPS Tracking

Real-time satellite-based tracking of security personnel or patrol vehicles to ensure coverage and accountability.
G

Mobile Surveillance Unit (MSU)

A trailer or vehicle equipped with cameras and recording systems, deployable to any location without infrastructure.
M

Portable Surveillance System

A self-contained, mobile surveillance unit that can be rapidly deployed to construction sites, events, or temporary locations.
P

Smart Lock

A connected lock that can be controlled remotely via a mobile app or integrated security management platform.
S

Alarm System

An electronic system that detects intrusions, fire, or other threats and notifies the appropriate parties.
A

Panic Button

A discreet manual alarm device that instantly alerts security personnel or emergency services when activated.
P

Biometric Access

Access control based on unique biological data such as fingerprints, retina scans, or facial recognition.
B

Keycard Access

Access control using magnetic or RFID cards assigned to authorized individuals.
K

Access Control

A system that restricts and manages entry to specific areas using badges, PIN codes, or biometric data.
A

Intrusion Detection

A system that identifies any unauthorized attempt to enter a secured building or area.
I

Motion Detection

Technology that triggers an alert or recording when movement is detected within a defined zone.
M

License Plate Recognition (LPR)

An automated system that reads and records vehicle license plates to control access or flag suspicious vehicles.
L

Facial Recognition

Biometric technology that analyzes facial features to verify or identify a person's identity.
F

Night Vision

Technology that enables clear image capture in environments with little to no ambient light.
N

Thermal Camera

A camera that detects body heat signatures, effective in darkness or low-visibility conditions.
T

PTZ Camera

A motorized camera capable of panning, tilting, and zooming remotely to cover large or wide-angle areas.
P

IP Camera

A network-connected surveillance camera that allows remote access, high-resolution footage, and cloud storage.
I

CCTV

Closed-circuit television system used to record and monitor activity across a facility or property.
C

Residential Security

Security services tailored to residential environments such as condos, private homes, and gated communities.
R

Night Watch

Overnight surveillance carried out by an agent or security system to protect premises outside of business hours.
N

Fire Watch

Continuous on-site monitoring to detect and prevent fire hazards, especially during construction or system outages.
F

Loss Prevention

A set of strategies aimed at reducing losses caused by theft, fraud, vandalism, or employee negligence.
L

Executive Protection

A customized security plan designed to protect corporate leaders and executives from physical threats.
E

VIP Protection

Close protection services designed for high-profile individuals, celebrities, or executives facing elevated risk.
V

Event Security

Security services deployed at public or private events to protect attendees, staff, and property.
E

Crowd Control

The management and guidance of large groups of people at events to ensure safety and organized movement
C

Concierge Security

A security officer who also serves as a front desk receptionist, combining customer service with access control.
C

Parking Enforcement

Management and control of parking areas, including issuing notices, monitoring violations, and coordinating towing.
P

Virtual Guard

A remote agent who monitors a site via camera and communicates through on-site speakers when an intrusion is detected.
V

Live Monitoring

Real-time surveillance by a human operator who actively watches live camera feeds and reacts to activity.
L

Remote Monitoring

Off-site surveillance of a location through connected cameras and sensors linked to a control center.
R

Unarmed Guard

A security officer providing a visible, deterrent presence and visual surveillance without a firearm.
U

Armed Guard

A licensed security officer authorized to carry a firearm for enhanced protection of high-risk environments.
A

Static Guard

An agent permanently stationed at a fixed point such as an entrance or checkpoint.
S

Mobile Patrol

Regular rounds conducted by vehicle or on foot across one or multiple sites to detect any suspicious activity.
M

Security Guard

A trained professional physically present on-site to monitor activity, control access, and respond to incidents.
S