Home
Services
Security Guards
Remote Monitoring
Security System
Residential Security
Industry
Industries
Commercial Real Estate
Multifamily
Property Management
Hospitality
Healthcare
Manufacturing
Retail
Financial Institutions
Government
Education
Projects
About Us
Blog
Careers
Request A Quote
Sign In
Request A Quote
Sign In
Glossary
Clear All
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
De-escalation & Conflict Resolution Certification
Official training in de-escalation techniques and conflict resolution.
D
Active Shooter Response Training
Training to handle active shooter situations.
A
Certified Security Supervisor (CSS)
Certification for officers supervising security teams.
C
Security Lighting
Strategic lighting to reduce shadows and improve surveillance.
S
Perimeter Intrusion Detection System (PIDS)
Specialized sensors to detect any breach of a site’s perimeter.
P
Anti-Tailgating Systems
Measures that prevent unauthorized persons from following someone into a secure area.
A
Bollard Installation
Posts installed to prevent unauthorized vehicle access.
B
Chain-of-Command Protocol
Hierarchical structure of decision-making during a crisis situation.
C
Evidence Preservation
Techniques to secure and maintain the integrity of evidence after an incident.
E
Security Memorandum
An official note detailing security directives or recommendations.
S
Continuity of Operations Plan (COOP)
A plan ensuring essential services continue to operate during a crisis.
C
Threat Intelligence
Collection and analysis of information about potential threats targeting the organization.
T
Red Team Assessment
Proactive evaluation by experts simulating attacks to test security measures.
R
Checkpoint Screening
Physical inspections or metal detector checks at access points.
C
Patron Escort
Secure escorting of clients or high-risk individuals in public or private locations.
P
Ingress/Egress Control
Management of entry and exit flows at events to prevent congestion or incidents.
I
Incident Escalation Protocol
Standardized process to alert higher management levels in case of a threat.
I
After-Action Review (AAR)
Post-incident analysis to identify successes and gaps in the response.
A
Critical Incident Management
Structured management of major incidents affecting a site’s security.
C
Multi-Factor Authentication (MFA)
Enhanced access security combining multiple methods (badge + code + biometrics).
M
Visitor Management System (VMS)
Software that records, authorizes, and tracks visitors to a site.
V
Turnstile Access
Automated turnstiles controlled by badges, cards, or biometric authentication.
T
Video Analytics
Automated processing of video feeds to provide proactive alerts.
V
Smart Sensors
Connected sensors that detect intrusion, smoke, vibration, or glass breakage.
S
AI-Powered Analytics
Video analysis assisted by artificial intelligence to detect suspicious behavior or abandoned objects.
A
Drone Surveillance
Aerial monitoring using drones equipped with cameras or thermal sensors.
D
Key Control Officer
An officer responsible for managing and tracking physical or electronic keys for a site.
K
Armed Mobile Patrol
A mobile patrol team equipped with armed personnel for high-risk sites.
A
Canine Security
The use of specially trained dogs for detection, protection, or patrolling duties.
C
Roving Guard
An officer conducting random patrols on a site to create a dynamic deterrent effect.
R
Client Portal
An online platform allowing clients to access real-time reports, patrol logs, and activity data from their security contract.
C
Visitor Log
A digital or physical record of all individuals entering and exiting a secured premises.
V
Use of Force
The legal framework defining the conditions under which a security officer may use physical force to control a situation.
U
First Aid Certified
A security officer trained in emergency first aid, capable of providing immediate care in the event of injury or illness on-site.
F
Certified Protection Officer (CPO)
A recognized professional certification validating advanced competency in security operations and management.
C
PIPEDA
Canada's federal privacy law governing how private organizations collect, use, and disclose personal information.
P
Compliance
Adherence to applicable laws, regulations, and industry standards governing private security operations.
C
Duty of Care
The legal and ethical obligation of a security provider to protect the people and property under their responsibility.
D
Post Orders
Site-specific operational instructions given to a security officer detailing their duties, procedures, and responsibilities.
P
Service Level Agreement (SLA)
A contract defining the expected performance standards and responsibilities of a security service provider.
S
Background Check
A verification of an individual's criminal, professional, and personal history prior to hiring or granting access.
B
Chain of Custody
A documented process ensuring the integrity and traceability of evidence or sensitive items from discovery to use.
C
CPTED
Crime Prevention Through Environmental Design: designing physical spaces to naturally discourage criminal behavior.
C
Defense in Depth
A strategy using multiple redundant defensive layers so that if one fails, others continue to provide protection.
D
Layered Security
A multi-tiered security approach that combines several overlapping measures to reduce overall risk exposure.
L
Perimeter Security
Protection of a site's physical boundaries using fencing, cameras, lighting, barriers, and on-site agents.
P
Deterrence
The preventive effect created by the visible presence of security personnel or surveillance equipment on a site.
D
De-escalation
A communication technique used to reduce tension and prevent a situation from escalating into physical conflict.
D
Evacuation Plan
A formalized procedure outlining how to safely and efficiently evacuate building occupants during an emergency.
E
Emergency Response
A rapid intervention protocol activated when a critical situation occurs on a secured site.
E
Incident Report
An official document recording the facts, individuals involved, and actions taken following a security incident.
I
Site Survey
A preliminary visit to a location to assess its security needs and design a tailored protection plan.
S
Security Audit
A formal, comprehensive review of a security program to evaluate its effectiveness and regulatory compliance.
S
Vulnerability Assessment
Identification of weaknesses and gaps in an existing security setup that could be exploited.
V
Risk Assessment
An analysis of a site's security vulnerabilities and risk factors to determine the appropriate level of protection.
R
Threat Assessment
A structured evaluation of potential threats targeting a site, organization, or individual to guide protective measures.
T
Command Center
A centralized control hub from which security teams coordinate operations, monitor feeds, and dispatch personnel.
C
Electronic Reporting
Digital creation and submission of incident reports directly from the field in real time.
E
Guard Tour System
A checkpoint-based system that verifies security officers are completing their assigned patrol routes on schedule.
G
GPS Tracking
Real-time satellite-based tracking of security personnel or patrol vehicles to ensure coverage and accountability.
G
Mobile Surveillance Unit (MSU)
A trailer or vehicle equipped with cameras and recording systems, deployable to any location without infrastructure.
M
Portable Surveillance System
A self-contained, mobile surveillance unit that can be rapidly deployed to construction sites, events, or temporary locations.
P
Smart Lock
A connected lock that can be controlled remotely via a mobile app or integrated security management platform.
S
Alarm System
An electronic system that detects intrusions, fire, or other threats and notifies the appropriate parties.
A
Panic Button
A discreet manual alarm device that instantly alerts security personnel or emergency services when activated.
P
Biometric Access
Access control based on unique biological data such as fingerprints, retina scans, or facial recognition.
B
Keycard Access
Access control using magnetic or RFID cards assigned to authorized individuals.
K
Access Control
A system that restricts and manages entry to specific areas using badges, PIN codes, or biometric data.
A
Intrusion Detection
A system that identifies any unauthorized attempt to enter a secured building or area.
I
Motion Detection
Technology that triggers an alert or recording when movement is detected within a defined zone.
M
License Plate Recognition (LPR)
An automated system that reads and records vehicle license plates to control access or flag suspicious vehicles.
L
Facial Recognition
Biometric technology that analyzes facial features to verify or identify a person's identity.
F
Night Vision
Technology that enables clear image capture in environments with little to no ambient light.
N
Thermal Camera
A camera that detects body heat signatures, effective in darkness or low-visibility conditions.
T
PTZ Camera
A motorized camera capable of panning, tilting, and zooming remotely to cover large or wide-angle areas.
P
IP Camera
A network-connected surveillance camera that allows remote access, high-resolution footage, and cloud storage.
I
CCTV
Closed-circuit television system used to record and monitor activity across a facility or property.
C
Residential Security
Security services tailored to residential environments such as condos, private homes, and gated communities.
R
Night Watch
Overnight surveillance carried out by an agent or security system to protect premises outside of business hours.
N
Fire Watch
Continuous on-site monitoring to detect and prevent fire hazards, especially during construction or system outages.
F
Loss Prevention
A set of strategies aimed at reducing losses caused by theft, fraud, vandalism, or employee negligence.
L
Executive Protection
A customized security plan designed to protect corporate leaders and executives from physical threats.
E
VIP Protection
Close protection services designed for high-profile individuals, celebrities, or executives facing elevated risk.
V
Event Security
Security services deployed at public or private events to protect attendees, staff, and property.
E
Crowd Control
The management and guidance of large groups of people at events to ensure safety and organized movement
C
Concierge Security
A security officer who also serves as a front desk receptionist, combining customer service with access control.
C
Parking Enforcement
Management and control of parking areas, including issuing notices, monitoring violations, and coordinating towing.
P
Virtual Guard
A remote agent who monitors a site via camera and communicates through on-site speakers when an intrusion is detected.
V
Live Monitoring
Real-time surveillance by a human operator who actively watches live camera feeds and reacts to activity.
L
Remote Monitoring
Off-site surveillance of a location through connected cameras and sensors linked to a control center.
R
Unarmed Guard
A security officer providing a visible, deterrent presence and visual surveillance without a firearm.
U
Armed Guard
A licensed security officer authorized to carry a firearm for enhanced protection of high-risk environments.
A
Static Guard
An agent permanently stationed at a fixed point such as an entrance or checkpoint.
S
Mobile Patrol
Regular rounds conducted by vehicle or on foot across one or multiple sites to detect any suspicious activity.
M
Security Guard
A trained professional physically present on-site to monitor activity, control access, and respond to incidents.
S