acoustic sensor

An acoustic sensor is a built-in microphone that has no support for streaming audio but instead uses the data to detect and measure sound waves, converting the soundwaves into digital data for analysis only. For example, our camera analyzes the data and produces the metadata such as sound levels, object classifications, and so forth. An acoustic sensor does not produce any audio to be used in a camera system for listening to or for the recording of audio. Instead, the microphone component is used only to generate data, not to stream audio.

alarm overlay

Alarm overlay is a type of metadata overlay. An alarm overlay is used in recorded and live video to draw the operator's attention to things that happen in a scene, such as an individual who lingered in a specific area too long. An alarm overlay can consist of different elements, but typically it includes a bounding box that appears or changes color when the alarm is triggered.


Through AXIS Camera Application Platform (ACAP), you have access to a list of tested, well-documented application program interfaces (APIs). These APIs are optimized for Axis devices and let you take full advantage of Axis hardware and software. Together with software development kits (SDKs) based on open-source components, they facilitate interoperability, scalability, and easy migration of your apps to execute on Axis devices.

area monitoring

A detection profile for radar in surveillance use cases. Best used for objects moving up to 55km/h (34 mph). Detects whether an object is a human, a vehicle, or an unknown object.

artificial intelligence (AI)

A broad concept used to label manufactured machines, computers, systems, and software that solve complex tasks while demonstrating seemingly intelligent traits. Deep learning and machine learning are subsets of AI.


A type of iris, which is electrically controlled by the camera, to automatically regulate the amount of light allowed to enter.

AXIS Camera Application Platform (ACAP)

A framework for added functionality and intelligence at the edge. AXIS Camera Application Platform (ACAP) is a well-established open application platform that allows partners and developers to develop applications for a wide range of use cases and segments, supported by many cameras, speakers, intercoms, and radar products. ACAP allows users to download and install Axis and third-party applications in Axis products.

Axis device ID

Axis device ID is a device-unique certificate with corresponding keys that can prove the authenticity of an Axis device. The Axis device is factory-provisioned with an Axis device ID that is stored in the secure keystore. Axis device ID is compliant with IEEE 802.1AR (IDevID, Initial device identifier), which defines a method for automated, secure identification.

Axis Edge Vault

Axis Edge Vault (Edge Vault) provides a hardware-based cybersecurity platform that safeguards the Axis device. It forms the foundation that all secure operations depend on and offers features to protect the identity and integrity of the device. The platform relies on cryptographic computing modules and system-on-chip security to protect sensitive information from unauthorized access. Features include secure boot, signed OS, secure keystore, Axis device ID, and signed video.

Axis Lightfinder

Axis Lightfinder technology delivers high-resolution, full-color video with a minimum of motion blur even in near darkness. Because it strips away noise, Lightfinder makes dark areas in a scene visible and captures details in very low light. Cameras with Lightfinder discern color in low light better than the human eye. In surveillance, color may be the critical factor to identify a person, an object, or a vehicle.


AXIS OS is the Linux-based operating system, purpose-built for Axis devices, which enables long-term value, cybersecurity, and world-class integration.

AXIS OS active track

The AXIS OS active track is the most updated and feature-progressive track of AXIS OS and is suitable for customers who want access to the newest features and improvements. New products are launched on this track which means the most immediate access to any new features and updates.

AXIS OS lifecycle

The AXIS OS lifecycle is the overall software support lifecycle for AXIS OS-based products. The AXIS OS lifecycle in AXIS OS-based products includes different stages and levels of software support including feature growth, bug fixes, and security patches, and is tied together to the actual product lifecycle. Each lifecycle includes the following three tracks: AXIS OS active track, AXIS OS long-term support (LTS) track and AXIS OS product-specific support (PSS) track.

AXIS OS long-term support (LTS) track

The focus of the AXIS OS long-term support (LTS) track is to keep the products well integrated with third-party equipment or software, and still get necessary bug fixes and cybersecurity updates. An LTS track has a fixed feature set, and a new track is issued every two years and maintained for five years. No new products or features are added to the LTS track.

AXIS OS product-specific support (PSS) track

The AXIS OS product-specific support (PSS) track is a rare track for when a product requires support after an LTS track expires. The products on this track continue to receive necessary bug fixes and cybersecurity updates. Each product sits on its own track and the track is not connected to other product tracks. Non-AXIS OS products have similar support tracks.

Axis Secure Remote Access

Axis Secure Remote Access is a technology that allows a smartphone or PC client to access Axis network cameras when the client and the cameras are located on different local networks. Axis Secure Remote Access significantly simplifies the installation of remote access to surveillance systems. Once enabled, it’s automatically configured and removes the need for manual port-forwarding and router configuration.


barrel distortion correction (BDC)

Barrel distortion correction (BDC) is a lens correction that digitally corrects barrel distortion, where the image of a square object has sides that curve out. Using sliders, users can pull the edges of the image to make the image appear flat rather than curved.

bounding box

A bounding box is a type of metadata overlay. It´s used in recorded and live video to draw the operator´s attention to what is happening in a scene. It typically includes a rectangular box that appears when an object or attribute of interest appears.


cloud storage

A storage process where you save and maintain your data offsite, which can only be accessed through the internet. This means that you can access the data you have put in a cloud storage from any location and can also grant access permission to anyone you want to share it with. It is a very secure of storing data that also provides a good backup. 

computer vision

The discipline of using algorithms to analyze images and videos to help computers understand and interpret what's happening in a scene.

corridor format

Corridor format is a feature that lets users turn the camera view 90 degrees to give a vertical view (portrait) at, for example, 9:16 ratio rather than a horizontal view (landscape) at, for example, 16:9 ratio. With corridor format, you can use the full view of the camera to overlook narrow scenes such as retail store aisles, highways and freeways, school hallways, and train station platforms.


The protection of computer systems and services from cyberthreats. Cybersecurity practices include processes for preventing damage and restoring computers, electronic communications systems and services, wire and electronic communications, and stored information to ensure their availability, integrity, safety, authenticity, confidentiality, and nonrepudiation.


day-and-night functionality

Sometimes referred to as day/night functionality. A camera with day-and-night functionality can pick up light in the near-infrared (NIR) wavelength range and produce images. In cameras with true day-and-night functionality, the IR-blocking filter is mechanically removed at night. As a result, the camera's overall light sensitivity is increased. Cameras of all shapes and sizes (such as fixed, fixed dome, and PTZ cameras) can offer day-and-night functionality. 


A type of automatic iris that is electrically controlled by the camera to automatically regulate the amount of light that is allowed to enter.

deep learning DL

A refined version of machine learning that uses so-called convolutional neural networks to process data. The algorithm learns to extract and combine features in a data-driven manner. DL is suitable for complex challenges, such as image classification, language processing, and object detection, where it's difficult to write rules to describe the solution. Instead, the deep learning network is trained iteratively using numerous examples, which usually have been labeled by a human expert.

deep learning processing unit (DLPU)

An umbrella term for integrated chipsets designed for deep learning algorithms. In other words, DLPUs are AI accelerators integrated on application-specific integrated circuits (ASIC) or systems-on-chip (SoC) with data memory and architecture dedicated to accelerating deep-learning inference, allowing for more granular object classification.

device management

Every product needs continuous configuration and maintenance through its lifecycle. It could be a replacement of certain hardware parts for better functionality. AXIS Device Manager Extend is a good example of a solution that you can effectively use to manage all your Axis devices, verify your device’s software version and upgrade, troubleshoot, as well as to get information about warranty and product discontinuation.

device software

Device software typically refers to the programs or operating systems that run on electronic devices such as computers, smartphones, tablets, and other hardware. It includes the software that enables the device to function, software to manage hardware resources, and software to run applications. This can encompass everything from the operating system itself to the device drivers, firmware, and other software components that facilitate communication between the hardware and the user or other software.


Dynamic Host Configuration Protocol is a protocol for automatic assignment and management of IP addresses.

digital signal processor (DSP)

A digital signal processor is an audio processor that provides advanced sound compensation, which optimizes the sound to fit specific scenarios. In Axis network speakers, several sound optimization techniques such as frequency optimization, loudness compensation, and dynamic range control are built into the speakers themselves to deliver better audio quality in any environment. 


echo cancellation

Devices with echo cancellation can recognize sounds that the built-in loudspeaker produces as echoes and remove them.

Edge Vault

Axis Edge Vault provides a hardware-based cybersecurity platform that safeguards the Axis device. It forms the foundation that all secure operations depend on and offers features to protect the identity of the device and safeguard its integrity from the factory. The platform relies on cryptographic computing modules and system-on-chip security to protect sensitive information from unauthorized access. Features include secure boot, signed firmware, secure keystore, Axis device ID, and signed video.


Edge-to-edge technology is a way to make IP devices communicate directly with each other. It offers smart pairing functionality between Axis network cameras and Axis audio products such as network speakers, audio bridges, and amplifiers.

electronic image stabilization (EIS)

Electronic image stabilization (EIS) provides smooth video in situations where a camera is subject to vibrations. Built-in gyroscopic sensors continuously detect the camera’s movements and vibrations, and they automatically adjust the frame to ensure you always capture the details you need. Electronic image stabilization relies on different algorithms for modeling camera motion, which are used to correct the images.

elevator door state detector

An elevator door state detector is ACAP software that detects the door's state based on the live image of Open or Closed and then sends a message event to the customer in metadata format.


All electronic devices release electromagnetic energy. Electromagnetic compatibility (EMC) approvals are based on two parts: emission and immunity. Emission refers to the ability of electronic equipment to function satisfactorily without emitting too much electromagnetic energy that can disturb other equipment in that environment. Immunity refers to the ability of electronic equipment to tolerate the influence of electromagnetic energy from other electronic products.


Evidence management systems and evidence management software are both abbreviated EMS. Both terms are associated with body worn cameras. An evidence management system comprises the whole solution of integrated hardware, software, and storage. Evidence management software manages recordings and metadata from body worn cameras.

event triggers

In Axis products, an event trigger is typically a detector of digital signals, audio signals, or physical events such as movements or a change in light. Users can set up rules for what should happen when one or more triggers are met. Usually, the word trigger is sufficient, and the word event can be left out. In newer Axis software and products, we use the term condition instead of trigger.


When a camera is installed in a potentially combustible environment, such as chemical processing plants, or near gas pipelines, it must meet very specific safety standards. It is the explosive environment that must be protected from potential ignition from the camera and other equipment. One way to make a camera explosion-protected is to use a heavy-duty enclosure that is designed to contain any internal explosion - resulting from sparks igniting gases or vapors - from releasing the energy externally. Another way is to reduce the energy inside the camera to safe levels, so that it is incapable of igniting a potentially combustible environment.


focus recall

Focus recall is a feature that allows you to save focus areas to which the PTZ camera automatically returns when it moves into that view. This feature is especially useful in challenging lighting conditions, where the camera would have trouble finding focus. To use focus recall, you click a button when you’re satisfied with the focus of the current view, and the camera creates a focus recall area. Later, the camera automatically recalls the previously set focus for that view.

frame rate

The frame rate is the frequency at which a video stream is updated. We measure frame rate in frames per second (fps). When there's movement in the video stream, you need a high frame rate to maintain good video quality.

frequency response

The frequency response is the frequency range that a system (or any part of it) can respond to.

full duplex

Transmission of data in two directions simultaneously, such as in a telephone conversation.



Gatekeeper is an analytics feature that makes the camera react to movement and move to that position automatically. After a few seconds of inactivity, the camera returns to its home position. Typically, the gatekeeper is used to monitor a gate or a specific area. The gatekeeper can also trigger other actions (such as reading a license plate or recording video) in the same camera, in other cameras, or in the VMS.


half duplex

Transmission of data in two directions, in one direction at a time, as in a walkie-talkie system.

horizon straightening

Horizon straightening is a feature in multisensor cameras that compensates for any physical tilt of the camera. By straightening the horizon and removing distortion, the feature enhances the viewing experience and provides an image that is perceived to be straight. Objects that are vertical in real life stay vertical also in the image.


i-CS lens

An i-CS lens is an intelligent CS-mount lens that allows for quick and easy installation. The i-CS lens has three motors, which enable automatic and remote control of generic features such as zoom, focus, and aperture. This way, you can repurpose the lens for different cameras and use cases.

IEEE 802.1AR

This IEEE standard for secure device identity defines a method for how to automate and secure the identification of a device over a network. A standardized device identity, stored during product manufacturing in a tamper-protected cryptographic computing module (TPM 2.0, Secure Element), facilitates interoperable secure device authentication and simplifies secure device deployment and management in IEEE 802.1X and HTTPS networks.

IEEE 802.1X

A network protocol that protects the network from unauthorized clients. The network infrastructure is protected through the use of managed switches and RADIUS servers. The 802.1X client in the device authenticates the device on the network.

IK rating

IK ratings specify degrees of protection against external mechanical impact, measured in joules. The degree of protection ranges from IK01 up to IK10. The requirements, which include parameters for impact energy, mass, and drop height  are specified in the international standard IEC/EN 62262. See also IK08/IK10.


IK ratings are defined as a code, which consists of the letters IK followed by two digits that represent testing requirements on impact energy, mass, and drop height.

IK08 rated products are protected against 5 joules of impact, the equivalent of 1.7 kg dropped from 300 mm above the product.
IK10 rated products are protected against 20 joules of impact, the equivalent of 5 kg dropped from 400mm above the product.

image sensor

An image sensor is a device that captures light and converts it into digital signals to form an image. The image sensor consists of photosensitive diodes, photosites, which converts the light into electrons. The electrons are, through several conversions, interpreted as pixels. Once an image is formed, it’s sent for processing in a stage that determines, among other things, the colors of each individual pixel that make up an image.

IP rating

Electric and electronic equipment deteriorate or malfunction when water or dust enters the device. The IEC has developed the ingress protection (IP) ratings, which grade the resistance of an enclosure against the intrusion of dust or liquids. The ratings are widely used throughout industry. See also IP66/IP67.


IP 66: An IP classification for dust tightness and protection against powerful water jets.
IP 67: An IP classification for dust tightness and protection against brief immersion in water.


IP ratings (ingress protection) are defined as a two-digit code where the first digit is the level of protection against the intrusion of solid foreign objects and the second digit is the level of protection against the intrusion of water.

IP66 – the product is dust-tight and powerful jets can’t harm the product.
IP67 – the product is dust-tight and continuous submersion in water can’t harm the product.


Together, with TCP, the  Internet Protocol is the principal protocol in most of today's networked applications. For a server to operate on the internet, it must have its own, individual, public IP address. There are two versions, IPv4 and IPv6, where IPv4 still provides the majority of the service today. The main difference between the two is the size of the address space, which is substantially larger in IPv6.

isothermal palettes

A mode that allows the user to select a color range to represent different temperatures in a scene. Each color in an isotherm palette corresponds to a specific temperature value. The user can choose between black-and-white ranges, color ranges, or a mix between the two. The same input (measured thermal radiation) can result in different visual appearance depending on how each pixel value is mapped to a color range.


LED indicator

A light-emitting diode (LED) indicator has illuminated components used to show the status of a function, a battery, or electronics. ​An LED indicator lets you easily see if the camera is active or not, making it ideal for use within surveillance in retail, transport, and particularly healthcare environments where privacy is paramount.

Low Voltage Directive (2014/35/EU)

The low-voltage directive provides broad objectives for the safety of electrical equipment. It ensures that products are safe to use without risk of personal injury or property damage. It's valid for the EU, and it's included in the CE mark.


machine learning processing unit (MLPU)

An umbrella term for integrated chipsets designed for machine learning algorithms. In other words, MLPUs are AI accelerators integrated on application-specific integrated circuits (ASIC) or systems-on-chip (SoC) with data memory and architecture dedicated to machine learning.

mDNS (Bonjour)

Multicast DNS is a protocol that can be used to discover network video products using Mac computers, but it can also be used as a discovery protocol for new devices in any network.


Data that describes and gives information about other data (typically primary data, such as the video or audio stream from an Axis device). Metadata makes it easier for systems and people to find, track, and analyze instances of data.


Message Queuing Telemetry Transport is a standard messaging protocol for the internet of things (IoT). It was designed for simplified IoT integration and is used in a wide variety of industries to connect remote devices while leaving a small code footprint and requiring minimal network bandwidth.

multisite aggregation

The collection and summary of useful data for effectively managing several devices or users from one central system or location. Such data could include device inventory, audio, video, events, system status, and any other useful metadata. 

multisite management

A solution that allows you to manage your device, content, or users in several locations from one system or location. For example, with AXIS Camera Station, you can combine camera live and recorded views from several locations into one overview. AXIS Optimizer also has a multisite management feature with which you can create a centralized management of license plate list and search. A multisite management system also helps you save cost, while increasing your system's management efficiency. 



NEMA 4X is equivalent to IP56 and provides a degree of protection of the equipment, inside the enclosure, against the ingress of solid foreign objects, the ingress of splashing or hose-directed water, the forming of ice, and corrosion.

NEMA rating

The National Electrical Manufacturers Association (NEMA) is a US-based association that provides standards for electrical equipment enclosures. NEMA has launched their own standard NEMA 250 worldwide. NEMA has also adopted and published a harmonizing IP standard, ANSI/IEC 60529, through the American National Standards Institute (ANSI).

noise reduction

Noise reduction is used to reduce ambient background noise.


One of five pillars of information assurance. Nonrepudiation provides proof of the origin, authenticity, and integrity of data. It assures the sender that the message was delivered and provides proof of the sender's identity to the recipient. Neither party can deny that a message was sent, received, and processed.


one-click cloud connection

A software component that authenticates the ownership of an Axis device over the cloud together with an owner authentication key, which is shipped with the device. The one-click cloud connection service​ is used by select partners such as Genetec, Telcred, Total Security, IDODI, etc. This feature is available only to select partners.


Open Network Video Interface Forum (ONVIF) provides and promotes standardized interfaces for effective interoperability of IP-based physical security products. ONVIF is a registered trademark.

open source

Open source means that developers have access to the source code of a certain software application. Developers can use, study, change, and then distribute their version of the software. A characteristic and benefit of open-source software is the development method, which includes distributed peer review and process transparency.


Axis OptimizedIR provides a unique and powerful combination of camera intelligence and sophisticated LED technology, resulting in our most advanced camera-integrated IR solutions for complete darkness. In our pan-tilt-zoom (PTZ) cameras with OptimizedIR, the IR beam automatically adapts and becomes wider or narrower as the camera zooms in and out to make sure that the entire field of view is always evenly illuminated.


The Open Supervised Device Protocol (OSDP) is an access control communications standard developed by the Security Industry Association (SIA) to improve interoperability among access control and security products.

OSI reference model

A conceptual model that describes data communication between open systems. The model consists of seven layers. To provide a service, each layer uses the services of the layer immediately below it. Each layer must follow certain rules, or protocols, to perform services.



P-Iris is an automatic and precise iris control developed by Axis. It involves a P-Iris lens and specialized software that optimize image quality.


PBX is short for private branch exchange. It’s a telephone system within an enterprise that switches calls between users on local lines while allowing all those users to share a certain number of external phone lines. This way, you don't have to set up individual external phone lines for each user.

personal protective equipment (PPE)

Personal protective equipment (PPE) is protective clothing, helmets, goggles, face masks, hairnets or other garments or equipment designed to protect the wearer's body from injury or infection and in some cases, used to protect sensitive environments from contamination. The hazards addressed by protective equipment include physical, electrical, heat, chemicals, biohazards, and airborne particulate matter.

PoE class

PoE classes ensure efficient power distribution by specifying the amount of power that a powered device will require.


A concept (unique to Axis) for adding connectivity to Axis cameras. An interface box between the camera and switch provides the ports and adds a communication layer on top of the network.

PTRZ (pan-tilt-roll-zoom)

PTRZ (pan-tilt-roll-zoom) functionality includes the ability of a camera to rotate around its lateral, vertical, and longitudinal axes. The camera’s focal length is adjustable to achieve a narrower or wider field of view. Thanks to the remote functionality, you can quickly adjust and readjust the camera view remotely over the network, saving time and effort. PTRZ functionality also gives you the flexibility to make future adjustments easily, ensuring less disruption, less downtime, and that no dispatched technician is needed.



Reader is a device for the input of credentials and forwards the credential to the access control system for authentication and authorization.


RFID is short for radio-frequency identification. It’s an identification technology that uses radio signals, (i.e., the electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the electromagnetic spectrum) to identify an object, an animal, or a person. 

road monitoring

A detection profile for radar in traffic use cases. Best used to track vehicles moving at up to 200 km/h (125 mph) in urban zones, closed zones, and on suburban roads. This mode is mainly used to track vehicles. To track humans and other objects moving at lower speeds, use the area monitoring profile. The ability for detection at high speeds is dependent on the Axis radar product in use.


scene profiles

A scene profile consists of a group of settings that are combined in a way that suits a particular scenario. When the user selects a scene profile, the camera automatically optimizes the exposure time, white balance, aperture, sharpness, contrast, and noise to suit that scenario.


AXIS Camera Application Platform (ACAP) allows you to install plugin-style apps on your Axis devices. This way, you can customize the feature set of your Axis devices and systems while maintaining a high degree of interoperability and scalability. The application programming interfaces (APIs) and ACAP software development kits (SDKs) are based on open-source components and support developers, at Axis and partner companies alike, in creating apps for a vast array of scenarios.

secure boot

Secure boot is a boot process that consists of an unbroken chain of cryptographically validated software, starting in immutable memory (boot ROM). Being based on signed firmware, secure boot ensures that a device can boot only with authorized firmware.

secure boot

Secure boot is a boot process that consists of an unbroken chain of cryptographically validated software, starting in immutable memory (boot ROM). Secure boot ensures that a device can boot only with signed OS.

secure element

A cryptographic computing module that provides hardware-based, tamper-protected storage of private, cryptographic keys and secure execution of cryptographic operations. Unlike the TPM, the hardware and software interfaces of a secure element are non-standardized and manufacturer-specific.

secure keystore

Secure keystore is a tamper-protected environment for the protection of cryptographic keys and the secure execution of cryptographic operations. It prevents unauthorized access and malicious extraction even in the event of a security breach. An Axis device can have either one or multiple hardware-based, cryptographic computing modules (for example, secure element, TPM, and TEE), which provide a hardware-protected secure keystore.

secure remote access

A secure and encrypted process for connecting remotely to a network. It uses security solutions to ensure that your network doesn't compromise your data or open the network to unauthorized connections and attacks. Examples include the use of VPN, multifactor authentication, and encryption.

SFP slot

A slot for a small form-factor pluggable (SFP) transceiver. This type of transceiver supplies network devices, such as a switches or routers, with a fiber optic network connection.


The sharpdome feature offers innovative mechanics that make the entire dome rotate, in contrast to a conventional dome where the camera rotates inside the dome. Pan-tilt-zoom (PTZ) cameras with sharpdome are versatile, with a field of view that extends above the camera horizon. This means that refractions and other optical effects are kept to a minimum.

signed firmware

Signed firmware is implemented by the software vendor signing the firmware image with a private key, which is secret. When firmware has this signature attached to it, a device will validate the firmware before accepting and installing it. If the device detects that the firmware integrity is compromised, it will reject the firmware upgrade. Axis signed firmware is based on the industry-accepted RSA public-key encryption method.

signed OS

Signed OS is implemented by the software vendor signing the device software image with a secret, private key. When device software has this signature attached to it, a device will validate the device software before accepting and installing it. If the device detects that the integrity is compromised, it will reject the software. Axis signed OS is based on the industry-accepted RSA public-key encryption method.

signed video

When the signed video feature is enabled in a supported camera, it enables video to be authenticated and video tampering to be detected. Cryptographic signatures are added to the video stream before it leaves the camera, enabling traceability back to a particular Axis camera and allowing viewers to verify if the video has been tampered with or not. This is particularly important in an investigation or prosecution. The signing keys for signed video are stored in the secure keystore of the Axis device.


Transmission of data in one direction only, such as from a camera to the operator. 


The Session Initiation Protocol (SIP) is a protocol that initiates, maintains, and terminates multimedia sessions between different parties. Usually, these sessions consist of audio, but sometimes they consist of video. The most common applications of SIP include internet telephony for voice and video calls and instant messaging over IP networks.

sound pressure

Sound pressure level (SPL) is an objective measure of sound loudness. SPL is used to describe how loud a sound a product is producing. The higher the SPL, the louder the sound. It is a reference level, where 0 dBSPL equals the threshold of hearing, 120–140 dBSPL is painful, and 140 dBSPL equals irreparable hearing damage. To get the SPL, you measure the atmospheric pressure caused by a sound wave over a specified period of time. It's expressed in dBSPL.

spatial behavior

Spatial behavior is the way objects move within a scene.

In video analytics, you can set up rules for detecting and handling both unexpected or desired spatial behavior. Through rules that pair spatial behavior-based conditions with actions, your systems or staff can be made aware and respond appropriately.


  • Rule: Notify the operator (action) when a vehicle moves within an area of interest (condition).
  • Rule: Play an audio message (action) when someone crosses a virtual line (condition).
supervised input

A supervised input, or supervised I/O, allows you to detect tampering in external alarm systems. Beyond the active or inactive state, it's possible to detect if the wire has been cut or shortened.

system health monitoring

A constant monitoring of your system to ensure that it's in good operational mode. It helps to evaluate the system’s condition, by checking its performance and performing regular maintenance. A comprehensive system health monitoring provides a full status report of the system’s components. With this, you can easily check which part of the system is malfunctioning or partially performing. 

system management

The overall monitoring and maintenance of a system’s hardware and software. It includes management processes such as operating system updates, user profile administration, cybersecurity, hardware servicing and replacement. For example, you should upgrade your device’s software when there's a new version, to ensure the product has access to the newest features and functionalities.



Short for Transmission Control Protocol/Internet Protocol. A reference  model used to understand protocols and how communication takes place. The model consists of four layers, which correspond to the seven layers in the OSI model. Each layer must follow certain rules, or protocols, to perform services.

telemetry data

Data about the environment that is transmitted from a remote device, such as a sensor. Temperature and energy usage can be examples of telemetry data.

In the case of MQTT, telemetry data shows how products are used (e.g., where, how often, with which software and hardware).

thermometric camera

Thermal cameras detect objects using the infrared radiation (heat) emitted by all objects. Temperature calibrated thermal cameras – called thermometric cameras – can measure absolute temperatures while surveillance optimized thermal cameras show relative temperatures. All types of thermal cameras have excellent object detection capabilities regardless of light conditions – even in complete darkness.

thermometric guard tour

When using thermometric guard tour the camera needs to be installed on a positioning unit to be able to move between preset positions. It then measures temperatures in predefined polygonal detection areas. It’s possible to add up to 256 presets with 10 detection areas per preset for large-scale temperature monitoring. With thermometric guard tour, you also don't have to control the camera manually every time you want to do a video tour of the premises. Instead, you can play the guard tour. You can play the guard tour on command and at scheduled times. 


TPM is short for Trusted Platform Module. A TPM is a component that provides a set of cryptographic features suitable for protecting information from unauthorized access. The private key is stored in the TPM and never leaves the TPM. All cryptographic operations requiring the use of the private key are sent to the TPM to be processed. This ensures that the secret part of the certificate remains safe even in the event of a security breach. 

trusted execution environment (TEE)

Trusted execution environment (TEE) provides hardware-based, tamper-protected storage of private, cryptographic keys and secure execution of cryptographic operations. Unlike secure element and TPM, the TEE is a secure, hardware-isolated area of the system-on-chip’s (SoC) main processor.

two-way audio

Two-way audio is a feature that enables devices to transmit and receive audio either acoustically or electronically. 



Universal Plug and Play is a protocol that allows Microsoft operating systems to automatically detect resources on a network.



VAPIX is a registered trademark and our own open application programming interface (API). It enables the integration of our products into a wide range of solutions and platforms.

Varifocal lens

A varifocal lens provides a wide range of focal lengths, as opposed to a lens with a fixed focal length, which only provides one. 

video management

A process of capturing and storing the videos produced by your cameras and other surveillance devices. Video management requires a video management system (VMS) like AXIS Camera Station where you can monitor and manage all your Axis surveillance devices. 

video operation

Using a video surveillance system involves several activities. We refer to these activities as video operations. Video operations include tasks such as managing and controlling video surveillance systems. An example of a video operation is storing video footage for security and surveillance purposes.


Video management software (VMS) is a central part of video management and is used to monitor, analyze, and record video from video encoders and network cameras.

voice enhancer

An algorithm that amplifies voice content relative to other sounds with the purpose of making speech more perceptible.


VoIP is short for voice over IP. It’s a group of technologies that enables voice communication and multimedia sessions over IP networks.


zero-trust networks

Zero trust is about not trusting anyone or anything by default. Connected devices and IT infrastructure such as networks, computers, servers, cloud services, and applications need to continually identify, validate and authenticate each other to achieve high security controls.


The Axis Zipstream technology preserves all the important forensic details in the video stream while lowering bandwidth and storage requirements by more than 50%. Zipstream includes intelligent algorithms, which ensure that relevant forensic information is identified, recorded, and sent in full resolution and frame rate.