Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Deciphering Security’s Alphabet Soup of Acronyms

Generic Image for Enterprise Services
October 23, 2012

 

Do you remember your first few weeks in the security industry, especially in its administration? What were the most confusing terms and acronyms for you to master? Well, we’ve been asking around for industry leaders to contribute their top acronyms for our alphabet soup so you can come back and reference what we mean by ASTM, HDIS and PIAM.

                                       

ASTM: ASTM, a standard test method, refers to the crash rating of a vehicle access perimeter barrier. 

1.       Small Passenger Car:  Car manufactured in the last 10 years weighing 2430 +/- 50 pounds.

2.       Pickup Truck:  A ¾-ton model manufactured within the last 10 years weighing 5070 +/- 100 pounds.

3.       Medium Duty Truck:  Truck with diesel engine having vehicle mass of 15,000 +/- 300 pounds.

4.       Heavy Goods Vehicle:  Tandem axle dump truck or tandem axle with drop axle truck, tested at 65,000 +/- 1300 pounds.

A car designation starts with “C,” the pick-up is a “P,” the medium duty truck gets “M,” and the heavy goods vehicle is “H.”  The number following the letter is the speed.  Thus, a “40” means the vehicle was tested at 38.0 to 46.9 mph.  An H30 designation defines a heavy-goods vehicle traveling at approximately 30 mph.  A C50 is a car travelling at 50 mph. Contributed by David Dickinson, Senior Vice President, Delta Scientific.

 

BOLO: “Be On the Lookout” is an abbreviation used in law enforcement, often referring to a broadcast bulletin or other communication about a possible suspect. These are also known as “all-points bulletins” (APB) or “attempts to locate” (ATL).  Contributed by Gadi Piran, President, OnSSI.

 

HDIS: High Definition Interactive Streaming involves supplying video to a Web-based device at high-definition (HD) resolution and including multiple streams, each of which may be displayed and controlled individually by the user with no compromise to resolution or video frame rate. Contributed by Gadi Piran, President, OnSSI.

 

IAM:  Identity and Access Management (IAM) systems let enterprises manage access physical and logical resources. Digital identities are assigned to individuals, and privileges and policies are assigned to those identities. So, for example, Ralph would get access to the building and his computer but not to the server room. Janet could access all computers in the building but needs different levels of authentication for the server room than for her computer.Contributed by Phil Scarfo, Lumidigm Vice President, Worldwide Sales & Marketing

 

IOC: Interactive Overlay Controls are video software system controls that are accessed by “mousing over” an icon of a device or other element being controlled. The control interface is only displayed if and when it is needed. Contributed by Gadi Piran, President, OnSSI.

 

NFC: Near Field Communication provides simplified transactions, data exchange and wireless connections between two devices that are in close proximity to each other.  NFC is expected to become widely used for making payments by smartphone. Many smartphones currently on the market already contain embedded NFC chips that can send encrypted data a short distance ("near field") to a reader located next to a retail cash register.  Shoppers who have their credit card information stored in their NFC smartphones can pay for purchases by tapping their smartphones on the reader. 

A smartphone or tabletwith an NFC chip also serves as keycardor ID card.  A smartphone can be used just like a smart card (or proximity card) – placed next to the reader and open a locked door. Contributed by Jeremy Earles, Portfolio Manager, Credentials and Readers, Ingersoll Rand Security Technologies.

 

PIAM:Physical Identity and Access Management is software used to centrally manage identities, creating a single identity for physical access control system cardholders across the entire enterprise. Integrated with logical ID systems, the software ensures timely, synchronized and policy-based enrollment and termination of physical access privileges across multiple security systems. Contributed by Quantum Secure.

 

Do you have an acronym you want defined? Or would you like to contribute a definition that you found especially confusing when you started out?

Add to the encyclopedia! Send us your definitions or requests in the comments section below, or email me directly at meyerc@bnpmedia.com.

KEYWORDS: NFC security definitions security terms

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Exclusives Feature Image

    3 Key Surveillance Storage Acronyms to Learn

    See More
  • My Brother's Table soup kitchen

    Massachusetts soup kitchen bolsters surveillance system

    See More
  • cyber6-900px.jpg

    Data Breach Report in Capital One Litigation Not Privileged

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Security of Information and Communication Networks

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing