Best Home Security Companys

121 Companies 8,606 Real Customer Reviews

Home Security Glossary

glossary image (7)

 

Welcome to the Home Security GlossaryPage! Here we have defined some of the most commonly used terms involved with home security. Click on any of the terms below for its definition. Don’t see a term that you’d like us to define? Contact Us, and we’ll be sure to take a look at it!



Alarm Event


Arm


Automation


Automated Security


Bandwidth


Battery Back-Up


Break-In


Burglary


Burglar Alarm


Call Verification


Carbon Monoxide Detector


Camera


Closed Circuit Television


Control Panel


Cyber Security


Deadbolt/Deadlock


Door Alarm


Door Contact


Double Cyclinder Lock


Electric Gate


Electronic Surveillance


Emergency Phone


Emergency Response


Fire Alarm


Flood Detector


Glass Break Sensor


Heat Detectors


Home Alarm


Identity Theft


Internet Alarm Monitoring


Keypad


Larceny


Master Code


Master Alarm


Mobile Apps


Monitoring


Motion Sensor Light


Outdoor Surveillance


Panic Button


Panic Room


Personal Alarm


Phone Activation


Power Supply


Remote Home Security


Router


Security System


Smoke Detector


Spy Camera


Surveillance System


Temperature Sensor


Two-Way Communication


User Code


Wireless



Alarm Event:

Event triggered by a security device that is transmitted to control panel if emergency has occurred

Back to Top

Arm

Turning the security system on

Back to Top

Automation

Home automation allows users to have remote or automatic control of lights, appliances, thermostats, doors, locks, etc in their home

Back to Top

Automated Security

When there is unauthorized access to a property where an alarm is set, an immediate alert will be sent to the owner

Back to Top

Bandwidth

Capacity of transmission platform stated in bits per second

Back to Top

battery Back-Up

A secondary source of power to keep the security system online if the original power source goes out

Back to Top

Break-In

When an unauthorized individual illegally enters a home, car, or other private property without permission

Back to Top

Burglary

Illegal entry into a building or residence with the intent to commit a crime, most often times, theft

Back to Top

Burglar Alarm

Loud sounding device to prevent unauthorized personnel from entering a property while alerting those around that illegal activity may be going on

Back to Top

Call Verification

A form of verification that allows monitoring personnel to call in to verify if the alarm is valid

Back to Top

Carbon Monoxide Detector

A device that monitors and detects levels of CO gas to prevent poisoning

Back to Top

Camera

Technology that monitors activity that can be accessed in both live or recorded settings

Back to Top

Closed Circuit Television

A form of surveillance that monitors different environments based on user settings

Back to Top

Control Panel

The main source of control that operates and controls the security system

Back to Top

Cyber Security

Software or technology that keeps computers and users safe while online

Back to Top

Deadbolt/Deadlock

A lock or latch that sits on the edge of a door and is inserted into the keyhole to add an extra layer of protection on a door

Back to Top

Door Alarm

Loud device that goes off when unauthorized personnel trigger it and alerts those around of possible illegal entrance

Back to Top

Door Contact

Device that sends notifications to a security system each time a door opens

Back to Top

Double Cyclinder Lock

Requires a key on both sides of the door, often times found on glass door

Back to Top

Electric Gate

An electrically powered gate

Back to Top

Electronic Surveillance

Electronically monitors activity or charging information remotely

Back to Top

Emergency Phone

A phone specifically designated to make calls that request emergency services

Back to Top

Emergency Response

Any time an ambulance, police, fire department, or other emergency responder come for assistance

Back to Top

Fire Alarm

Detects the first sign of fire and monitors other environmental changes; a loud alarm will also usually sound

Back to Top

Flood Detector

Detects the presence of water

Back to Top

Glass Break Sensor

Detects if a pane of glass has been shattered or broken which will set off the alarm

Back to Top

Heat Detectors

Monitors any changes in ambient temperature

Back to Top

Home Alarm

Device that when triggered warns of intruders, fires, or other environmental danger

Back to Top

Identity Theft

When someone else assumes the identify of another individual with criminal intent

Back to Top

Internet Alarm Monitoring

Alarm communication that utilizes ethernet connection to send an alarm signal over the internet from the control panel to a central monitoring station

Back to Top

Keypad

Device with buttons to arm or disarm alarm system

Back to Top

Larceny

When one takes another person’s personal property without consent

Back to Top

Master Code

User code for security system that allows additional privileges

Back to Top

Medical Alarm

Alarm system that is designed to protect individuals requiring urgent attention with the touch of a button

Back to Top

Mobile Apps

Applications that can be downloaded for monitoring and control purposes

Back to Top

Monitoring

Device or technology used for observing, checking, or keeping a continuous record

Back to Top

Motion Sensor Light

A light that shines when movement is detected

Back to Top

Outdoor Surveillance

Monitors activity surrounding a residence or commercial building

Back to Top

Panic Button

Button that when pressed triggers an alarm and alerts authorities

Back to Top

Panic Room

Room designated to provide a safe shelter in the event of an emergency

Back to Top

Personal Alarm

Personal device that sounds when activated

Back to Top

Phone Activation

Arms or disarms home security system over the phone remotely

Back to Top

Power Supply

Device that supplies electrical energy to an output load

Back to Top

Remote Home Security

Monitors security system and other technology from another location

Back to Top

Router

Devices that allows IP address routing, network address translation, and other functions

Back to Top

Security System

Electrical device that sounds an alarm while simultaneously alerts authorized personnel in the event of an emergency

Back to Top

Smoke Detector

Device that is used when a level of smoke is detected

Back to Top

Spy Camera

Hidden camera used to film people without their knowing

Back to Top

Surveillance System

Electronic system used for close observation of certain areas

Back to Top

Temperature Sensor

Device that is used to collect temperature data and is transmitted to the observer

Back to Top

Two-Way Communication

Communication that takes place through a device between monitoring personnel and residents

Back to Top

User Code

A combination that allows users to arm or disarm a security system

Back to Top

Window Lock

Lock that is hung on a window to keep it from being pried open

Back to Top

Wireless

System that does not require drilling to activate

Back to Top

Recently Reviewed:

Want Us to Review a Company?

If there is a home security company that you don't see on our site, and would like us to review, please contact us.

REAL REVIEWS (YES THEY’RE REAL)

With so many home security companies out there, and a lack of sites willing to bring you the HONEST breakdowns of each company, what source can you turn to for the real information you can trust?

We are dedicated to bringing the truth out, and rank home security companies as they should be. Through our investigation, and experience with each company, we rank each company, and bring you our honest, unbiased opinion. We also include authentic user reviews by past customers of each company that are moderated and verified.

Like many sites, we are compensated through affiliate relationships with each company we review, however all of our rankings are based on our 9-Point Ranking Criteria.

All reviews are subject to moderation and approval. Any reviews that may resemble false information, or competitors of another company will need to be verified by our staff before being approved and published. We reserve the right to approve or deny any reviews left on this site.