Check out our special report on casino security
360 Vision Technology launch IP versions of the Predator Team!
Product Profile
360 Vision Technology are pleased to announce the immediate launch of IP versions of all of their highly successful Predator product range.
IP versions include 18x and 36x as well as the stunning, ultra low light, 28x variant. In addition, an IP version of the Predator TC Thermal offers IP connectivity to the unique dual analogue/thermal Predator with IR.
In addition, and to complement the entire range, a new, high powered IR option is available through the range to increase further the zero light capability of this range.
Technical Specification
| Make | 360 Vision |
|---|---|
| Manufacturer | 360 Vision Technology Ltd |
| Category | CCTV>IP Dome cameras |
| Model code | PREDATOR IP |
| Chip Inch Size | 1/4 inch |
| Colour Type | Colour / Monochrome |
| Resolution TVL | 520 |
| Sensitivity lux | 0.01 |
| Dome Type | Continuous Rotation |
| Pan Speed o/ sec | 0.1 ~ 120 o/ sec pan speed |
| Tilt Speed o/ sec | 0.1 ~ 120 o/ sec tilt speed |
| Indoor/Outdoor | Outdoor |
| Electrical Specifications | Voltage: 24 V AC |
| Rotation Angleso | 360 |
| Presets | 360 |
| S/ N (Signal/ Noise) Ratio dB | 50 |
| Signal Mode | PAL / NTSC |
| Video Output | 1 Vp-p, 75 ohms |
| Zoom Ratio | x36 optical, x12 digital |
| Environmental Specifications |
Operating Temp oC: -20 ~ +50 Protection: IP67 |
| Additional info |
4 stream D1 IP. Multi Platform Control. 18x, 28x 36x Zoom
|
See comparison of 360 Vision PREDATOR IP with similar 360 Vision IP Dome cameras
Compare 360 Vision PREDATOR IP with IP Dome cameras from other manufacturers
You might be interested in these products
Related Whitepapers
14 success stories about how video technology is improving city life
Empowering cameras with AI
The rise of ethical facial recognition
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

