Aritech 5815A-W acoustic glassbreak sensor
Technical Specification
- Make: Aritech
- Model code: 5815A-W
- Glassbreak Detectors: Yes
- Coverage/ Range m: 7.5
- Angle of Detection o: 360
The Sentrol 5812A Series ShatterPro™ II acoustic glassbreak sensor provides great false alarm immunity, fast installation testing, and a handclap feature that lets end-users confirm the sensor’s operational status. Using Sentrol’s patented Pattern Recognition Technology™, the sensor listens for actual patterns of breaking glass while eliminating most false alarm patterns. ShatterPro™ II sensors listen across the glassbreak frequency spectrum for greater false alarm immunity.
Read more| Make | Aritech |
|---|---|
| Manufacturer | Interlogix |
| Category | Intruder Alarms>Intruder detectors |
| Model code | 5815A-W |
| Glassbreak Detectors | Yes |
| Coverage/ Range m | 7.5 |
| Angle of Detection o | 360 |
| Power Consumption | 25 mA |
| Radius m | 7.5 |
| True Motion Recognition (TMR) | Yes |
| Mount Type | Ceiling, Wall |
| Wall/Ceiling Mount | Wall/Ceiling |
| Electrical Specifications | Power Supply: 9 ~ 16 V DC |
| Physical Specifications | Dimensions mm: 45 x 83 x 23 |
| Environmental Specifications | Operating Temp oC: -18 ~ +50 C (0 ~ 120 F) |
| Additional info | The Sentrol 5812A Series ShatterPro™ II acoustic glassbreak sensor provides great false alarm immunity, fast installation testing, and a handclap feature that lets end-users confirm the sensor’s operational status. Using Sentrol’s patented Pattern Recognition Technology™, the sensor listens for actual patterns of breaking glass while eliminating most false alarm patterns. ShatterPro™ II sensors listen across the glassbreak frequency spectrum for greater false alarm immunity. |
Related Whitepapers
Market Report: Cannabis at a glance
Optimise your business with analytics and AI
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

