Bosch ISA-WM-869 intruder detector with eight detection layers
Technical Specification
- Make: Bosch
- Model code: ISA-WM-869
- PIR Detectors: Yes
- Coverage/ Range m: 12 x 12
- Pet Tolerance: Yes
Can be used as external daily button for a Carephone. Important ray density: 79 zones in eight direction levels. Pet immunity through look-down zone film. Remote walk test. 869 MHz RF transmission provides reliable long-range communication with high security and long battery life. First Step processing (FSP), flexible mounting options, and temperature compensation. Eight detection layers including look-down zones. Externally-visible LED indicates test status.
Read more| Make | Bosch |
|---|---|
| Manufacturer | Bosch Security Systems |
| Category | Intruder Alarms>Intruder detectors |
| Model code | ISA-WM-869 |
| PIR Detectors | Yes |
| Coverage/ Range m | 12 x 12 |
| Pet Tolerance | Yes |
| Indoor/Outdoor | Indoor |
| Electrical Specifications | Power Supply: 2.3 ~ 3 V DC |
| Physical Specifications | Dimensions mm: 122 x 62 x 52 |
| Environmental Specifications | Operating Temp oC: -10 ~ +55 |
| Additional info | Can be used as external daily button for a Carephone. Important ray density: 79 zones in eight direction levels. Pet immunity through look-down zone film. Remote walk test. 869 MHz RF transmission provides reliable long-range communication with high security and long battery life. First Step processing (FSP), flexible mounting options, and temperature compensation. Eight detection layers including look-down zones. Externally-visible LED indicates test status. |
- See other Bosch products
- Bosch IP Dome cameras
- Bosch Dome cameras
- Bosch CCTV cameras
- Bosch IP cameras
- Bosch Network video recorders (NVRs)
Related Whitepapers
Market Report: Cannabis at a glance
Optimise your business with analytics and AI
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

