Bosch ISC-BDL2-W12H PIR/microwave detector
Technical Specification
- Make: Bosch
- Model code: ISC-BDL2-W12H
- PIR Detectors: Yes
- Dual/ Quad Technology: Dual Technology Detectors
- Coverage/ Range m: 12 x 12
Bosch ISC-BDL2-W12H uses a combination of passive infrared (PIR) and microwave detection technologies with advanced signal processing. Flexible mounting height reduces installation time and false alarms as well as improves catch performance. The Microwave Noise Adaptive processing feature reduces false alarms from repetitive sources. For use in France and UK.
Read more| Make | Bosch |
|---|---|
| Manufacturer | Bosch Security Systems |
| Category | Intruder Alarms>Intruder detectors |
| Model code | ISC-BDL2-W12H |
| PIR Detectors | Yes |
| Dual/ Quad Technology | Dual Technology Detectors |
| Coverage/ Range m | 12 x 12 |
| Microwave | Yes |
| Power Consumption | 10 mA |
| Dual Element Sensor | Yes |
| Temperature Compensation | Yes |
| Sealed Optics | Yes |
| Wall/Ceiling Mount | Wall/Ceiling |
| Electrical Specifications | Power Supply: 9 ~ 15 V DC |
| Physical Specifications | Dimensions mm: 150 x 61 x 44 |
| Environmental Specifications | Operating Temp oC: -30 ~ +55 C (-22 ~ +131 F) |
| Additional info | Bosch ISC-BDL2-W12H uses a combination of passive infrared (PIR) and microwave detection technologies with advanced signal processing. Flexible mounting height reduces installation time and false alarms as well as improves catch performance. The Microwave Noise Adaptive processing feature reduces false alarms from repetitive sources. For use in France and UK. |
- See other Bosch products
- Bosch IP Dome cameras
- Bosch Dome cameras
- Bosch CCTV cameras
- Bosch IP cameras
- Bosch Network video recorders (NVRs)
Related Whitepapers
Market Report: Cannabis at a glance
Optimise your business with analytics and AI
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

