Bosch ISC-BDL2-WP12G blue line gen2 tritech motion detector
Technical Specification
- Make: Bosch
- Model code: ISC-BDL2-WP12G
- PIR Detectors: Yes
- Infra Red Beams: Yes
- Coverage/ Range m: 12 x 12
The Blue Line Gen2 TriTech motion detectors use a combination of passive infrared (PIR) and microwave detection technologies with advanced signal processing. The pet-friendly (-WP) models generate alarms for human intruders without generating false alarms for pets. Some of its functions include wall-to-wall coverage, self-locking enclosure, sealed optics and electronics as well as first step processing.
Read more| Make | Bosch |
|---|---|
| Manufacturer | Bosch Security Systems |
| Category | Intruder Alarms>Intruder detectors |
| Model code | ISC-BDL2-WP12G |
| PIR Detectors | Yes |
| Infra Red Beams | Yes |
| Coverage/ Range m | 12 x 12 |
| Microwave | Yes |
| Pet Tolerance | Yes |
| Power Consumption | 10 mA |
| Sealed Optics | Yes |
| Mount Type | Surface, Semi-Flush |
| Electrical Specifications | Power Supply: 9 ~ 15 V DC |
| Physical Specifications | Dimensions mm: 105 x 61 x 44 |
| Environmental Specifications | Operating Temp oC: -30 ~ +55 C (-22 ~ +130 F) |
| Additional info | The Blue Line Gen2 TriTech motion detectors use a combination of passive infrared (PIR) and microwave detection technologies with advanced signal processing. The pet-friendly (-WP) models generate alarms for human intruders without generating false alarms for pets. Some of its functions include wall-to-wall coverage, self-locking enclosure, sealed optics and electronics as well as first step processing. |
- See other Bosch products
- Bosch IP Dome cameras
- Bosch Dome cameras
- Bosch CCTV cameras
- Bosch IP cameras
- Bosch Network video recorders (NVRs)
Related Whitepapers
Market Report: Cannabis at a glance
Optimise your business with analytics and AI
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

