Bosch TC2075HL CCTV camera housing
Technical Specification
- Make: Bosch
- Model code: TC2075HL
- Housing Type: Camera Housings
- Indoor/Outdoor: Internal
- Mount Type: Corner mount
The TC2075HL is a secure corner-mount housing, which can be used with a manual or auto-iris lens, for security surveillance of confined areas. The distinctive design of TC2075HL makes it especially suitable for elevators, stairwells, vestibules, entrance lobbies, or mantraps. With the steel housing and a mastered cam lock, the TC2075HL is highly tamperproof. The LEXAN window is tough and mar-resistant. The TC2075HL meets fire code regulations that require unbroken firewalls.
Read more| Make | Bosch |
|---|---|
| Manufacturer | Bosch Security Systems |
| Category | CCTV>CCTV camera housings |
| Model code | TC2075HL |
| Housing Type | Camera Housings |
| Indoor/Outdoor | Internal |
| Mount Type | Corner mount |
| Environmental Specifications | Protection: Tamper Resistant |
| Housing Material | Stainless Steel |
| Physical Specifications |
Dimensions mm: 88.9 x 120.6 x 243.8 mm Weight g: 3 |
| Additional info | The TC2075HL is a secure corner-mount housing, which can be used with a manual or auto-iris lens, for security surveillance of confined areas. The distinctive design of TC2075HL makes it especially suitable for elevators, stairwells, vestibules, entrance lobbies, or mantraps. With the steel housing and a mastered cam lock, the TC2075HL is highly tamperproof. The LEXAN window is tough and mar-resistant. The TC2075HL meets fire code regulations that require unbroken firewalls. |
See comparison of Bosch TC2075HL with similar Bosch CCTV camera housings
Compare Bosch TC2075HL with CCTV camera housings from other manufacturers
- See other Bosch products
- Bosch IP Dome cameras
- Bosch Dome cameras
- Bosch CCTV cameras
- Bosch Intruder detectors
- Bosch IP cameras
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
