Esser SCM 2000 Intruder detector
Technical Specification
- Make: Esser
- Model code: SCM 2000
- PIR Detectors: Yes
- Coverage/ Range m: 50
- Power Consumption: 6.5
The SCM 2000 PIR system series conforms to VdS class B. It is equipped with mirror optics. The SCM 2000 is designed for high tamper security and high detection sensitivity. There are two different options for connection: Conventional connection technology with FAI logic; BUS-1 connection technology (three-wire). The SCM 2000 is available in three different optical systems, allowing it to be matched to the dimensions of the room: area optics for monitoring rooms with a size of up to 12m x 12m; route optics for monitoring corridors; curtain optics for monitoring climbing through areas.
Read more| Make | Esser |
|---|---|
| Manufacturer | Esser |
| Category | Intruder Alarms>Intruder detectors |
| Model code | SCM 2000 |
| PIR Detectors | Yes |
| Coverage/ Range m | 50 |
| Power Consumption | 6.5 |
| Temperature Compensation | Yes |
| Electrical Specifications | Power Supply: 9 ~ 15 |
| Physical Specifications | Dimensions mm: 57 x 138 x 49 |
| Environmental Specifications | Operating Temp oC: -10 ~ +50 |
| Additional info | The SCM 2000 PIR system series conforms to VdS class B. It is equipped with mirror optics. The SCM 2000 is designed for high tamper security and high detection sensitivity. There are two different options for connection: Conventional connection technology with FAI logic; BUS-1 connection technology (three-wire). The SCM 2000 is available in three different optical systems, allowing it to be matched to the dimensions of the room: area optics for monitoring rooms with a size of up to 12m x 12m; route optics for monitoring corridors; curtain optics for monitoring climbing through areas. |
Related Whitepapers
Market Report: Cannabis at a glance
Optimise your business with analytics and AI
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
