GVD C100-DVR/IOM/ACS CCTV transmission system with complete user privilege control
Technical Specification
- Make: GVD
- Model code: C100-DVR/IOM/ACS
- Interface: 1000Mb/s x 2 Ethernet
- Dimensions mm: 371 x 304 x 43
- Power Consumption: 180 W
Web browser access from anywhere anytime. Complete user privilege control down to every device/event level. Seamless integration between video systems, access control systems and other third party subsystems. Consistent and powerful user interface to manage disparate security subsystems. Point-and-click operations for most daily surveillance operations. Intuitive operations reduce user training significantly. Alarm interaction and event actions cross different systems. Complete user privilege control down to every device/event level.
Read more| Make | GVD |
|---|---|
| Manufacturer | GVD Europe |
| Category | CCTV>Analogue Transmission |
| Model code | C100-DVR/IOM/ACS |
| Network Properties | Interface: 1000Mb/s x 2 Ethernet |
| Physical Specifications | Dimensions mm: 371 x 304 x 43 |
| Electrical Specifications | Power Consumption: 180 W |
| Additional info | Web browser access from anywhere anytime. Complete user privilege control down to every device/event level. Seamless integration between video systems, access control systems and other third party subsystems. Consistent and powerful user interface to manage disparate security subsystems. Point-and-click operations for most daily surveillance operations. Intuitive operations reduce user training significantly. Alarm interaction and event actions cross different systems. Complete user privilege control down to every device/event level. |
More GVD Analogue Transmission
- See other GVD products
- GVD Network video recorders (NVRs)
- GVD Telemetry transmitters and controllers
Related Whitepapers
Security investments retailers should consider for their 2021 budget
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download