Hanwha Techwin America SIC-0400 intruder alarm system control panel & accessory with bell output and buzzer indication
Technical Specification
- Make: Hanwha Vision
- Previously known as: Samsung
- Model code: SIC-0400
- Control Systems & Kits: Yes
- Tamper: Yes
4 programmable wired zones. 6 alarm telephone numbers : 2 for receiving centre and 4 for private telephones. Communication protocol : ADMECO 4+1/contact ID. Remote control through telephone. Bell output, buzzer indication. Bell callback function. Three passwords : 1 user code +1 duress code +1 operation password. 250 events record. System Self-checking. Bypass direction. Anti-tamper function of control panel. Malfunction alarms for AC power loss, battery low-voltage and telephone line loss.
Read more| Make | Hanwha Vision |
|---|---|
| Manufacturer | Hanwha Vision Europe (formerly Hanwha Techwin Europe) |
| Previously known as | Samsung |
| Category | Intruder Alarms>Intruder alarm system control panels & accessories |
| Model code | SIC-0400 |
| Control Systems & Kits | Yes |
| Tamper | Yes |
| No Event Logs | 250 event logs |
| No of Zones | 4 |
| Physical Specifications | Dimensions mm: 218.5 x 149.5 x 39 |
| Environmental Specifications | Operating Temp oC: -10 ~ +55 |
| Additional info | 4 programmable wired zones. 6 alarm telephone numbers : 2 for receiving centre and 4 for private telephones. Communication protocol : ADMECO 4+1/contact ID. Remote control through telephone. Bell output, buzzer indication. Bell callback function. Three passwords : 1 user code +1 duress code +1 operation password. 250 events record. System Self-checking. Bypass direction. Anti-tamper function of control panel. Malfunction alarms for AC power loss, battery low-voltage and telephone line loss. |
Related Whitepapers
Security investments retailers should consider for their 2021 budget
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
