Honeywell Security Vista 12 Intruder alarm system control panel
Technical Specification
- Make: Honeywell Security
- Model code: Vista 12
- Control Panels & Accessories: Yes
- Remote Keypad: LCD/LED
- Wireless: Yes
This hybrid panel offers 22 zones in total of which 16 zones can be wireless. Arming/disarming can be performed wireless by keyfobs. For controlling external equipment the Vista 12 is equipped with 2 outputs. These can be extended with max. 4 programmable relay-outputs or a X10 transmitter that can drive up to 16 X10 modules. This panel even gives you the possibility to define your own zone functions. Last but not least we should mention that you will find 4 programmable keys on the keypads.
Read more| Make | Honeywell Security |
|---|---|
| Manufacturer | Honeywell |
| Category | Intruder Alarms>Intruder alarm system control panels & accessories |
| Model code | Vista 12 |
| Control Panels & Accessories | Yes |
| Remote Keypad | LCD/LED |
| Wireless | Yes |
| Max No of RKPs | 4 keypads |
| No of Zones | 22 (max. 16 wireless zones) |
| No of User Codes | 16 user codes |
| No of Outputs | 2 (extendable 4 relay outputs) |
| Keypad Operated | Yes |
| Upload/ Download | Yes |
| Additional info |
This hybrid panel offers 22 zones in total of which 16 zones can be wireless. Arming/disarming can be performed wireless by keyfobs. For controlling external equipment the Vista 12 is equipped with 2 outputs. These can be extended with max. 4 programmable relay-outputs or a X10 transmitter that can drive up to 16 X10 modules. This panel even gives you the possibility to define your own zone functions. Last but not least we should mention that you will find 4 programmable keys on the keypads. |
Related Whitepapers
Nine ways to make your retail security system work harder
Security investments retailers should consider for their 2021 budget
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

