NACD TVTEL 2K/SM Access control system
Technical Specification
- Make: NACD
- Model code: TVTEL 2K/SM
- Standalone/ Networked/ PC: Standalone
Audio entry system and proximity reader, surface mount. Call log history. Full back-up and restore of system data using programs included in standard MS Windows in conjunction with TVTEL software program. Each primary telephone /extension number can have a 2nd telephone/extension number associated with it. Up to 6no call-buttons associated with Residents/Correspondents programmed into the scroll display can be added to the panel. For example: Caretaker button, Security button, etc. The TVTEL 2K/SVM has same specifications as above in addition includes integral infra-red camera.
Read more| Make | NACD |
|---|---|
| Manufacturer | NACD Limited |
| Category | Access Control>Access control systems & kits |
| Model code | TVTEL 2K/SM |
| Standalone/ Networked/ PC | Standalone |
| Additional info | Audio entry system and proximity reader, surface mount. Call log history. Full back-up and restore of system data using programs included in standard MS Windows in conjunction with TVTEL software program. Each primary telephone /extension number can have a 2nd telephone/extension number associated with it. Up to 6no call-buttons associated with Residents/Correspondents programmed into the scroll display can be added to the panel. For example: Caretaker button, Security button, etc. The TVTEL 2K/SVM has same specifications as above in addition includes integral infra-red camera. |
You might be interested in these products
- See other NACD products
- NACD Audio, video or keypad entry
Related Whitepapers
The critical role of access control in K-12 school security
The benefits of Edge AI + Cloud for security systems
Integrated access control: reap the benefits of connected security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
