OPTEX, the globally renowned company in sensing solutions, is pleased to announce the new InSight Visual Verification PIR Camera Series, an innovative PIR-based visual verification security solution for outdoor applications, combining highly effective OPTEX sensing technology with a camera.

The InSight Visual Verification PIR Camera Series will not be affected by elements, such as lights, wind, rain, or snow, and can minimise false alarms with its feature to tolerate small animals and effectively reduce nuisance alarms.

InSight Visual Verification PIR Camera Series

The InSight series is ONVIF compliant, featuring stable and reliable OPTEX QX Infinity and HX-80N sensors

The new InSight Visual Verification PIR Camera Series will also simplify the installation process by matching the camera and sensor field of views, while providing wide and narrow detection range options.

The InSight series is ONVIF compliant, featuring stable and reliable OPTEX QX Infinity and HX-80N sensors, and is able to connect directly to the OPTEX Visual Verification Bridge, as well as any DVR, NVR, or VMS.

Available models

Available models of the new InSight Visual Verification PIR Camera Series include:

  • INS-QXI-ST
  • INS-HX-80N

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...