Tecom Jetstream IP Access control system
Technical Specification
- Make: Tecom
- Model code: Jetstream IP
- Accessories: Ethernet Protocol Alarm Receiver
The Jetstream IP is designed to assist corporations using Tecom Challenger integrated access and alarm system for off-site monitoring of alarms. Jetstream IP allows additional new Challenger panels to automatically enrol, or add themselves, and their basic details without operator intervention. Jetstream IP allows corporations to utilise their existing Ethernet resources to connect Challengers in LAN or WAN configurations while conveying only the Contact ID event to the remote monitoring station. Jetstream IP is supplied for systems up to 20 sites/100 sites/300 sites/enterprises over 300 sites. Jetstream IP runs on Linux operating system.
Read more| Make | Tecom |
|---|---|
| Manufacturer | Interlogix |
| Category | Access Control>Access control systems & kits |
| Model code | Jetstream IP |
| Accessories | Ethernet Protocol Alarm Receiver |
| Additional info | The Jetstream IP is designed to assist corporations using Tecom Challenger integrated access and alarm system for off-site monitoring of alarms. Jetstream IP allows additional new Challenger panels to automatically enrol, or add themselves, and their basic details without operator intervention. Jetstream IP allows corporations to utilise their existing Ethernet resources to connect Challengers in LAN or WAN configurations while conveying only the Contact ID event to the remote monitoring station. Jetstream IP is supplied for systems up to 20 sites/100 sites/300 sites/enterprises over 300 sites. Jetstream IP runs on Linux operating system. |
You might be interested in these products
Related Whitepapers
The critical role of access control in K-12 school security
The benefits of Edge AI + Cloud for security systems
Integrated access control: reap the benefits of connected security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download