Vanderbilt PRO-E-18WH outdoor passive infra red detector
Technical Specification
- Make: Vanderbilt
- Model code: PRO-E-18WH
- Series: External Motion detector
- PIR Detectors: Yes
- Dual/ Quad Technology: Dual Technology Detectors
The PRO-E-18WH is suitable for outdoor applications requiring a medium range curtain view. The detector has a universal mounting facility for walls or poles. Sophisticated tamper detection provides a secure method of external detection. The detector has an internal cable management system. The detector has quick set up function, with options for additional settings. Heater version for harsh environments.
Read more| Make | Vanderbilt |
|---|---|
| Manufacturer | Vanderbilt Industries |
| Category | Intruder Alarms>Intruder detectors |
| Model code | PRO-E-18WH |
| PIR Detectors | Yes |
| Dual/ Quad Technology | Dual Technology Detectors |
| Infra Red Beams | Yes |
| Coverage/ Range m | 27 x 30 |
| Angle of Detection o | 90 |
| Dual Element Sensor | Yes |
| Anti-Masking | Yes |
| Mount Type | Wall, Pole |
| Indoor/Outdoor | Outdoor |
| Wall/Ceiling Mount | Wall |
| Electrical Specifications | Power Supply: 10.5 ~ 30 V DC , 24 V AC |
| Physical Specifications | Dimensions mm: 358 x 188 x 290 |
| Environmental Specifications | Operating Temp oC: -20 ~ +60 C (-4 ~ +140 F) |
| Additional info |
The PRO-E-18WH is suitable for outdoor applications requiring a medium range curtain view. The detector has a universal mounting facility for walls or poles. Sophisticated tamper detection provides a secure method of external detection. The detector has an internal cable management system. The detector has quick set up function, with options for additional settings. Heater version for harsh environments. |
Related Whitepapers
10 top insights in access, cloud and more
Schooling the market on education security
Market Report: Cannabis at a glance
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
