Verex Monitor ISM Prime Intruder alarm system control panel
Technical Specification
- Make: Verex
- Model code: Monitor ISM Prime
- Series: Monitor ISM Series
- Control Systems & Kits: Yes
- Remote Keypad: LCD
The Monitor ISM sytem provides unparelleled flexibility in an expandable integrated system by allowing to start with the basics and add other modules as requirements changes. It provides intrusion detection combined with advanced false alarm reduction features. It also gives complete access control features for 16 doors and 32 readers, including sophisticated reporting features, 3 antipassback modes and much more. Prime system can support up to 128 points of intrusion, 16 doors and 1000 users on one site. Reader technology : Weigand, Magstripe, Proximity, Biometrics, Wireless.
Read more| Make | Verex |
|---|---|
| Manufacturer | VEREX Technology |
| Category | Intruder Alarms>Intruder alarm system control panels & accessories |
| Model code | Monitor ISM Prime |
| Series | Monitor ISM Series |
| Control Systems & Kits | Yes |
| Remote Keypad | LCD |
| Max No of RKPs | 1 keypads |
| No Event Logs | 1024 event logs |
| No of Zones | 16 |
| No of User Codes | 1000 user codes |
| No of Outputs | 4 |
| Keypad Operated | Yes |
| Additional info | The Monitor ISM sytem provides unparelleled flexibility in an expandable integrated system by allowing to start with the basics and add other modules as requirements changes. It provides intrusion detection combined with advanced false alarm reduction features. It also gives complete access control features for 16 doors and 32 readers, including sophisticated reporting features, 3 antipassback modes and much more. Prime system can support up to 128 points of intrusion, 16 doors and 1000 users on one site. Reader technology : Weigand, Magstripe, Proximity, Biometrics, Wireless. |
Related Whitepapers
Security investments retailers should consider for their 2021 budget
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download
