Vicon VZN-16-6TBV8-RK 6 TB rack mount network video recorder preconfigured with ViconNet software
Technical Specification
- Make: Vicon
- Model code: VZN-16-6TBV8-RK
- Recording Mode: Real Time / Timelapse / Event
- Video inputs: 16
- Recording system: HDD
Vicon VZN-16-6TBV8-RK are high-capacity network video recorders that enables uses to simultaneously capture, view and store high-quality, high resolution voice, video and data for a comprehensive security solution. The NVR provide scalable, internal storage for small, medium and large-scale installations.
Read more| Make | Vicon |
|---|---|
| Manufacturer | Vicon Industries |
| Category | CCTV>Network video recorders (NVRs) |
| Model code | VZN-16-6TBV8-RK |
| Recording Mode | Real Time / Timelapse / Event |
| Video inputs | 16 |
| Recording system | HDD |
| Storage capacity | 6 TB |
| Operating system | Microsoft® Windows® 7 Embedded |
| Electrical Specifications |
Voltage: 105 ~ 240 V AC Power consumption (W): 76 W |
| Physical Specifications |
Weight (kg): 8.3 Dimensions (mm): 44 x 483 x 394 |
| Environmental Specifications |
Operating temperature (°C): 0 ~ 40 C (32 ~ 104 F) Operating humidity (%): 95 |
| Additional info | Vicon VZN-16-6TBV8-RK are high-capacity network video recorders that enables uses to simultaneously capture, view and store high-quality, high resolution voice, video and data for a comprehensive security solution. The NVR provide scalable, internal storage for small, medium and large-scale installations. |
You might be interested in these products
- See other Vicon products
- Vicon IP Dome cameras
- Vicon Access control controllers
- Vicon CCTV camera mounts
- Vicon IP cameras
- Vicon Dome cameras
Related Whitepapers
Making sense of today’s security camera options
Designing video management systems using H.265
Sinaloa, Mexico: Connected cities are safer cities
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
