Esser 5008 Intruder alarm system control panel
Technical Specification
- Make: Esser
- Model code: 5008
- Control Panels & Accessories: Yes
- No Event Logs: 1000 event logs
- No of Zones: 512
Microprocessor-controlled loop intrusion and hold-up computer for high-security services for private and commercial use, in compliance with the VdS guidelines of VdS class C. Modular extension by up to 1500 detector zones possible. Suitable for a maximum of 48 freely configurable protection sectors. The freely programmable detector zones may be used as intrusion, hold-up, sabotage, technical alarm, fire and lock detector zones. An operating panel (384752) with a 2 x 20 digit alphanumeric LCD display can be fitted in the front door.
Read moreMake | Esser |
---|---|
Manufacturer | Esser |
Category | Intruder Alarms>Intruder alarm system control panels & accessories |
Model code | 5008 |
Control Panels & Accessories | Yes |
No Event Logs | 1000 event logs |
No of Zones | 512 |
Physical Specifications | Dimensions mm: 488 x 625 x 210 |
Environmental Specifications | Operating Temp oC: 0 ~ +50 |
Additional info | Microprocessor-controlled loop intrusion and hold-up computer for high-security services for private and commercial use, in compliance with the VdS guidelines of VdS class C. Modular extension by up to 1500 detector zones possible. Suitable for a maximum of 48 freely configurable protection sectors. The freely programmable detector zones may be used as intrusion, hold-up, sabotage, technical alarm, fire and lock detector zones. An operating panel (384752) with a 2 x 20 digit alphanumeric LCD display can be fitted in the front door. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Security investments retailers should consider for their 2021 budget
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download