Esser SCM 3000 Intruder detector
Technical Specification
- Make: Esser
- Model code: SCM 3000
- PIR Detectors: Yes
- Coverage/ Range m: 50
- Power Consumption: 100
The SCM 3000 system series conforms to VdS class C. It is equipped with mirror optics. Precise optics and sophisticated sensor electronics with temperature compensation create the highest degree of detection and tamper security. The cover monitoring system (up to 20cm range), integrated in the SCM 3000, informs the operator of possible sabotage before a criminal act is committed. There are three different options for connection: Conventional connection technology with FAI logic; BUS-1 connection technology (three-wire); BUS-2 connection technology (three-wire).
Read moreMake | Esser |
---|---|
Manufacturer | Esser |
Category | Intruder Alarms>Intruder detectors |
Model code | SCM 3000 |
PIR Detectors | Yes |
Coverage/ Range m | 50 |
Power Consumption | 100 |
Temperature Compensation | Yes |
Electrical Specifications | Power Supply: 9 ~ 15 |
Physical Specifications | Dimensions mm: 57 x 138 x 49 |
Environmental Specifications | Operating Temp oC: -10 ~ +50 |
Additional info | The SCM 3000 system series conforms to VdS class C. It is equipped with mirror optics. Precise optics and sophisticated sensor electronics with temperature compensation create the highest degree of detection and tamper security. The cover monitoring system (up to 20cm range), integrated in the SCM 3000, informs the operator of possible sabotage before a criminal act is committed. There are three different options for connection: Conventional connection technology with FAI logic; BUS-1 connection technology (three-wire); BUS-2 connection technology (three-wire). |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Market Report: Cannabis at a glance
Optimise your business with analytics and AI
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download