Eagle Eye Networks Location Setup Fee Bridge 301
Product colour: Black
Video input channels: 15 channels
Ethernet interface type: Gigabit Ethernet
Power supply type: AC, AC input voltage: 100-240 V, Power consumption (typical): 80 W
Width: 430 mm, Depth: 310 mm, Height: 50 mmWHAT IS THE EAGLE EYE CLOUD VMS? The Eagle Eye Security Camera VMS is a fully managed cloud video surveillance solution, delivering an end - to - end video management system that’s simple to deploy and easy to use. It supports all modern browsers and works on Windows, Mac, even Linux with no plugins to install. FULLY MOBILE View video anytime, anywhere. The fully functional iOS and Android applications provide complete access to live and recorded video and can also be used to install, configure and manage the system. GOT CLOUD? Eagle Eye Networks provides a cloud based, video management system. The Eagle Eye Bridge is installed on - site, connects to your cameras, records video locally, and then securely synchronizes both video and meta data to the Eagle Eye Cloud Data center. It’s a robust, secure appliance specifically designed to overcome the demands of transmitting high - resolution video through the Internet. COMPREHENSIVE CAMERA SUPPORT At Eagle Eye Networks we believe camera compatibility is important. There’s no need to be locked into a single camera vendor. Businesses need the flexibility to work with the cameras that they choose. Eagle Eye Bridges and CMVRs support ONVIF Profile S IP cameras. Eagle Eye Combo Bridges and CMVRs support IP as well as NTSC and PAL analog cameras. For an up to date list of all compatible cameras visit www.een.com/cameras. WORRY FREE MANAGEMENT All of the software in the Eagle Eye Cloud and firmware on the Eagle Eye Bridge is managed and updated by Eagle Eye Networks. The hardware is fully backed by Eagle Eye with full replacement if anything ever goes wrong. SECURITY SIMPLIFIED With Eagle Eye Complete Privacy Encryption TM , video is fully encrypted during transmission and at rest. The Eagle Eye Bridge has no open ports to the Internet, eliminating security vulnerabilities commonly found in other systems and requiring no router or firewall adjustments.
Se mere