CORTEX A5 AUGUST CAT PT - Flipbook - Page 20
CORTEX
4K FULLY ENCRYPTED CAMERAS
4K ENCRYPTED TURRET FIXED
2.8MM
25M
12V DC
LENS
IR RANGE
STARVIS
STARVIS
DSP
Image Sensor
Resolution
IP 66
WATERPROOF
KEY FEATURES
NON SONY STARVIS
4K CODE
C-TUR-4K-CR-FW
94.5MM
X
76MM
COLOUR
WHITE
DIMS
94.5x76mm
1/2.8" SONY Starvis
Back-illuminated CMOS sensor
DWDR/3DNR
OSD menu
IR-Cut filter
IP66
VIDEO ENCRYPTION - 256 BIT
AES ENCRYPTION BUILT-IN, WHEN USED
WITH CORTEX NVRS
Fullhan-FH8556
Sony - IMX335
8MP
CABLE MANAGEMENT
WALL BRACKET
DEEP BASE
CODE
CODE
C-RING-4KL-FW
BK-4KL-FW
4K ENCRYPTED TURRET VARIFOCAL
30M
30M
2.8-12MM
12V DC
IR RANGE
STARVIS
IP 66
WATERPROOF
CABLE MANAGEMENT
NON SONY STARVIS
DEEP BASE
STARVIS
DSP
Image Sensor
Resolution
LENS
120MM
X
98MM
CODE
C-RING-4KL-VW
Fullhan-FH8556
Sony - IMX335
8MP
4K CODE
COLOUR
C-TUR-4K-CR-VFW WHITE
DIMS
120X98mm
WALL BRACKET
CODE
C-BK-4KL-VW
VIDEO ENCRYPTION - 256 BIT
AES ENCRYPTION BUILT-IN, WHEN USED
WITH CORTEX NVRS
SPECIFIC THREATS TO NON-ENCRYPTED NETWORKS
• NETWORK SNIFFING (EAVESDROPPING):
An adversary with access to the same computer can capture
sensitive & critical data. EASILY compromised if not protected.
• NETWORK SPOOFING (RESOURCE INTEGRITY):
A malicious computer can inpersonate network resources - luring
the other part to expose sensitive information and/or alter data (integrity).
• MAN-IN THE MIDDLE - (INFORMATION INTEGRITY):
An adversary that is able to redirect and intercept trafic - has the ability to alter
communication between two parties.
20
Sales Line: (023) 92 488300 Email: sales@cortexintegrated.com www.cortexintegrated.com