New line of network switches

July 2018 Infrastructure, Products & Solutions

UTC has announced the availability of four new network switches. These new products expand the company’s current line of network products to provide solutions for wide-temperature PoE-Ultra, 4-port IP over coax, lower cost non-PoE switching, and lower cost industrial PoE applications.

Products and features

NS3553-4P-1T-2S: 4-port industrial PoE ultra-managed switch

• 4-Port PoE Ultra – supports high power demand IP cameras.

• Wide temperature operation (-40 to 75°C).

• Support for newer TruVision IR PTZ cameras.

NS2052-8P-2C: 8-port unmanaged PoE at industrial switch with 2 SFP ports

• Low-cost PoE – at unmanaged switch.

• Wide temperature operation (-40 to 75°C).

• SFP uplinks.

NS3500-24T-4C: 24-port managed switch with 4 SFP ports

• Low-cost 24-port managed switch.

• Support for L3 static routing.

• SFP uplinks.

For more information, contact UTC Fire & Security, +27 11 579 7300, [email protected], www.firesecurityproducts.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Bosch sells product business to Triton
Bosch Building Technologies News & Events Products & Solutions Facilities & Building Management
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The division is set to focus on systems integration business in the future.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
Workforce management automation for Transguard
IoT & Automation Products & Solutions
Invixium and RTLS-connected worker solutions have been selected to supply 400 rugged biometric solution, IXM TITAN, for time tracking at work sites for Transguard Group, a subsidiary of Emirates Group.

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions Commercial (Industry)
Suprema has released its BioEntry W3 facial authentication access control device with multiple authentication options, including RFID cards as well as mobile credentials, designed for durability and resilience.

Read more...
Smarter ways to secure your space
Elvey Security Technologies Access Control & Identity Management Products & Solutions
Ensuring the safety of people and assets has become more crucial than ever, and access control systems provide essential tools to regulate and monitor who can enter specific areas or access sensitive resources.

Read more...
The rise of autonomous data recovery
Information Security Infrastructure
Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.

Read more...
Guarding data privacy
Suprema Access Control & Identity Management Products & Solutions
Suprema’s BioEntry W3 is designed with data privacy as a top priority, addressing concerns through its display-free design and highly secure ‘Template on Mobile’ (ToM) authentication, making data privacy a top priority.

Read more...
Can we really fight AI cybersecurity threats with more AI?
Information Security Infrastructure
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry but a pressing global concern

Read more...