eufy Security Floodlight Camera E340 Wired, 360° Pan and Tilt, 24/7 Recording, Dual-Band Wi-Fi, 2,000 Lumens, Motion-Activated, Dual Camera, HomeBase 3 Compatible, Local Storage, No Monthly Fee
  •  
  • $219.99 
  • $468.99
  • Price alert
    Shop it at NeweggBusiness.

    eSecure OEM 2 × 4MP Dual-Directional No-Splicing AI Network Camera, Deep Learning, 2.8mm Fixed Lens Security IP PoE Multi-Sensor Face Detection SMD IP67 IK10

    • [SMD 3.0] can categorize the targets that trigger motion detection and filter the motion detection alarm triggered by non-concerned targets to realize effective and accurate alarm.
    • [Perimeter Protection] technology can recognize human and vehicle accurately.
    • [People Counting] technology can track and process moving human body targets to realize the accurate statistics of enter No., leave No., and In Area No. Working with management platform, it outputs reports to meet your requirements.
    • [Face Detection] technology supports detecting, tracking, capturing, and selecting the best face image, and then outputs face snapshot.
    • [Cyber Security] technologies employ security authentication and authorization, access control protocols, trusted protection, encrypted transmission and encrypted storage.
    +
    +
    Overview
    Reviews
    avatar

    Any questions? Our AI beta will help you find out quickly.

    [SMD 3.0] can categorize the targets that trigger motion detection and filter the motion detection alarm triggered by non-concerned targets to realize effective and accurate alarm.
    [Perimeter Protection] technology can recognize human and vehicle accurately.
    [People Counting] technology can track and process moving human body targets to realize the accurate statistics of enter No., leave No., and In Area No. Working with management platform, it outputs reports to meet your requirements.
    [Face Detection] technology supports detecting, tracking, capturing, and selecting the best face image, and then outputs face snapshot.
    [Cyber Security] technologies employ security authentication and authorization, access control protocols, trusted protection, encrypted transmission and encrypted storage.

    Warranty & Returns

    Warranty, Returns, And Additional Information

    Warranty

    • Please contact the Seller directly for warranty information. Warranty information may also be found on the Manufacturer's website.
    • CONTACT

    Return Policies

    Manufacturer Contact Info

    LOADING...