Discreet, budget-friendly and outdoor ready thermal detection
Reliable and budget-friendly detection
Thermal technology for low rate of false alarm
Functional and discreet design
When you need reliable detection any time of the day or night, AXIS P1290-E Thermal Network Camera delivers. And it gives you great value for money.
Thermal detection within reach
AXIS P1290-E delivers all the benefits of thermal detection at a price that’s within reach. Thanks to built-in analytics – or advanced analytics from our partners or Axis – it reliably detects people, vehicles and objects regardless of light conditions or attempts at camouflage. It can be used as a cost-effective detector with visual confirmation for safety of both people and property in numerous environments. It also helps to decrease false alarms.
Where privacy is paramount
AXIS P1290-E can be used as a sensor to avoid compromising privacy, for example schools and care homes – thermal imaging detects incidents without revealing personal details of the people in the image. Together with analytics the thermal camera can trigger alerts or alarms in response to patient or resident falls, allowing staff to take immediate action.
1.8 x 0.5 m
4 x 1.5 m
Detection (1.5 pixels on target)
Recognition (6 pixels on target)
Identification (12 pixels on target)
The ranges are calculated with Johnson’s criteria and they are purely theoretical. The values may vary in different weather conditions. For detailed information about Johnson’s criteria, please read the white paper.
A video analytics powerhouse
AXIS P1290-E powerful processor lets you add the strength of the market’s widest selection of video analytics solutions to your surveillance solution. For example, video analytics applications from our partners support swift and appropriate response to detected events by analyzing them, automatically dismissing non-threatening ones and instantly notifying security staff of potentially critical situations. Your staff can then view sharp, detailed footage to determine the precise nature of the threat – and act accordingly.
Detect and verify in challenging conditions, without compromising privacy. Read more
Save bandwidth and space without sacrificing valuable information. Read more