Totems
A screen encased in a durable metal housing with a front glass panel.
Totems
Totems are designed for use in urban environments, enclosed in an additional casing for extra protection. They can also be equipped with a touch-sensitive option, making them interactive. Suitable for both indoor and outdoor installation.
Applications of Totems:
- Environmental advertising
- Self-service systems in restaurants and cafes
- Museums, information centers
- And other locations


Size Availability
Indoor kiosks are available in 43”, 55”, 65”, and 75” sizes. Outdoor kiosks are available in 55”, 65”, and 75” sizes.

Touch Sensitivity
Totems are available both with and without touch functionality.

Weather Resistance
Totems are designed for both indoor and outdoor use, featuring heating or cooling mechanisms to adapt to varying weather conditions.

Interactive Kiosk Content
Totems consist of a high-brightness screen, a metal casing, and a computer, allowing you to display anything your heart desires. Additionally, we offer the option to create a custom page tailored to your preferences.
Types of interactive kiosks

Frequently asked questions
What is needed to install the screen?
In most cases, a nearby power outlet and an internet connection (LAN / WiFi) are completely sufficient.
In more complex cases, one of our colleagues will contact you to coordinate the power supply and internet connection options.
How do you control such a screen?
There are three control methods available – local, network, and cloud.
-
Local control means all content is changed while being physically next to the screen – either via USB or HDMI.
-
Network control allows you to update the content when the screen and computer are on the same internet network, without using cables.
-
Cloud control enables screen management from anywhere in the world where there is an internet connection.
What kind of internet connection is required?
There are two options: LAN cable or WiFi. We recommend using a LAN cable – it’s a more secure way to protect against potential hacker attacks. 🙂