Strategic focus on cyber security for Inner Range
We are committed to keeping our products, organisation and customers secure. Our approach is based on our ever-evolving cybersecurity strategy and includes independent penetration testing of products, a cyber threat assessment during each stage of product development, and buy-in from all levels of our staff.
Our strategy includes:
A dedicated cross-functional cyber security governance team
Coordinated penetration testing of all networked products by independent accredited laboratories
Product development process that includes cyber threat assessment
Deployment of hardened cybersecurity technologies
Supply of cyber hardening installation guidelines for Inner Range products
”Our strategy shows our absolute commitment to cyber security, not as a ‘extra’ level of security but as a core element running through every stage of the design, manufacture, installation and management of our security systems.”
Tim Northwood, Director

We’ve now released a formal statement outlining our coordinated, strategic measures to ensure the most robust cyber security for customers.
Download and read our Cyber Security statement.
Download and read our Inception Cyber Security guide.
Download and read our Integriti Cyber Security guide.
Inner Range Cyber Security
Our focus…
Among the measures is the formation of a cross functional cyber security governance committee that brings together senior representatives from research and development, production, technical support and IT as well as the executive leadership team. They now manage and update cyber security policies and procedures affecting all Inner Range activities in a consistent and holistic way.
At Inner Range, we only deploy hardened cyber security technologies. For example, cloud services Multipath and SkyCommand are hosted in an industry-leading cloud hosting environment that offer redundancy and load-balancing across multiple locations and come with certifications from ISO/IEC, CSA, ITAR, CJIS, HPIAA and IRS 1075.
In addition, our devices use cryptographic implementations, including AES encryption, while its architecture is designed to minimise risk, such as with resilient LAN networks and lightweight real-time operating systems.
We are now offering cyber hardening installation guidelines to integrators and end users to ensure systems are installed and managed securely. The guides include recommendations around security, network access control, firewalls, identity management and vulnerability management.
This is included at every stage of our product development process. Aside from penetration testing, strict access control permissions are allocated to source code to ensure only relevant staff have access to code repositories.
Inner Range has been a world leader in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Customers include hospitals and high-security units, colleges, distribution centres and pharmaceutical companies. government and critical national infrastructure.
Awards


News
Are people really the weakest link in security?
One of the most used phrases in cyber security vernacular is that people are the weakest link in the chain. They are human, they make mistakes, they’re fallible. When it comes to physical [...]
Inner Range at TSE 2026: New VMS, smarter video and simplified security
The Security Event 28-30 April 2026 NEC Birmingham Stand 5/J70 Join the Inner Range team at this year’s TSE 28-29 April. We’ll be on stand 5/J70 and are looking forward to seeing what [...]
Whitepaper: The smarter way to strengthen your security estate
DOWNLOAD WHITEPAPER Change is the only constant. Cliché? Yes. True? Also, yes. In the security market, rising costs, economic challenges, evolving threats, skills shortages and the encroachment of new technologies are [...]


