Strategic focus on cyber security for Inner Range
We are committed to keeping our products, organisation and customers secure. Our approach is based on our ever-evolving cybersecurity strategy and includes independent penetration testing of products, a cyber threat assessment during each stage of product development, and buy-in from all levels of our staff.
Our strategy includes:
A dedicated cross-functional cyber security governance team
Coordinated penetration testing of all networked products by independent accredited laboratories
Product development process that includes cyber threat assessment
Deployment of hardened cybersecurity technologies
Supply of cyber hardening installation guidelines for Inner Range products
”Our strategy shows our absolute commitment to cyber security, not as a ‘extra’ level of security but as a core element running through every stage of the design, manufacture, installation and management of our security systems.”
Tim Northwood, Director
We’ve now released a formal statement outlining our coordinated, strategic measures to ensure the most robust cyber security for customers.
Download and read our Cyber Security statement.
Download and read our Inception Cyber Security guide.
Download and read our Integriti Cyber Security guide.
Inner Range Cyber Security
Our focus…
Among the measures is the formation of a cross functional cyber security governance committee that brings together senior representatives from research and development, production, technical support and IT as well as the executive leadership team. They now manage and update cyber security policies and procedures affecting all Inner Range activities in a consistent and holistic way.
At Inner Range, we only deploy hardened cyber security technologies. For example, cloud services Multipath and SkyCommand are hosted in an industry-leading cloud hosting environment that offer redundancy and load-balancing across multiple locations and come with certifications from ISO/IEC, CSA, ITAR, CJIS, HPIAA and IRS 1075.
In addition, our devices use cryptographic implementations, including AES encryption, while its architecture is designed to minimise risk, such as with resilient LAN networks and lightweight real-time operating systems.
We are now offering cyber hardening installation guidelines to integrators and end users to ensure systems are installed and managed securely. The guides include recommendations around security, network access control, firewalls, identity management and vulnerability management.
This is included at every stage of our product development process. Aside from penetration testing, strict access control permissions are allocated to source code to ensure only relevant staff have access to code repositories.
Inner Range has been a world leader in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Customers include hospitals and high-security units, colleges, distribution centres and pharmaceutical companies. government and critical national infrastructure.
Awards
News
Heading to International Security Expo
The one thing that the last week of September is known for in security circles – apart from the start of Munich’s infamous Oktoberfest – is the International Security Expo. This year the event [...]
Where there is smoke…the impact of vaping on security systems
Only a few years ago the nicotine cigarette was public enemy number one. It was officially banned from public places – pubs, restaurants, workplaces – in 2007. Overnight smokers became pariahs, sneaking off to designated [...]
Modern co-working space secured by Antron Security and Inner Range
DOWNLOAD CASE STUDY Montacute Yards, a cutting-edge office and co-working space located in the heart of Shoreditch, epitomises modern work environments designed for creativity, collaboration, and productivity. Purchased by a [...]