Strategic focus on cyber security for Inner Range
We are committed to keeping our products, organisation and customers secure. Our approach is based on our ever-evolving cybersecurity strategy and includes independent penetration testing of products, a cyber threat assessment during each stage of product development, and buy-in from all levels of our staff.
Our strategy includes:
A dedicated cross-functional cyber security governance team
Coordinated penetration testing of all networked products by independent accredited laboratories
Product development process that includes cyber threat assessment
Deployment of hardened cybersecurity technologies
Supply of cyber hardening installation guidelines for Inner Range products
”Our strategy shows our absolute commitment to cyber security, not as a ‘extra’ level of security but as a core element running through every stage of the design, manufacture, installation and management of our security systems.”
Tim Northwood, Director
We’ve now released a formal statement outlining our coordinated, strategic measures to ensure the most robust cyber security for customers.
Download and read our Cyber Security statement.
Download and read our Inception Cyber Security guide.
Download and read our Integriti Cyber Security guide.
Inner Range Cyber Security
Our focus…
Among the measures is the formation of a cross functional cyber security governance committee that brings together senior representatives from research and development, production, technical support and IT as well as the executive leadership team. They now manage and update cyber security policies and procedures affecting all Inner Range activities in a consistent and holistic way.
At Inner Range, we only deploy hardened cyber security technologies. For example, cloud services Multipath and SkyCommand are hosted in an industry-leading cloud hosting environment that offer redundancy and load-balancing across multiple locations and come with certifications from ISO/IEC, CSA, ITAR, CJIS, HPIAA and IRS 1075.
In addition, our devices use cryptographic implementations, including AES encryption, while its architecture is designed to minimise risk, such as with resilient LAN networks and lightweight real-time operating systems.
We are now offering cyber hardening installation guidelines to integrators and end users to ensure systems are installed and managed securely. The guides include recommendations around security, network access control, firewalls, identity management and vulnerability management.
This is included at every stage of our product development process. Aside from penetration testing, strict access control permissions are allocated to source code to ensure only relevant staff have access to code repositories.
Inner Range has been a world leader in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Customers include hospitals and high-security units, colleges, distribution centres and pharmaceutical companies. government and critical national infrastructure.
Awards
News
Counting down to The Security Event (TSE)
Introducing IR Mobile Access Nothing gets the Inner Range team more excited than the opportunity to meet customers, installers and partners, and talk about what’s new in our unified access control and [...]
Meet the Installer – Antron Security
As part of our series where we highlight some of the great teams of installers we work with, we’d like to introduce you to Antron Security – a security systems specialist that has [...]
Inception – a round-up of the latest updates
Access control and security for smaller businesses doesn’t need to be complex or prohibitively expensive. Our Inception solution is an award-winning access control and integrated security system that is web-based, making it easy to [...]