We’re a security company so it’s no surprise that our products are secure. Not as an afterthought, but as standard, by design. From creation to manufacture and installation, they are secure from both physical and cyber threats, in keeping with their purpose of securing buildings and keeping staff safe.

Still, having a focus on and commitment to cybersecurity is worth repeating – especially with the prevalence of cyber attacks and data breaches reported in today’s media. Cyber criminals target all organisations, not just high-profile sites like the British Library, but small and large businesses alike.

Everyone needs to be vigilant, from internet users (consumers) to businesses and staff. That is why we take cyber security so seriously.

Our cybersecurity strategy

In 2019 we began working with a top 5 software consultancy with the aim of developing an ongoing cybersecurity strategy to protect ourselves, our products and our stakeholders. It started with a cybersecurity governance audit from which we developed our cybersecurity strategy. And it is something that continues to evolve to this day, taking into account changes in the business, the industry and the threat landscape. We see it as an ongoing commitment to safety – not as something we can tick off a list and move on. Why? Because the nature of cyber threats is rapidly evolving. Cyber criminals don’t rest on their laurels, which means we can’t either.

So, what are we doing?

Ensuring engagement across the business

One of our first steps was to establish a cross functional cybersecurity governance team. It comprises senior management representatives from all areas of our business, including R&D, production, technical support, IT and our executive leadership. The team’s mission is to continually review and manage our cybersecurity policies and procedures to ensure they are up to date and taking into account the changing threat landscape.

Independent testing

All our products are thoroughly tested for vulnerabilities by independently accredited laboratories. This includes penetration testing for all networked products including Integriti, Inception, Multipath and SkyCommand. The test results and feedback are incorporated into future product development to ensure consistently high standards.

Quality product development

Since the establishment of our organisation in 1988, quality has always played a starring role – leading to our ISO 9001 certification nearly two decades ago. This management framework ensures our manufacturing processes and R&D are carried out to the highest standards. We have also included a cyber threat assessment at every stage of product development and ensure our source code is strictly access controlled.

Cybersecurity best practices for partners

Our extensive integrator and partner network is included in our cybersecurity strategy. We’ve developed and shared installation hardening guides for Inner Range systems – Inception and Integriti. The guides provide advice and best practices around implementation, specifically around security, network access control, firewalls, identity management, and vulnerability management.

Hardened cybersecurity technologies

For all our cloud services, such as Multipath and SkyCommand, we have ensured we have reduced their vulnerability by hosting them in a leading cloud hosting environment – certified to ISO standards, as well as CSA, ITAR, CJIS, HIPAA and IRS 1075.

Our devices also include cryptographic implementations including AES encryption that are certified by NIST (National Institute of Standards and Technology).

The future

The cyberthreat will continue to evolve and cybercriminals will continue to increase the sophistication of their attacks. This is why Inner Range’s commitment to cybersecurity doesn’t stop at developing a strategy. Cybersecurity is a core element of our business, a vein that runs through all areas, from product development and manufacture, to installation and management.

If you’d like to find out more about our cybersecurity hardened products or our approach to cybersecurity, visit our dedicated cybersecurity page or get in touch with us today.