Strategic focus on cyber security for Inner Range
We are committed to keeping our products, organisation and customers secure. Our approach is based on our ever-evolving cybersecurity strategy and includes independent penetration testing of products, a cyber threat assessment during each stage of product development, and buy-in from all levels of our staff.
Our strategy includes:
A dedicated cross-functional cyber security governance team
Coordinated penetration testing of all networked products by independent accredited laboratories
Product development process that includes cyber threat assessment
Deployment of hardened cybersecurity technologies
Supply of cyber hardening installation guidelines for Inner Range products
”Our strategy shows our absolute commitment to cyber security, not as a ‘extra’ level of security but as a core element running through every stage of the design, manufacture, installation and management of our security systems.”
Tim Northwood, Director
We’ve now released a formal statement outlining our coordinated, strategic measures to ensure the most robust cyber security for customers.
Download and read our Cyber Security statement.
Download and read our Inception Cyber Security guide.
Download and read our Integriti Cyber Security guide.
Inner Range Cyber Security
Our focus…
Among the measures is the formation of a cross functional cyber security governance committee that brings together senior representatives from research and development, production, technical support and IT as well as the executive leadership team. They now manage and update cyber security policies and procedures affecting all Inner Range activities in a consistent and holistic way.
At Inner Range, we only deploy hardened cyber security technologies. For example, cloud services Multipath and SkyCommand are hosted in an industry-leading cloud hosting environment that offer redundancy and load-balancing across multiple locations and come with certifications from ISO/IEC, CSA, ITAR, CJIS, HPIAA and IRS 1075.
In addition, our devices use cryptographic implementations, including AES encryption, while its architecture is designed to minimise risk, such as with resilient LAN networks and lightweight real-time operating systems.
We are now offering cyber hardening installation guidelines to integrators and end users to ensure systems are installed and managed securely. The guides include recommendations around security, network access control, firewalls, identity management and vulnerability management.
This is included at every stage of our product development process. Aside from penetration testing, strict access control permissions are allocated to source code to ensure only relevant staff have access to code repositories.
Inner Range has been a world leader in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Customers include hospitals and high-security units, colleges, distribution centres and pharmaceutical companies. government and critical national infrastructure.
Awards
News
Three new commercial-grade motion detectors
Welcome to Inner Range: Three new commercial-grade motion detectors We recently partnered with the world leader in sensing technologies – Optex. The result? Three commercial-grade motion detectors that are expanding our capabilities within our [...]
Product update 2024
Read on for the latest product updates from Inner Range… Introducing IR Mobile Access Our mobile access solution takes security to the next level – making cyber security, end [...]
3 ways to ensure the longevity of your security system
Physical security remains one of the most important areas for any business – just consider that the global security market was sized at approximately $117.7 billion last year and is expected to grow at [...]