Download PDF version Contact company

Security system manufacturer, Inner Range has announced a new strategic focus on cyber security, after auditing and formalizing several existing cyber security measures.

The globally renowned security solutions firm, Inner Range, which has not had a single reported cyber security breach in its 30-year history, has been working with a global software service company to develop a comprehensive cyber security governance program that can grow and evolve to meet ever-changing cyber security challenges.

Cyber security governance program includes:

  • A dedicated cross-functional cyber security governance team.
  • Coordinated penetration testing of all networked products by independent accredited laboratories.
  • Product development process that includes cyber threat assessment.
  • Deployment of hardened cyber security technologies.
  • Supply of cyber hardening installation guidelines for Inner Range products.

Facing the critical challenge of cyber security

Cyber security is one of the major challenges facing organizations today"

Tim Northwood, General Manager of Inner Range, said “Cyber security is one of the major challenges facing organizations today and it’s critical that networked security and access control systems provide customers with the safest possible solution.

Tim adds, “Our new program shows our absolute commitment to cyber security, not as an ‘extra’ level of security but as a core element running through every stage of the design, manufacture, installation and management of our security systems.

Robust cyber security solutions

Inner Range has released a formal statement outlining its coordinated, strategic measures to ensure the most robust cyber security for customers.

Among the measures is the formation of a cross-functional cyber security governance committee that brings together senior representatives from research and development, production, technical support and IT, as well as the executive leadership team. They now manage and update cyber security policies and procedures affecting all Inner Range activities in a consistent and holistic way.

Penetration testing to assess security

The statement notes how all networked products undergo penetration testing by independent accredited laboratories to assess security and probe for vulnerabilities.

Penetration testing has been applied to Inner Range’s IP network-connected products, including Integriti, Inception, Multipath and SkyCommand. Test results form part of the product development process and directly improve the security of all Inner Range platforms.

Cyber threat assessment

Cyber threat assessment is included at every stage of Inner Range’s product development and testing process. Aside from penetration testing, strict access control permissions are allocated to source code, so as to ensure that only relevant support staff and personnel have access to code repositories.

Inner Range only deploys hardened cyber security technologies. For example, cloud services Multipath and SkyCommand are hosted in an industry-renowned cloud hosting environment that offers redundancy and load-balancing across multiple locations and come with certifications from ISO/IEC, CSA, ITAR, CJIS, HPIAA and IRS 1075.

Security devices using cryptographic implementations

Inner Range is now offering cyber hardening installation guidelines to integrators and end users

In addition, Inner Range’s devices use cryptographic implementations, including AES encryption, while its architecture is designed to minimize risk, such as with resilient LAN networks and lightweight real-time operating systems.

Inner Range is now offering cyber hardening installation guidelines to integrators and end users to ensure systems are installed and managed securely. The guides include recommendations around security, network access control, firewalls, identity management and vulnerability management.

Critical infrastructure installations security

With more than 150,000 security systems already installed in critical infrastructure installations in over 30 countries, Inner Range is globally considered to be one of the innovators in the design and manufacture of intelligent security solutions, since it was first established in 1988.

Customers include hospitals and high-security units, colleges, distribution centers and pharmaceutical companies, federal and state government installations, along with critical national infrastructure.

Download PDF version Download PDF version

In case you missed it

Visual AI Company AnyVision Changes its Name to Oosto
Visual AI Company AnyVision Changes its Name to Oosto

AnyVision announced today that the company will change its name to Oosto. The new name reflects the company’s evolution and vision for the future which is shaped, in part, by a new collaboration with Carnegie Mellon University’s (CMU) CyLab Biometric Research Center. The CMU partnership will focus on early-stage research in object, body, and behavior recognition. Vision AI Oosto CEO, Avi Golan remarks, "Historically, the company has focused on security-related use cases for our watchlist alerting and touchless access control solutions. With the launch of Oosto, we’re looking beyond the lens of security to include ways our solutions can positively impact an organization’s safety, productivity and customer experience.” AnyVision pioneered Vision AI to automate watchlist alerting, identifying security risks as well as valuable customers in real-time to personalize customer experiences and enhance physical security. The rebranded Oosto will leverage the power of Vision AI to enhance the safety of customers, guests, and employees. Solutions include touchless access control, video analytics, and new flavors of video-based recognition (object, body, and behavioral recognition), which deliver the insights and alerts to protect pivotal stakeholders from bad actors and security threats. Partnership with CyLab Biometric Research Center The company’s research partnership with Carnegie Mellon University’s (CMU) CyLab Biometric Research Center will focus on advanced object classification and behavior recognition algorithms for commercial use cases. This collaboration will help Oosto address a broad range of safety-related use cases, including object detection (e.g., weapons on school grounds) and behavioral analysis (e.g., when someone falls down). As part of the partnership, Marios Savvides, a Professor of Electrical and Computer Engineering (ECE) and founder and director of the Biometrics Center at CMU, will join Oosto as the Chief AI Scientist to expand Oosto’s AI team led by CTO, Dieter Joecker. “We were impressed by Oosto's commitment to the fair and ethical use of the technology, preserving user privacy, and creating safer spaces for everyone,” said Professor Marios Savvides. “These shared values make Oosto an ideal research partner for CMU to advance object, body, and behavioral recognition and to positively impact our collective safety.” Long histoy in artificial intelligence Over the past 10 years, more than 400 startups linked to CMU have raised more than $7 billion in funding. CMU has a long history in artificial intelligence including the creation of the first AI computer program in 1956 and pioneering work in self-driving cars, facial recognition, and natural language processing. ECE Professor Marios Savvides was named one of the “2020 Outstanding Contributors to AI” awards from the former U.S. Secretary of the Army. His research has been focused on developing core AI and machine-learning algorithms that were successfully applied for robust face detection, face recognition, iris biometrics, and most recently, general object detection and scene understanding. Savvides has generated over 35 patents and patent publications, and over 50 unpublished patent applications to date. "Under the leadership of Prof. Savvides, CMU’s CyLab Biometric Research Center has an impressive track record of successfully transferring AI research out of a lab environment and into reliable and scalable solutions," added Golan. "Visual intelligence is in its infancy and there is so much more work yet to be done. With this partnership, we now have an elite U.S.-based AI research center that will work in concert with our existing AI teams to accelerate the development of advanced deep learning algorithms and exploration of new safety-related use cases, markets, and industries, including medical, payments, and smart cities.” As part of these corporate rebranding efforts, the company is also renaming its products to OnWatch (formerly A Better Tomorrow), OnAccess (formerly Abraxas), and OnPatrol.

How Well Do Systems Meet Video Surveillance Needs In Prisons?
How Well Do Systems Meet Video Surveillance Needs In Prisons?

Keeping prisoners safely housed is among the biggest challenges the security industry faces. Correctional applications of security technology are often more extreme and require a specialized mix of technologies. We asked our Expert Panel Roundtable: What are the video security and surveillance needs in prisons, and how well do technologies meet those needs? Are there any ethical qualms about selling to prisons?

Which Technologies Are Transforming Airport Security?
Which Technologies Are Transforming Airport Security?

Air travel is returning to pre-pandemic levels. COVID and its aftermath have added new compliance and operational concerns for airport security, and social and political volatility around the world emphasises the need for constant vigilance. A range of new technologies are enhancing airport security, not to mention providing new tools to simplify processes throughout the airport. We asked our Expert Panel Roundtable: Which technologies are transforming airport security?