Securing Critical Infrastructure
About Us
Inner Range is a manufacturer and integrator of unified Video, Access Control and Security solutions. Founded in Melbourne, Australia, Inner Range has over 35 years of innovation and has more than 150,000 systems deployed globally.
Inner Range manufactures end-to-end solutions from the card you badge at one of their readers to the controller securing the door, right through to the enterprise security management software monitoring multiple sites anywhere in the world. Their scalable products are suitable for high-end residential, commercial and enterprise sites across verticals such as education, healthcare, government and critical infrastructure.
Inner Range is passionate about empowering its customers to protect what they value most: their property, their possessions, and most importantly, their people.
Inner Range offers its partners a range of competency-based training courses to ensure the best experience with their products and outcomes for their customers. Additionally, their global support team ensures that any issues are resolved quickly with minimal impact to the end user.
From entry to enterprise, Inner Range provides an end-to-end security solution capable of addressing the most difficult building management needs, providing peace of mind for clients and their people.
Their continual investment in research and development puts their products at the forefront of access control, security, video, and smart building technology. They partner with best-in-class providers of adjacent technologies such as intercom, payroll, building automation, and incorporate the latest in AI technology with solutions for facial recognition, biometrics, number plate recognition, and many more. With over 130 native integrations to 3rd party systems and open integration pathways, they provide their customers with a unified system behind a single pane of glass.
Securing Critical Infrastructure
Inner Range systems are used around the globe to protect critical Electricity, Water, and Gas utilities. These networks face diverse threats from vandalism, theft, and terrorism, with any loss or downtime of this infrastructure having a catastrophic effect on a nation's economy and wellbeing.
- Multi-layered security approach
- Surveillance systems with high-resolution cameras
- Access control systems with biometric authentication
- Robust perimeter barriers
- Trained security personnel and regular patrols
- Collaboration with law enforcement agencies
- Emergency response protocols
- Integration of smart technologies
- Tailored security strategy to address specific vulnerabilities
Centralised Management
Intruder Alarm and Access Control
Inner Range provides advanced intruder alarm functionality that scales across thousands of locations and delivers sophisticated integration with electric fences, beams, and other perimeter detection devices. Their advanced Multipath IP communication platform uses the internet and the 4G cellular network to efficiently communicate encrypted alarm messages to monitoring centres across the globe, ensuring that appropriate actions can be taken by first responders. State-of-the-art Access Control functionality ensures that only authorized staff are permitted in restricted areas only during time periods where they have a valid reason to enter secured spaces.
Staff and Contractor Safety
Critical Infrastructure often requires staff and contractors to sometimes attend remote and dangerous sites. To assist with staff and contractor safety, Duress alarms can be raised from fixed or mobile duress systems. Inner Range also integrates with Lone Worker systems that include man-down and personal tracking functionality. When a duress alarm is raised, Guards, Staff, and other stakeholders can be immediately notified through the Communicator messaging applications, which will broadcast SMS and email.
Centralised Management of a Complex Network of Sites
Critical infrastructure applications often require the coordination of a diverse array of sub-systems. These include building management integration (via Modbus/Bacnet/KNX), Video Surveillance, intercom, and key locking systems. Inner Range's Enterprise building management solutions is the perfect platform to deliver this information in a user-friendly and actionable format.
Electric Fence Integration
Whether the protected area is an open expanse or just a small building, the use of fencing helps delay intrusion. Adding to that, electrification of that fence adds deterrence but requires monitoring of the entire length as the liability can be high. Inner Range monitors the various zones and gates, detects disruption in that system, and alerts the property manager of those events. These features allow the owner to better defend the property and prevent unwanted intrusion and damage.
Unified Solution
Intruder Detection
Notifying the correct authorities of unwanted persons in an area or on a property in an appropriate timeframe helps prevent loss. Escalation of specific events to the correct responder allows them to make better decisions for resolving the issue. Providing up to 14 levels of response to various alarm scenarios.
The events that occur when an intruder attempts to gain access to a controlled area may need to be handled in unique ways. By providing standard operating procedures for each type of event, responders can mitigate risks and liability.
Access Control
Allowing the approved persons to be in the places that they need to complete their job is critical. But even more critical is preventing unapproved persons from accessing secure areas. This protects the people and assets of the organization and can also reduce other costs such as insurance.
By Integrating with other building systems such as HVAC, lighting, audio, and others provides better physical security and can also reduce the utility costs such as electrical and heating.
RTLS Integration
Real-Time Location Systems are commonly deployed in high-security situations and allow Security Operators to maintain accurate status and location of Security Personnel in real-time. The RTLS integration with the Enterprise Platform Integriti allows for status updates and location monitoring via the same graphical interface as every other aspect of the system (including integrated Video Surveillance, Intercoms, etc.). While increasing the security and safety of staff, this integration improves the situational awareness of Security Personnel in high-security situations.
Duress Alarms
Duress alarms are a critical component of Critical Infrastructure facilities to ensure the safety and wellbeing of both employees and visitors on site. Duress alarms may be a push button underneath the desk of a receptionist, or they can be a button on an emergency telephone in the middle of the site.
Regardless of the location of the button, these systems trigger immediate notification of an event to first responders to assist the person in need.
Facial Recognition
Access to an area is controlled by what you have (card or other physical identification), what you know (code), and who you are (biometric identifier). Integration with a video surveillance system allows the analytics to be integrated with the access control application to provide the Who You Are component of access control.
The identification of an individual through the cameras analytics can be used as the credential to allow a person entrance to a building or area.
Video Surveillance
Utilising the Enterprise Integriti platform, system operators are able to visually verify alarm events in real-time, using video feeds from an interconnected Video Surveillance platform. Security Personnel are able to view, control, and customize Video layouts all within one centrally managed system, while monitoring other access control or alarm events within the same graphical interface.
Protecting High Value Assets
Inner Range provides an advanced, integrated security solution for critical infrastructure.
- Cyber Secure ?
- Building Automation ?
- Visitor & Site Management ??
- Video Management ?
- Multiple Site Management ?
- Video Surveillance ?️
- Biometric Credentials ?
- Highly Encrypted ?
- Elevator Management ⬆️
- Mobile Credentials ?
- Intruder Detection ?
- Number Plate Recognition ?
- Wireless Access Control ?