Izzy Boardman

Journalist, IFSEC Global

July 2, 2018

Sign up to free email newsletters

Download

‘Secure by default’ in the age of converged security

LONE WORKERS

Inner Range marked 30th anniversary at IFSEC 2018 with new Guard Tour feature

A new feature of access control system Integriti that makes patrols harder for attackers to predict was one of the main attractions on Inner Range’s stand at IFSEC 2018.

The Guard Tour feature that is part of the latest update (V18.1) will enable security managers to organise security tasks in a clearer way as well as track their staff as they perform their duties.

The update will include a 64-bit server that is double the size of the previous installation and this will allow for new integrations that need greater memory.

Other features include the ‘mobile reader’ app which allows security staff to use their own phone to access a user’s credentials in an emergency and will ensure site managers can see where staff are if they are in danger.

“This year marks our milestone 30th anniversary and our latest update is testament to the fact we never stand still.” Tim Northwood, general manager, Inner Range Europe

Since the company was found in 1988 in Melbourne, Australia, Inner Range has installed more than 130,000 systems in more than 30 countries.

“We’ve always prided ourselves on the fact we research, develop and manufacture all our own products,” said Tim Northwood, general manager, Inner Range Europe. “Now we can draw on three decades of experience in those fields to continue to improve and innovate our systems.

Inner Range took part in IFSEC’s Show Me How programme of technology demonstrations and showed how to configure its web-based access control system, Inception, from taking it out of the box to a programmed state.

Free Download: Cybersecurity and physical security systems: how to implement best practices

If you are involved in the operation or maintenance of physical security systems, this resource from Vanderbilt will help you choose the right equipment for staying diligent. It provides a five step process for strengthening the resilience of those systems against cyber-attack, as well as explaining what cyber-attacks mean in an interconnected world.

Discover the five step process now by clicking here.

Related Topics

Leave a Reply

avatar
  Subscribe  
Notify of

Sign up to free email newsletters