What are the Cyber Security features of Inner Range Integriti?
The Integriti Security System from Inner Range ensures cyber security through a comprehensive and multi-faceted approach. This approach includes:
Independent Security Assessments
- Penetration Testing: Integriti undergoes regular independent penetration testing by accredited laboratories to identify and address vulnerabilities.
- Cyber Threat Assessment: Cyber threat assessments are conducted at each stage of the product development process to ensure that potential threats are identified and mitigated early.
Encryption and Secure Communication
- AES Encryption: Integriti employs AES encryption, certified by NIST through their Cryptographic Algorithm Verification Program to the FIPS 140-2 standard, for secure data transmission and storage.
- HTTPS/TLS: The system’s cloud services, servers, web clients, and mobile apps are secured with HTTPS/TLS, ensuring encrypted communication channels.
Secure Development Practices
- ISO 9001 Certification: Inner Range has been ISO 9001 certified for over 15 years, ensuring that all processes, including R&D, are conducted in a controlled and secure manner.
- Access Control Permissions: Strict access control permissions are allocated to source code, ensuring only relevant staff can access code repositories.
Network Security
- Installation Hardening Guides: Inner Range provides installation hardening guides that offer recommendations on security mechanisms, network access control, firewalls, identity management, and vulnerability management.
- Dedicated Local LAN Networks: Integriti’s architecture includes dedicated local LAN networks that are resilient against known cyber attacks and utilise lightweight real-time operating systems to reduce exposure to vulnerabilities.
Continuous Improvement and Governance
- Cybersecurity Governance Committee: A cross-functional cybersecurity governance committee, including senior management from R&D, Production, Technical Support, and IT, oversees the policies and procedures related to cybersecurity, ensuring they are up-to-date and effectively implemented.
- Continuous Evolution: Inner Range continuously evolves its cybersecurity efforts to keep pace with the rapidly changing threat landscape.
Cloud Security
- Industry-Leading Cloud Hosting: Integriti’s cloud services, such as Multipath and SkyCommand, are hosted in industry-leading cloud environments that offer redundancy and load balancing across multiple locations, ensuring high availability and security.
User and Data Management
- Two-Factor Authentication: Integriti supports two-factor authentication for operators, adding an extra layer of security for system access.
- Database Security: The MS SQL database used by Integriti supports TLS and TDE, which uses AES 256-bit encryption to secure data at rest.
Call us on 1300 556 334 or email [email protected] to learn more.
Customers in New Zealand call 0800 345 677 or email [email protected].
Category:
Inner Range
Latest Posts
Comments are closed.