image description

What are the Cyber Security features of Inner Range Integriti?

The Integriti Security System from Inner Range ensures cyber security through a comprehensive and multi-faceted approach. This approach includes:

Independent Security Assessments

  • Penetration Testing: Integriti undergoes regular independent penetration testing by accredited laboratories to identify and address vulnerabilities.
  • Cyber Threat Assessment: Cyber threat assessments are conducted at each stage of the product development process to ensure that potential threats are identified and mitigated early.

Encryption and Secure Communication

  • AES Encryption: Integriti employs AES encryption, certified by NIST through their Cryptographic Algorithm Verification Program to the FIPS 140-2 standard, for secure data transmission and storage.
  • HTTPS/TLS: The system’s cloud services, servers, web clients, and mobile apps are secured with HTTPS/TLS, ensuring encrypted communication channels.

Secure Development Practices

  • ISO 9001 Certification: Inner Range has been ISO 9001 certified for over 15 years, ensuring that all processes, including R&D, are conducted in a controlled and secure manner.
  • Access Control Permissions: Strict access control permissions are allocated to source code, ensuring only relevant staff can access code repositories.

Network Security

  • Installation Hardening Guides: Inner Range provides installation hardening guides that offer recommendations on security mechanisms, network access control, firewalls, identity management, and vulnerability management.
  • Dedicated Local LAN Networks: Integriti’s architecture includes dedicated local LAN networks that are resilient against known cyber attacks and utilise lightweight real-time operating systems to reduce exposure to vulnerabilities.

Continuous Improvement and Governance

  • Cybersecurity Governance Committee: A cross-functional cybersecurity governance committee, including senior management from R&D, Production, Technical Support, and IT, oversees the policies and procedures related to cybersecurity, ensuring they are up-to-date and effectively implemented.
  • Continuous Evolution: Inner Range continuously evolves its cybersecurity efforts to keep pace with the rapidly changing threat landscape.

Cloud Security

  • Industry-Leading Cloud Hosting: Integriti’s cloud services, such as Multipath and SkyCommand, are hosted in industry-leading cloud environments that offer redundancy and load balancing across multiple locations, ensuring high availability and security.

User and Data Management

  • Two-Factor Authentication: Integriti supports two-factor authentication for operators, adding an extra layer of security for system access.
  • Database Security: The MS SQL database used by Integriti supports TLS and TDE, which uses AES 256-bit encryption to secure data at rest.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].

Category: Inner Range
Tag: inner range integriti

Latest Posts

Comments are closed.

Posted By: JD Security
Field Under:
Return to Top ▲Return to Top ▲