Search Results
1740 results found with an empty search
- Brochure - HID Signo Readers | Inner Range
Brochure - HID Signo Readers Download
- IR Connect | Mobile Security Management | Inner Range
IR Connect is a unified cloud platform that brings all of our connected products and services together into one singular experience. Your entire unified Inner Range system is accessible anywhere, anytime. What is IR Connect? IR Connect is a unified global cloud platform that enables seamless remote access to Inner Range security, video, and access control systems via mobile apps, web interfaces, and desktop applications. Security First - the IR Connect hybrid architecture ensures that critical operational data remains securely on premise, while the cloud offers fully encrypted end-to-end communications providing seamless remote access via mobile devices or desktop applications. This means that all sensitive personal information is stored safely and securely onsite within the organizations cyber security protections. With IR Connect, users benefit from: Unified control across all Inner Range connected products Enhanced cloud capabilities with secure, encrypted access from anywhere Cloud-hosted infrastructure supporting local & international compliance A future-ready platform for upcoming product integrations The new IR Connect App is fully compatible with the existing SkyCommand App, allowing current users to upgrade smoothly without any disruption. It features a modern interface, enhanced functionality, and the same trusted security and reliability that Inner Range is known for — now available on the Apple App Store and Google Play Store. Whether you're managing multiple sites or safeguarding what matters most, IR Connect keeps you connected securely and effortlessly. Instant Notifications Get real-time alerts for alarm events on your mobile. Live & Historic video Watch live security footage via IR Video Gateways. Remote Arming & Disarming Secure or unsecure your system Remotely. Door & Automation Control Open doors or control devices from anywhere. Real-Time Monitoring Live status updates of sensors and systems. Multi-Site Support Manage multiple sites and areas in one app. Favourites & Personalisation Quick access to your most-used items. Drag & Drop Organisation Reorder and label items with photos. Event History Access logs of all notifications and alarm events. Secure App Entry Login using PIN or biometrics. Vehicle Integration Control your system via Android Auto or CarPlay. Snapshots & Recordings Take live snapshots or record video instantly. Built for the Future of Connected Security, significant development resources have gone into the creation of IR Connect, resulting in a robust, scalable platform designed to support the evolving ecosystem of Inner Range connected devices, as well as the needs of security professionals and end users alike. This forward-thinking platform serves as the foundation for the next generation of smart security solutions, making it easier than ever for users to control and monitor systems from virtually anywhere. Whether managing multiple sites or streamlining across teams, IR Connect empowers users with more control, flexibility, and security. Built for the Future of Connected Security One of the key innovations behind IR Connect is its hybrid cloud architecture-blending the convenience of remote access with the security of on-premise data protection. IR Connect enables secure remote access via smart devices, tablets, laptops, or through the powerful Integriti Enterprise Software, while ensuring that sensitive data remains within the customer’s controlled environment. This gives users the security of an on-premise system with the flexibility of encrypted cloud access. IR Connect leverages a multi-region architecture to ensure data sovereignty compliance and deliver a seamless, high-performance experience for users wherever they are. A Hybrid Cloud Model Prioritizing Security With its robust feature set, secure architecture, and intuitive design, IR Connect is setting a new standard for unified security systems and secure cloud connections. As Inner Range continues to roll out new innovations, this platform will serve as the cornerstone for the next generation of intelligent, integrated security solutions. IR Connect: Setting a New Standard IR Enterprise Solutions Brochure More Info IR Professional Solutions Brochure More Info Want to know more or to book a demo? Feel free to ask! Contact Us
- High Security Solution | Inner Range
The High Security range of products has been designed to meet the rigorous requirements of the Class 5 standard for security solutions. The Ultimate Encrypted High Security Solution Our High Security System consists of a suite of products which, together, provide all the elements necessary to meet the stringent requirements set out by the AS/NZS 2201.1:2007 Class 5 standard. The High Security range of products has been designed to meet the rigorous requirements of the Class 5 standard for security solutions. The High Security platforms include Controllers, Input Expansion Modules, End of Line Modules, Keypads, Card Readers, Power Supplies, Equipment Enclosures, Alarm Transmission Devices and Equipment Power Isolation Kits. The system’s modular design provides scope for expansion while also boasting a hybrid architecture. The hybrid architecture supports both high-security zones and lower-security areas at the same facility at the same time. By ensuring that budget allocations are made for zones only where necessary, the end result is a single, holistic and affordable security solution for the entire organisation. Expansion of the system is achieved by installing additional encrypted modules to the Controller’s RS-485 LAN or adding additional Controllers to the system. The entire platform, including multiple Controllers, can be managed from the Enterprise software. Inner Range provides a complete end-to-end, High-Security solution for installations with all the power and flexibility expected from an integrated solution. High Security is a modular system that effortlessly scales with the addition of RS-485 LAN modules. Communication between the Controller, Expanders, Keypads, and SIFER Card Reader (including fob/card credentials) are all encrypted to AES 128-bit with MAC authentication. Data encryption ensures secure LAN communications at all times, while the programmable supervisory polling system continuously monitors the LAN to detect cable tamper, cable fault conditions, module off-line and module substitution. The efficient data format used has been developed to ensure fast, secure and reliable communication regardless of the size of the system. High Security End of Line Modules (ELMs) are designed to be installed within a detection device such as a PIR or Reed sensor switch. In conjunction with the encrypted expander, ELMs provide an encrypted data communication link between the detector and the control equipment. During normal operation, the supervisory polling system continuously monitors ELMs to detect any communication failure, device substitution or tamper conditions. Encrypted Communications The High-Security system is equipped with the award-winning Multipath-IP T4000 Security Communicator. The T4000 provides high security and polled connection to the monitoring station for alarm reporting. All communications are encrypted to AES 128-bit and polling intervals can be as frequent as 10 seconds. Should a poll fail to be delivered within the allocated time, the T4000 intelligently tries to re-establish connection and, if available, will attempt to route the connection through another gateway, i.e. switching from on-site Internet to 4G LTE. If a failed connection cannot be re-established within a pre-determined time, an alarm will be raised within the monitoring station. Multipath-IP T4000 has been independently certified to Australian standard AS2201.5 Class 5 Alarm Communications Inner Range is proud to state that we are the FIRST electronic security manufacturer to gain independent CLASS 5 CERTIFICATION by the Australian Security Industry Association Limited (ASIAL). Independently Certified In this standard, the risk profile of an intruder alarm system is determined by conducting a risk assessment based on the likelihood, and consequences of, an attack. A Class 5 risk profile is proposed when: The consequences of the attack may be ‘Catastrophic’ regardless of the likelihood of an attack. The likelihood of an attack is ‘Likely’ or ‘Very likely’ and the consequences are ‘Major’ or ‘Catastrophic’. IR High Security Brochure More Info IR NDAA Statement More Info Want to know more or to book a demo? Feel free to ask! Contact Us
- Comprehensive Security Solutions | Inner Range
Explore Inner Range's tailored security solutions for businesses and industries. From professional to enterprise, find the perfect fit for your security needs. Securing Residential & Commercial High-Rises Managers of Residential and Commercial High-Rise buildings are required to keep their facilities safe and secure whilst giving their residents, tenants and their visitors the most convenient access to their buildings as possible. Inner Range provides the perfect solution to centrally manage a wide array of complex subsystems from a single software interface. Challenges faced by High-Rise Buildings Securing commercial and residential High-Rise buildings has never been easier. Inner Ranges provides a seamless experience for residents, tenants and their visitors when accessing a wide range of the building’s facilities such as apartments, offices, carparks, gyms, elevators, lockers and any other secure areas.” Central Management of all facilities from a single software interface Video Intercom and Lift/Elevator Control Improving concierge responsiveness with Video Surveillance Integration Inner Range’s Enterprise technology platform Integriti, seamlessly manages all user access in high-rise complexes. Integriti’s distinctive access control features ensure access to common areas such as foyers, lifts, gymnasiums, pools, carparks, etc. are managed securely. Additionally, Integriti manages the access permissions for other building systems such as Wireless Access Room Key Systems and Locker Management systems. Car park access can be controlled via traditional credentials or via License Plate Recognition to provide a frictionless experience for guests. Central Management of all facilities from a single software interface Video intercoms, which allow tenants to grant access to visitors, are a core technology in high-rise buildings. Inner Range integrates with a wide variety of Video intercom systems so that when a resident grants access, when access is granted external doors can be opened, lights switched on in the foyer and the elevator is dispatched to the ground floor. Inner Range delivers sophisticated lift/elevator control, whereby lifts can be sent to the ground floor when a visitor or tenant is granted access into the building. The software then allows access to the designated floors where the tenant or visitor is permitted. Video Intercom and Lift/Elevator As well as controlling all the high-rise building access control sub-systems, building managers or concierge staff can also monitor video surveillance images within our software. When a guest enters the building, images from that camera covering the specific entry door can be displayed and monitored. Freight and courier deliveries can also be verified by video, and access can be granted from the concierge desk. Improving concierge responsiveness with Video Surveillance Integration Organisations that trust Inner Range Empowering Residential & Commercial High-Rise Access Control Allowing the approved persons to be in the places that they need to complete their job is critical. But even more critical is preventing unapproved persons from accessing secure areas. This protects the people and assets of the organization and can also reduce other costs such as insurance. By Integrating with other building systems such as HVAC, lighting, audio, and others provides better physical security and can also reduce the utility costs such as electrical and heating. License Plate Recognition (LPR) Integration Video integration provides the ability to use LPR as a credential for gaining access to the facility. Associating the vehicle license plate to the users profile allows the system to open the carparking gates upon approach providing contactless entry to the premises. Many LPR solutions have already been integrated into the platform providing facility managers with a wide range of choices to best suit the application. Facial Recognition Integration Access to an area is controlled by what you have (card or other physical identification), what you know (code) and who you are (biometric identifier). Integration with a video surveillance system allows the analytics to be integrated with the access control application to provide the Who You Are component of access control. This identification of a person by a camera, as well as the credential that the person holds or knows, can assist in assuring that the correct people are in the proper area. The identification of an individual through the cameras analytics can be used as the credential to allow a person entrance to a building or area. Intercom Integration Security & Access Control systems are often installed in conjunction with Intercom systems and it is of paramount importance that these systems are able to operate harmoniously together to create an exemplary end-user experience. Inner Range’s interconnected technology platform allows for Security Personnel to easily monitor, manage, and control all intercom events from a single graphical interface. Wireless Locking Integration By integrating a Wireless Access Control solution, system operators can manage all system users through one software interface and do not need to manage multiple user databases across multiple systems. Synchronisation of users and access permissions through a single interface allows the management of the Wireless Access Controlled doors and the standard Access Controlled doors simultaneously – mitigating the requirement to manage multiple platforms Video Surveillance Integration Utilising the Enterprise Integriti platform, system operators are able to visually verify alarm events in real-time, using video feeds from an interconnected Video Surveillance platform. Security Personnel are able to view, control and customize Video layouts all within one centrally managed system, while monitoring other access control or alarm events within the same graphical interface. Locker Integration Inner Range’s integration provides a synchronised user database providing seamless user management for KeyLocker systems. All user information is managed by Inner Range’s management software meaning that System Operators do not need to maintain two separate databases. Additionally, powerful reporting tools can be utilised to develop reports specifically relating to KeyLocker events, giving system owners full awareness of which users are trying to access which Key/KeyLocker. IR Professional Solutions Brochure More Info IR Securing High-Rise Buildings Brochure More Info Want to know more or to book a demo? Feel free to ask! Contact Us
- Commercial Buildings | Inner Range
Inner Range delivers intelligent, unified security solutions that help commercial property managers attract premium tenants through scalable, reliable, and user-friendly platforms backed by over 35 years of innovation. Securing Commercial Buildings Inner Range delivers intelligent, unified security solutions that help commercial property managers attract premium tenants through scalable, reliable, and user-friendly platforms backed by over 35 years of innovation. Challenges faced by Commercial Buildings Modern commercial buildings face growing complexity with mixed-use spaces, high tenant expectations, and the demand for seamless, secure experiences. Property managers must navigate fragmented legacy systems, rising operational costs, and the pressure to attract and retain premium tenants-all while maintaining compliance, safety, and efficient building performance. These challenges require integrated, scalable solutions that are easy to deploy and manage. Effortless Scalability for Any Site Unified Security Platform Frictionless Access & Smart Entry Connected Systems & Actionable Insights Designed with flexibility in mind, Inner Range solutions scale seamlessly from small commercial buildings to expansive, multi-site developments. As your property grows or tenant needs evolve, the system grows with you-supporting hundreds of doors, users, and integrations. Remote management, centralized dashboards, and multi-tenancy support make it simple to expand without added complexity. Effortless Scalability for Any Site Inner Range combines access control, intrusion detection, and video surveillance into one intuitive platform. This unified approach gives building managers a real-time, centralized view of all security events, streamlining incident response and reducing the need for multiple systems or interfaces. Whether monitoring a single floor or an entire campus, users benefit from fast, informed decision-making with fewer operational silos. Unified Security Platform Enhance the tenant and visitor experience with smooth, secure access powered by a single credential. Inner Range supports smart cards, mobile credentials, biometrics, PINs, and license plate recognition-ensuring quick and secure entry across various zones within your building. This reduces bottlenecks, eliminates the need for multiple passes, and boosts convenience for everyone onsite. Frictionless Access & Smart Entry Inner Range integrates with elevators, HVAC, fire systems, lighting, parking, and more-bringing all building systems into one intelligent framework. Real-time analytics and data aggregation empower facility managers to make smarter, data-driven decisions. From detecting usage patterns to identifying security gaps, Inner Range transforms building data into operational advantage. Connected Systems & Actionable Insights One Platform, Endless Possibilities Smarter Security for Commercial Buildings Access Control Inner Range provides secure and flexible access solutions using cards, PINs, mobile credentials, or biometrics. Permissions can be tailored by role, schedule, or location — ideal for multi-tenant or multi-level commercial properties. Every access event is logged in real time to maintain accountability and compliance. Video Surveillance Integration Seamlessly integrated with access and alarm systems, Inner Range enables real-time video monitoring and automatic footage retrieval during events. This improves situational awareness and ensures quick, informed responses to security incidents. Intruder & Duress Detection The system protects commercial spaces from unauthorised entry with area-based arming, schedules, and automated alarms. In emergencies, duress alerts can silently notify security teams, trigger lockdowns, or initiate custom workflows without causing panic. Facial Recognition & Biometric Access Touchless biometric access, including facial recognition, delivers high security with seamless user experience. This reduces credential sharing, speeds up entry, and adds another layer of protection for sensitive zones or restricted areas. RTLS & Contractor Tracking Real-Time Location Services (RTLS) track the live movement of staff, contractors, or assets across the facility. Combined with contractor management tools, this ensures only inducted, compliant personnel access designated zones, improving safety and visibility. Mobile App & Push Notifications Inner Range mobile apps allow authorised users to control doors, view live status, and receive instant alerts. Push notifications ensure key personnel are immediately informed of alarms or access breaches, whether on-site or remote. Analytics & Insights All system data, from access events to alarms and video, is aggregated for real-time reporting and analysis. Building managers can identify trends, improve resource planning, and enhance operational efficiency through actionable insights. Building Systems Integration Inner Range integrates with lifts, HVAC, BMS, intercoms, lockers, and license plate recognition systems. This unified infrastructure enables automation and coordination across building systems for enhanced control and convenience. Wireless & Locker Access Integration Wireless locks and smart lockers can be managed through the same access platform, simplifying credential use across doors, storage, and shared spaces. Ideal for flexible installations where cabling is limited or centralised locker access is needed. IR Securing Commercial Buildings Brochure More Info IR Enterprise Solutions Brochure More Info IR Professional Solutions Brochure More Info Want to know more or to book a demo? Feel free to ask! Contact Us
- Advanced Video Security | Inner Range
For over 36 years, Inner Range has been at the forefront of security innovation. Today, we are proud to introduce a breakthrough that redefines the future of unified security. One Powerful Platform . Total Visibility . Complete Control . For over 36 years, Inner Range has been at the forefront of security innovation, and now with the inclusion of IR Video, we have redefined the future of unified security. NDAA Compliant IR Connect IR Ready IR Platform Compatible NDAA Compliant Inner Range Video is fully compliant with the U.S. (NDAA), meeting strict supply chain and cybersecurity requirements. Approved for use in critical infrastructure and government facilities Trusted by defense, government, and enterprise sectors globally Our NDAA-compliant solutions ensure your surveillance system is secure, transparent, and meets top cybersecurity and supply chain standards Global Cloud Connected IR Video leverages IR Connect’s secure Global cloud platform to provide seamless, reliable remote access and management of your video surveillance system. This connection ensures your footage and controls are always available—whether on mobile, desktop, or integrated into your wider Inner Range ecosystem—while maintaining data sovereignty and fast, secure communications. Unified with the IR Eco-System IR Video is fully IR Ready—pre-configured and optimized for seamless compatibility with Integriti and Inception platforms. This means: Faster, easier installation with factory-set components Guaranteed sm ooth communication with Inner Range controllers and alarms Unified control of video, access, and alarms in one simple interface IR Ready turns IR Video into a true extension of your Inner Range security ecosystem—powerful, effortless, and fully connected. Supports Integriti & Inception IR Video integrates seamlessly with Inner Range’s Integriti and Inception platforms, unifying video, access control, and alarms into one easy-to-use interface. This ensures streamlined management and quick response, whether on mobile, desktop, or enterprise systems. Built on Standards. Backed by Innovation IR Video Edge Analytic Cameras are connected to smart Video Gateways that provide a path through the IR Connect cloud to deliver analytic events to Inner Range security controllers. Once an event is received at the controller this can initiate automated actions and push notifications to the IR Connect mobile app. The range of cameras provide up to 12MP of resolution, dual lights for precise night viewing, active deterrence to warn-off intruders and come in various form factors to provide a powerful and comprehensive security solution. IR Video Pro Active Deterrence Edge Cameras Learn More IR Video Pro Edge Cameras Learn More IR Video Pro Gateways Learn More IR Video Pro Brackets & Mounts Learn More IR Video Features Multiple Video Gateways Video Gateways available in 4, 8, 16, 32, or 64 channels with various storage options. IR Connect Cloud Seamless connection to the Inner Range eco-system. Automatic Firmware Updates Automatic online firmware updates ensure the latest cybersecurity and features. Smart Video Analytics Smart analytics create actionable system events within Inner Range controllers. Built-in Active Deterrence When Inner Range controllers are armed, pro-active video analytic events generate alarms in software, mobile applications and at central monitoring stations. IR Connect Mobile Review, control, manage and configure the Inner Range ecosystem in the palm of your hand. Failover Support Gateways can be added for redundancy support if one units fails and goes offline. Cameras can be automatically redirected to dedicated failover Gateways. Cost-Efficient Deployment Distributed Gateways reduce costs by saving on installation, cabling, and expensive servers. Human-Centric Video Analytics Vehicle-Centric Video Analytics Single & Double Line Crossing By defining video barrier lines we can provide real-time warning when a human crosses one or two lines in a certain direction. This analytic can trigger alert notifications and increase security at the properties boundaries. Loitering & Intrusion Loitering and intrusion detection systems use advanced sensors and intelligent analytics to identify and alert on unauthorized presence or suspicious behaviour in real-time, enhancing proactive security measures. Face Detection Face detection technology uses advanced biometric algorithms for real-time detection of human presence in a defined area significantly enhancing access control and surveillance on site. People Counting People counting systems use sophisticated sensors and algorithms to accurately track and analyze the number of individuals entering and exiting a facility, assisting crowd management and resource allocation. Human Detection Inner Range now provisions Video as a Sensor through the human detection capabilities of our cameras. The detection of a human can instigate an alarm message to a security monitoring center who can initiate first responders, activate automated actions as an alarm response to the intrusion and send push notifications to user of the IR Connect mobile App. Vehicle Detection Vehicle detection systems use cutting-edge AI and sensor technology to monitor and differentiate vehicle movement, enhancing intrusion detection, situational awareness and security response efficiencies. Wrong Way Wrong-way car detection systems use advanced sensors and AI to identify and alert on vehicles travelling in the wrong direction, preventing accidents and ensuring traffic safety. Single & Double Line Crossing By defining video barrier lines we can provide real-time warning when a human crosses one or two lines in a certain direction. This analytic can trigger alert notifications and increase security at the properties boundaries. Illegal Parking Detection When configured can detect vehicles parked illegally and generate notifications. IR Video Pro 8 Channel Gateway IR VIDEO Pro 8ch POE Gateway, 8 PoE Port, 2 Bay, 1RU, 4TB IR Video Gateways Inner Range Video Gateways link Edge Analytic Cameras to our connected ecosystem via IR Connect, delivering smart video, real-time analytics, and Active Deterrence across our Professional and Enterprise platforms. IR Video Pro 4 Channel Gateway Learn More IR Video Pro 8 Channel Gateway Learn More IR Video Pro 16 Channel Gateway Learn More IR Video Pro 64 Channel Gateway Learn More IR Video Pro 32 Channel Gateway Learn More Built for the Future of Connected Security, significant development resources have gone into the creation of IR Connect, resulting in a robust, scalable platform designed to support the evolving ecosystem of Inner Range connected devices, as well as the needs of security professionals and end users alike. This forward-thinking platform serves as the foundation for the next generation of smart security solutions, making it easier than ever for users to control and monitor systems from virtually anywhere. Whether managing multiple sites or streamlining across teams, IR Connect empowers users with more control, flexibility, and security. Built for the Future of Connected Security IR Enterprise Solutions Brochure More Info IR Professional Solutions Brochure More Info Want to know more or to book a demo? Feel free to ask! Contact Us
- Advanced Security Solutions for Education | Inner Range
Ensure the safety of educational environments with Inner Range's cutting-edge security solutions. Specialised for schools and universities to manage complex security needs. Securing Education Schools and Universities are becoming larger, more populated, and are most of the time easily accessible. Inner Range systems are the perfect solution for protecting and managing small and large institutions. Challenges faced by Education Universities have evolved from simply a precinct full of lecture theatres into complex “cities within cities” focussing on collaborative learning, innovation and research. These institutions must be open and welcoming environments for students and staff; however, they face complex security risks ranging from Active Shooters to highly organised demonstrations. These environments demand a wholistic security management system that can deliver enterprise grade security functionality as well as provide comprehensive integrations with Intelligent Building Systems and Education Software. Centralised Management Of Multiple Systems Student Staff and Safety Incident Management Student Verification at Exams University security management centers require management of real-time information from multiple Intelligent security systems. These include Intruder Detection, Access Control, Video Surveillance, Intercoms, Duress systems, and BMS amongst others. Integriti software is the perfect platform to deliver this information in a user friendly and actionable format. Inner Range software can manage and prioritise this vast amount of information in real-time and provide integrations with other University IT systems. Integrations with Student Databases and Student Management systems mean that student enrolment and provision of access cards can be completed from dedicated enrolment software and automatically updated into the Integriti access system. Centralised Management Of Multiple Systems Inner Range ensures that only authorised staff and students are permitted in restricted areas, whilst being free to access common areas. Access credentials can be integrated into the Universitoties own smart phone App and integration with Tmetable managements sytems mean that students can only access lecture theatres when they have a scheduled class. Student residence halls, which often use a dedicated wireless access control system, can also be fully administered from the Integriti software via Integriti’s integrations with a large range of leading wireless access control systems. Students and Staff Safety – Managing Access In the unfortunate case of a serious security event occurring, Inner Range forms a critical part of management and containment of serious incidents. In an Active Shooter scenario Inner Range has a comprehensive set of door lockdown features that can assist in containing threats to specific areas. Lockdowns can be triggered from controls within Integriti software, hardwired controls, or other software systems. Groups of doors that are placed in Lockdown will only be accessible by a special class of users such as first responders and security guards. With integrations to gunfire identification analytics engines that immediately notify stakeholders of an incident even before staff or student have reported an issue. Incident Management –Active Shooter Duress alarms can be raised from onsite help stations, university smart phone apps, or security guards equipped with mobile duress systems. When a duress alarm is raised, guards, staff and other stakeholders can be immediately notified through the Inner Range messaging application – Communicator-- which will broadcast texts and emails. Video surveillance integration can provide control rooms with immediate access to live and recorded video associated with the Duress Alarm displayed on a schematic map which shows the exact location of the incident. Inner Range also offers guard and welfare check functionality so that a student’s status within onsite accommodation can be checked and confirmed. Student and Staff Safety - Localised Duress and Welfare checks The innovative mobile reader application confirms students’ identities at exam entry points. This application allows university administrators to ensure that the photograph on the student card presented at the exam entrance is that of the individual actually taking the exam. Identity checks at examinations Universities require the services of hundreds of independent contractors who require access to university facilities. In addition to its native functionality Inner Rage also seamlessly integrates with dedicated contractor management systems. These systems ensure contractors are provided temporary access credentials and have complied with onsite health and safety protocols. In addition, contractor invoices can be reconciled with the actual time that contractors spend on site. Contractor Management One Platform, Endless Possibilities Education Organisations that trust Inner Range Features that ensure the safety and security of students, teachers and visitors to educational facilities Analytics Integration Reducing the time to acquire and interpret information, data analytic technology advances the intelligence of not only the security system, but also the building applications. Those systems use their own communication protocols, and Inner Range acts as a data aggregator to normalize that data. By communicating with other systems, the pattern recognition in the analytics can predict how and when events may occur and trigger efficient use of other resources. If the analytic recognizes trends of attendance, it can help control building lighting resources. In the past, intrusion and access control systems were ignored as being an expense, but now they can help create the intelligent building. Access Control Our comprehensive access control system ensures that only authorised staff and students are permitted in restricted areas, whilst being free to access common areas. Access credentials can be integrated into the university's own smartphone App and integration with Timetable management systems mean that students can only access lecture theatres when they have a scheduled class. Student residence halls, which often use a dedicated wireless access control system, can also be fully administered from the Inner Range Enterprise Software which is integrated with many of the world’s leading wireless locking solutions. Intruder Detection Notifying the correct authority of unwanted persons in an area or on a property in an appropriate timeframe helps prevent loss. Escalation of specific events to the correct responder allows them to make better decisions for resolving the issue. Providing up to 14 levels of response to various alarm scenarios. The events that occur when an intruder attempts to gain access to a controlled area may need to be handled in unique ways. By providing those standard operating procedures for each type of event, responders can mitigate risks and liability. Duress Alarms During an emergency event, people want to notify someone to come assist them in solving a problem. To get the message to a responding authority, duress alarms can trigger a response from the appropriate team. These alarms may be a push button underneath the desk of a receptionist, or they can be a button on an emergency telephone in the middle of the university campus. Regardless of the location of the button, these systems trigger immediate notification of an event to first responders to assist the person in need. Inner Range allows the control of alarms such that if it is not responded to in a determined time period, it can be escalated to a higher authority. Facial Recognition Integration Access to an area is controlled by what you have (card or other physical identification), what you know (code) and who you are (biometric identifier). Integration with a video surveillance system allows the analytics to be integrated with the access control application to provide the Who You Are component of access control. This identification of a person by a camera, as well as the credentials that the person holds or knows, can assist in assuring that the correct people are in the proper area. Facial recognition analytics can act as the credential to allow a person to gain entry to a building or area. Video Surveillance Integration Utilising the Enterprise Integriti platform, system operators are able to visually verify alarm events in real-time, using video feeds from an interconnected Video Surveillance platform. Security Personnel are able to view, control and customize Video layouts all within one centrally managed system, while monitoring other access control or alarm events within the same graphical interface. Contactor Management Integration Making sure that the correct company is on your property and performing the necessary responsibilities proves daunting with the amount of work expectations that exist. Being able to verify that not only did the correct person arrive on property, but also that they spent the time that was charged, becomes a logistical challenge. Inner Range can provide reports identifying when the contractor came to and left your facility as well as any areas they accessed. This allows the verification of invoices as well as job completion. RTLS Integration Real-Time Location Systems are commonly deployed in high-security situations, and allow Security Operators to maintain accurate status and location of Security Personnel in real-time. The RTLS integration with the Enterprise Platform Integriti, allows for status updates and location monitoring via the same graphical interface as every other aspect of the system (including integrated Video Surveillance, Intercoms, etc.). While increasing security and safety of staff, this integration improves situational awareness of Security Personnel in high security situations. Mobile Apps with Push Notification Providing information immediately has become the expectation of society and in critical situations on campus it is expected that students, staff and visitors be notified about critical situations instantly. Mass notification of the events on campus can save lives and assist responders with management of the situation, whether it be critical, urgent or just informational. Notifications to be sent to specific groups of people based upon the type of event on campus. IR Professional Solutions Brochure More Info IR Securing Schools and Universities Brochure More Info Want to know more or to book a demo? Feel free to ask! Contact Us
- Secure Retail Banking Solutions | Inner Range
Optimise retail banking security with Inner Range Integriti Systems. Safeguard customers, staff, and assets with our advanced access control and intruder detection features. Brick and mortar banking retailers face an extremely challenging business environment with hyper competition from online retailers and a range of diverse challenges. Securing Retail Banking With significant cost pressures from disruptive digital competitors, retail banks are transforming into customer relationship centers. As bank branches transform there is still a critical need to keep Customers and Staff safe and ensure cash holdings are stored securely. Challenges faced by Banking Retailers Prevention of Robbery & Theft Protecting Staff & Customer in a high risk environment Contractor Management Focus on Customer Experience Inner Range offers a dedicated set of intrusion detection features to assist with the protection of retail banking environments. These features include safety screen control, airlock control, and redundant back-to-base monitoring with Multipath IP. Access Control features ensure that only authorised staff are permitted in restricted areas, while customers are free to browse in show room areas. Additionally, staff can have access to restricted areas only during time periods where they have a valid reason to enter secured spaces. Prevention of Robbery & Theft Retail Banking environments suffer the very real risk of robbery by armed offenders. Inner Range offers fixed and mobile duress solutions, whereby police or security guards can immediately be notified when a dangerous situation occurs. Silent duress options specifically designed for the banking industry are also available. Intruder alarms, duress alarms, and video surveillance can all be accessed from a single user interface to ensure a rapid response to critical situations. Protecting staff and customers in a high-risk environment Large Retail banking chains require the services of hundreds of independent contractors who require access to retail premises. Inner Range provides a contractor management platform native to our software suite, as well as seamlessly integrating with third-party, dedicated contractor management systems. These systems ensure contractors are provided temporary access credentials and have complied with onsite health and safety protocols. In addition, contractor invoices can be reconciled with the actual time that contractors spend on site. Contractor Management Retail bank branches now provide an important differentiator to digital-only banks, with face-to-face interactions providing a unique opportunity to build trust and relationships with customers. Inner Range systems seamlessly integrate with Video Management Systems and Analytics engines that can assist with queue management and meeting room allocation. Facial recognition systems can also identify VIP customers. Secured spaces are kept safe while still providing an open and frictionless environment to develop relationships with customers. Focus on customer experience One Platform, Endless Possibilities Retail Banking Organisations that trust Inner Range Powering Retail Banking Environments Access Control Allowing the approved persons to be in the places that they need to complete their job is critical. But even more critical is preventing unapproved persons from accessing secure areas. This protects the people and assets of the organization and can also reduce other costs such as insurance. By Integrating with other building systems such as HVAC, lighting, audio, and others provides better physical security and can also reduce the utility costs such as electrical and heating. Intruder Detection Notifying the correct authority of unwanted persons in an area or on a property in an appropriate timeframe helps prevent loss. Escalation of specific events to the correct responder allows them to make better decisions for resolving the issue. Provides up to 14 levels of response to various alarm scenarios. The events that occur when an intruder attempts to gain access to a controlled area may need to be handled in unique ways. By providing those standard operating procedures for each type of event, responders can mitigate risks and liability. Facial Recognition Integration Access to an area is controlled by what you have (card or other physical identification), what you know (code) and who you are (biometric identifier). Integration with a video surveillance system allows the analytics to be integrated with the access control application to provide the Who You Are component of access control. This identification of a person by a camera, as well as the credential that the person holds or knows, can assist in assuring that the correct people are in the proper area. The identification of an individual through the cameras analytics can be used as the credential to allow a person entrance to a building or area. Contactor Management Integration Making sure that the correct company is on your property and performing the necessary responsibilities proves daunting with the amount of work expectations that exist. Being able to verify that not only did the correct person arrive on property, but also that they spent the time that was charged, becomes a logistical challenge. Inner Range can provide reports identifying when the contractor came to and left your facility as well as any areas they accessed. This allows the verification of invoices as well as job completion. Duress Alarms Duress alarms are a critical component of Retail Banking environments to ensure the safety and wellbeing of both staff and customers at the premises. It is vital that in duress alarms are reported to a responding authority, facility management and other staff ensuring that appropriate responses are activated. These alarms may be a push button underneath the desk of a teller or a wireless wearable duress alarm transmitter. Regardless of the location of the button, these systems trigger immediate notification of an event to first responders to assist the person in need. CCTV Integration Utilising the Video Surveillance Integration platform, system operators can visually verify alarm events in real-time, using video feeds from an interconnected Video Surveillance platform. Security Personnel can view, control and customize Video layouts all within one centrally managed system, while monitoring other access control or alarm events within the same graphical interface. Analytics Integration Reducing the time to acquire and interpret information, data analytic technology advances the intelligence of not only the security system but also the building applications. Those systems use their own communication protocols, and Inner Range acts as a data aggregator to normalize that data. By communicating with other systems, the pattern recognition in the analytics can predict how and when events may occur and trigger efficient use of other resources. If the analytic recognizes trends of attendance, it can help control building lighting resources. In the past, intrusion and access control systems were ignored as being an expense, but now they can help create the intelligent building. IR Professional Solutions Brochure More Info IR Securing Retail Banking Brochure More Info Want to know more or to book a demo? Feel free to ask! Contact Us
- Retail Security Solutions | Inner Range
Enhance retail security with Inner Range's Integriti systems. Protect against theft, ensure safety, manage contractors, and optimize space for profitability. Securing Retail From single-store small business ventures, to billion dollar multi-tenanted shopping centers, Inner Range systems are the perfect solution for protecting and managing retail environments. Challenges faced by Retailers Brick and mortar retailers face an extremely challenging business environment with hyper competition from online retailers and a range of diverse challenges. Prevention of theft, shoplifting and burglary Ensuring the safety of Customers and Staff Contractor Management Maximising the profitability of expensive retail spaces An Inner Range Access Control system ensures that only authorised staff are permitted in restricted areas such as stock warehouses and administration spaces, while customers are free to browse in showroom areas. Additionally, staff can have access to restricted areas only during time periods when they have a valid reason to enter secured spaces. Inner Range Intrusion Detection systems provide retail managers peace of mind that their retail locations are fully secured outside trading hours with high security, redundant back-to-base monitoring, plus integrated video and alarm information pushed to delegated staff’s mobile devices. Prevention of Theft, Shoplifting and Burglary Retail environments suffer challenges from violent and abusive customers, while high value retail outlets such as jewellery stores or designer clothes outlets suffer the very real risk robbery by armed offenders. The Inner Range Enterprise Platform offers comprehensive fixed and mobile duress solutions, whereby management or security guards can immediately be notified when a dangerous situation occurs. In addition, Integriti integrates with Real Time Location Systems (RTLS) which send duress and location information that can generate alarms to notify relevant stakeholders with locations displayed on Integriti’s floor plan (Schematic) application. Safety of Staff and Customers Large shopping centers often require guards to patrol the facilities both during and after business hours. Integriti’s guard tour functionality ensures guards present credentials at various locations to ensure the patrols are being undertaken; additionally alarms can be raised if guards do not present within a given time period. Integriti has native functionality to handle the challenges of managing hundreds of contractors who require access to retail premises. In addition to its native functionality, Integriti also integrates with dedicated contractor management systems. These systems ensure contractors are provided temporary access credentials, and have complied with onsite health and safety protocols. Contractor Management +Guard tour Integriti systems seamlessly integrate with Video Management Systems and Analytics engines that can provide sophisticated retail optimisation solutions. These include people counting, heat maps to track the spaces where customers spend time and xyz. Additional facial recognition systems can also be used to identify VIP customers queuing bottle necks. Maximising the profitability of expensive retail spaces One Platform, Endless Possibilities Retail Organisations that trust Inner Range IR Professional Solutions Brochure More Info IR Securing Retail Brochure More Info Want to know more or to book a demo? Feel free to ask! Contact Us Features that Power Retail Environments Analytics Integration Reducing the time to acquire and interpret information, data analytic technology advances the intelligence of not only the security system, but also the building applications. Those systems use their own communication protocols, and Integriti acts as a data aggregator to normalize that data. By communicating with other systems, the pattern recognition in the analytics can predict how and when events may occur and trigger efficient use of other resources. If the analytic recognizes trends of attendance, it can help control building lighting resources. In the past, intrusion and access control systems were ignored as being an expense, but now they can help create the intelligent building. Access Control Allowing the approved persons to be in the places that they need to complete their job is critical. But even more critical is preventing unapproved persons from accessing secure areas. This protects the people and assets of the organization and can also reduce other costs such as insurance. Integriti performs these functions and offers many additional links to other building and property applications. Intruder Detection Notifying the correct authority of unwanted persons in an area or on a property in an appropriate timeframe helps prevent loss. Escalation of specific events to the correct responder allows them to make better decisions for resolving the issue. Providing up to 14 levels of response to various alarm scenarios. The events that occur when an intruder attempts to gain access to a controlled area may need to be handled in unique ways. By providing those standard operating procedures for each type of event, responders can mitigate risks and liability. Duress Alarms During an emergency event, people want to notify someone to come assist them in solving a problem. To get the message to a responding authority, duress alarms can trigger a response from the appropriate team. These alarms may be a push button underneath the desk of a receptionist, or they can be a button on an emergency telephone in the middle of the university campus. Regardless of the location of the button, these systems trigger immediate notification of an event to first responders to assist the person in need. Inner Range’s Enterprise Platform allows the control of alarms such that if it is not responded to in a determined time period, it can be escalated to a higher authority. Facial Recognition Integration Access to an area is controlled by what you have (card or other physical identification), what you know (code) and who you are (biometric identifier). Integration with a video surveillance system allows the analytics to be integrated with the access control application to provide the Who You Are component of access control. This identification of a person by a camera, as well as the credential that the person holds or knows, can assist in assuring that the correct people are in the proper area. Integriti can even use just the triggered response of the camera analytic as the credential to allow a person entrance to a building or area. Video Surveillance Integration Utilising the Enterprise Integriti platform, system operators are able to visually verify alarm events in real-time, using video feeds from an interconnected Video Surveillance platform. Security Personnel are able to view, control and customize Video layouts all within one centrally managed system, while monitoring other access control or alarm events within the same graphical interface. Contactor Management Integration Making sure that the correct company is on your property and performing the necessary responsibilities proves daunting with the amount of work expectations that exist. Being able to verify that not only did the correct person arrive on property, but also that they spent the time that was charged, becomes a logistical challenge. Integriti can provide reports identifying when the contractor came to and left your facility as well as any areas they accessed. This allows the verification of invoices as well as job completion. RTLS Integration Real-Time Location Systems are commonly deployed in high security situations, and allow Security Operators to maintain accurate status and location of Security Personnel in real-time. The Enterprise Platform Integriti, allows for status updates and location monitoring via the same graphical interface as every other aspect of the system (including integrated Video Surveillance, Intercoms, etc.). While increasing the security and safety of staff, this integration improves the situational awareness of Security Personnel in high-security situations. Mobile Apps with Push Notification Knowing information immediately has become the expectation of society. With a smart phone, apps have become the new normal. In access control and intrusion systems, various alarms and events need to be conveyed to the correct responder as quickly as possible. Push notification of the events at a customer site assists them with management of the situation, whether it be urgent or just informational.
- Alarm Monitoring Solutions | Inner Range
Discover how our multipath IP monitoring centers can benefit your local business in New Zealand and Australia. Partner with us for reliable monitoring solutions. Multipath IP Monitoring Centers Multipath IP is one of the most popular alarm transmission packages among leading monitoring centers today. Future-proof software along with ahead-of-the-game field hardware makes Multipath IP a force to be reckoned with throughout the alarm monitoring industry. To find a central monitoring station in your area that has taken their alarm monitoring to the next level with Multipath IP, select your loction below. Australia Australian Capital Territory New South Wales Queensland South Australia Tasmania Victoria Western Australia New Zealand Thank you for your interest in becoming a partner. Please fill out this form to begin your journey to becoming a Multipath Partner. Become a partner Name Email Company Name Address City State/Region Zip/Post Country Phone Enquiry Detail Submit IR Multipath Brochure More Info Want to know more or to book a demo? Feel free to ask! Contact Us
- Mobile Access | Inner Range | Integriti Solution
Utilizing smartphone Bluetooth technology for building access control enhances the flexibility of traditional security measures offering convenience, enhanced functionality and more accurate identification of who is on site and when. Inner Range Mobile Access Utilizing smartphone Bluetooth technology for building access control enhances the flexibility of traditional security measures offering convenience, enhanced functionality and more accurate identification of who is on site and when. Users gain entry to buildings by approaching the Bluetooth enabled readers at the access points and unlock the door with their smart phones eliminating the need for physical keys or access cards. Inner Range puts SECURITY FIRST Inner Range puts SECURITY FIRST when it comes to controlling access to a premises. The systems hardware infrastructure is installed securely on site behind the network security policies of the organisation ensuring that critical data is safe and secure from would be hackers or cyber criminals. Unlike other cloud-based security systems, the Inner Range solution keeps all critical information and user data secure in the controller and onsite software. However, we also provide an exceptional remotely connected end user experience through our IR Connect cloud connected service. Total cost of ownership is dramatically reduced by not having costly cloud based subscription services that also expose your organisation to cybercrime. Cloud-Connected Control Centralized access control management seamlessly connected through the cloud for ease of use from any remotely connected location. Local Secure Management Access control managed locally on-site behind the network security policies of the organisation. Authorized Entry Only Ensuring that who is on site is accurately identified and is permitted on site. Scalable Access Control Scalability from entry to enterprise global projects with varying numbers of users and locations. Real-Time Alerts Real-time monitoring and reporting of access events. System Integration Easily integrated to other cloud connected services and sub systems (e.g., video surveillance, visitor management) Encrypted Security Enhanced security through encrypted communication and authentication protocols. Custom User Roles Customizable access levels and permissions for different user roles. The Mobile Access Readers and Keypads are a combined Bluetooth enabled, IP67 rated, SIFER Smart Card Keypad and Reader that supports both Bluetooth mobile credentials and SIFER physical access cards and fobs as well as PIN (Keypad version) for access control. The Keypad / Reader allows dual credential Mobile Credential / Card & PIN high security access control (PIN only or Mobile Credential / Card only is also supported). They are multi-drop RS-485 based devices that employ 128-bit AES encryption from the card through to the door module, providing a far superior level of security than that of traditional Wiegand based card readers. They utilise the Mifare DESFire© EV1/EV2/EV3 card format and utilise a superset of the OSDP protocol, which allows the Readers and Keypads to be deployed on any system capable of using OSDP. They are connected to the RS-485 reader port for full Reader-In and Reader-Out operation of various Inner Range products as below. Integriti Access Controller (IAC) - Up to 16 Readers on-board. Intelligent LAN Access Module (ILAM) - Up to 16 Readers. Standard LAN Access Module (SLAM) - Up to 4 Readers. Inception Controller - Up to 8 Readers on-board. The Mobile Access Keypads and Readers are IP67 rated and available with site-specific encryption keys. Mobile Access Reader & Keypad The Inner Range Mobile access credentials are created, managed and delivered by the security controller onsite that is installed safely behind the network security infrastructure and cyber security policies of the orgsanisation. Securely delivered through the IR Connect cloud service to the end users smart device, the Mobile Access credential is then accepted and saved into the IR Mobile Access Mobile App that is installed on the smart device. When access to a door is required the smart device is unlocked, the IR Mobile Access App is opened and then the appropriate door is selected and unlocked. This process provides user authentication through the devices biometric credential ensuring the identity of the user. Mobile Access credentials are available for: Inception – 994635ICP Integriti - 994635 Infiniti - 994635INF Mobile Access Credentials Inner Range Readers, Credentials and Mobile Access Brochure More Info Want to know more or to book a demo? Feel free to ask! Contact Us
- Distribution Center | Inner Range
Distribution centers are vital to supply chains, where downtime or theft can cause major losses. Inner Range systems safeguard staff, stock and operations with advanced access control, intrusion detection and video integration, keeping facilities secure and running smoothly. Securing Distribution Center Distribution centers are vital to supply chains, where downtime or theft can cause major losses. Inner Range systems safeguard staff, stock and operations with advanced access control, intrusion detection and video integration, keeping facilities secure and running smoothly. Challenges Faced by Distribution Center Operators Distribution center operators face a unique set of challenges that extend beyond standard logistics and inventory management. These high-volume facilities must remain secure while handling constant staff, contractor and vehicle movements. Operators need to guard against theft, vandalism and unauthorised access, all while maintaining strict delivery schedules and ensuring goods flow without disruption. Balancing security with efficiency is critical to keeping supply chains moving and customer expectations met. Advanced Access Control Integrated Video Surveillance Intrusion Detection Real-Time Monitoring Inner Range’s access control system helps distribution centers maintain strict control over who enters secure areas. By allowing only authorised staff, contractors, and vehicles to access designated zones, it reduces the risk of internal theft and operational disruptions. Zone-based permissions and time restricted access ensure that sensitive areas like loading docks, inventory rooms, and server spaces remain protected at all times. This system also supports vehicle access management, streamlining the flow of deliveries and service vehicles. Advanced Access Control In busy distribution centers, visibility is key to maintaining safety and efficiency. Integrated video surveillance connects camera footage directly to access events, so when someone enters a restricted area, the system instantly displays the relevant video. This allows security teams to quickly verify activity and respond to any suspicious behaviour. Cameras can be placed throughout the facility—from entry points to storage aisles—providing comprehensive coverage and helping prevent incidents before they escalate. Integrated Video Surveillance Distribution centers are vulnerable to theft and vandalism, especially during off-hours. Inner Range’s intrusion detection system uses motion sensors, door contacts, and glass-break detectors to monitor key entry points such as emergency exits and warehouse doors. The system can be armed when the site is closed and disarmed during operational hours, ensuring continuous protection without interfering with daily routines. If a breach occurs, alerts are sent immediately, allowing for fast response and minimising potential losses. Intrusion Detection Real-time monitoring gives managers full visibility into site activity and system status. Through a central dashboard, they can see who is on-site, which zones are active, and whether any alarms have been triggered. This helps teams respond quickly to security breaches, equipment faults, or unusual behaviour. Integration with building systems also allows monitoring of temperature, lighting, and energy usage—critical for handling sensitive goods and maintaining operational efficiency. Real-Time Monitoring One Platform, Endless Possibilities Smarter Security for Distribution Centers Facial Recognition & Biometric Access Fingerprint and facial recognition from Inner Range add secure, non transferable access to sensitive zones. These biometric systems prevent credential sharing and streamline entry for frequent users, offering both enhanced protection and operational convenience. RTLS & Contractor Tracking Track staff and contractors in real time across the site. Inner Range integrates with RTLS to improve safety and emergency response. RTLS & Contractor Tracking Track staff and contractors in real time across the site. Inner Range integrates with RTLS to improve safety and emergency response, allowing managers to monitor movement across zones, verify presence in authorised areas, and quickly locate personnel during audits or critical incidents. This level of visibility is especially valuable in large distribution centres where operational flow and compliance are tightly managed. Mobile App & Push Notifications Receive instant notifications and manage access remotely using the IR Connect app, ideal for fast-moving operations. With mobile control, managers can respond to alarms, adjust permissions, and view system status from anywhere on-site or off-site, ensuring that security decisions are made quickly and without delay. Analytics & Insights Inner Range provides data to help optimise shifts, reduce bottlenecks, and improve site performance. These insights allow distribution centres to identify access trends, monitor alarm frequency, and make informed adjustments to staffing and zone usage, ultimately enhancing both security and efficiency. Building Systems Integration Inner Range links access control with lighting, HVAC, and fire systems for smarter energy use and emergency automation. This integration ensures that environmental systems respond dynamically to occupancy and that safety protocols activate instantly when needed. Wireless & Locker Access Integration Smart lockers and wireless locks supported by Inner Range simplify secure access for temporary staff and deliveries. Credentials can be issued remotely and set to expire automatically, making it easier to manage short-term access while maintaining long-term control. IR Distribution Centers Brochure IR Professional Solutions Brochure IR Enterprise Solutions Brochure More Info More Info More Info Want to know more or to book a demo? Feel free to ask! Contact Us

