Download PDF version Contact company

Figures show one in ten employees will have their security username or password compromised by cybercriminals. For people operating access and security systems, preventing this kind of cyber breach is even more important. Tim Northwood, director of Inner Range, discusses how Two Factor Authentication (2FA) provides an extra layer of cyber security for customers.

Benefits of 2FA

Two Factor Authentication (2FA), which is offered by Inner Range’s intelligent integrated access and security management system, Integriti, ensures operators must present their usual username and password as well as an additional security credential. This includes extra security passwords or memorable information, biometrics such as thumb or fingerprints and facial scans, or a code received on a registered device, such as via an app on a mobile phone.

Using 2FA means customers can rest assured that any potential rogue users with stolen usernames and passwords will still be denied access.

Easy company-wide setup

If anyone forgets their device needed to generate 2FA codes, a system administrator can provide a single-use login token

The initial set-up for company-wide use of 2FA within Integriti can be completed within a few minutes by activating 2FA and adding it to a security policy that makes 2FA a requirement for system operators. Operators are then asked to enroll in 2FA at their next login. For this, they are prompted to scan a QR code using a compatible authenticator app on a mobile phone or another device and enter the 6-digit code provided.

Enrolled operators need to enter the code provided by the authenticator each time they log in. The codes time out after 30 seconds to ensure maximum security. If anyone forgets their phone or device needed to generate 2FA codes, a system administrator can provide a single-use login token.

Robust cyber strategy

Inner Range is proud of its 30+ years with not a single reported cyber breach. In 2020, it announced a new coordinated cyber strategy to ensure the most robust security for customers. This included forming a cross-functional cyber security governance committee that brings together senior representatives from research and development, production, technical support, and IT as well as the executive leadership team.

They manage and update cyber security policies and procedures affecting all Inner Range activities consistently and holistically. It also ensures all networked products undergo penetration testing by independent accredited laboratories to assess security and probe for vulnerabilities.

Cyber threat assessment and installation 

Inner Range offers cyber hardening installation guidelines to integrators and end-users

Cyber threat assessment is included at every stage of Inner Range’s product development process. Aside from penetration testing, strict access control permissions are allocated to source code to ensure only relevant staff have access to code repositories. Inner Range only deploys hardened cyber security technologies.

For example, cloud services Multipath and SkyCommand are hosted in an industry-pioneering cloud hosting environment that offers redundancy and load-balancing across multiple locations and comes with certifications from ISO/IEC, CSA, ITAR, CJIS, HPIAA, and IRS 1075.

Finally, it offers cyber hardening installation guidelines to integrators and end-users to ensure systems are installed and managed securely. The guides include recommendations around security, network access control, firewalls, identity management, and vulnerability management.

Download PDF version Download PDF version

In case you missed it

Alamo enhances security with Alcatel-Lucent solutions
Alamo enhances security with Alcatel-Lucent solutions

Alamo Colleges in San Antonio, Texas supports more than 65,000 students and 7,000 staff. It's five campuses and smaller regional learning centres connect students and staff, expan...

When choosing an access solution, make total cost of ownership a key part of the calculation
When choosing an access solution, make total cost of ownership a key part of the calculation

Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many...

The Camp: Enhance security with ASSA ABLOY Aperio wireless locks
The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

As a provider of future-oriented business education, The Camp sought an access control solution as forward-thinking as their courses. Their campus site near Aix-en-Provence is div...

Quick poll
What's the primary benefit of integrating access control with video surveillance?