Why Choose Our Alarm Systems?
32 programmable user PIN numbers with associated Access Control card or Mobile token
8 programmable time periods for allowing access, driving automation and control
32 programmable automated actions to compliment security, access control or automation events
25K event log for reviewing system and alarm conditions
4 programmable alarm areas allowing specific zones to be Armed / Disarmed independently
System notifications can be sent to Mobiles or to security monitoring centres
Hardware Capabilities
Web Powered Convenience
Immediate notifications for alarm events to your mobile phone
Arm and disarm your security system remotely
Supports multiple sites and security areas
Remotely turn on and off locks and appliances
Notification and event history
App pin entry and lock
Touch Screen Interface
Providing a sleek, clear, concise and simple to use interface for the management of your security solution has been the primary design driver for the Inner Range Touch Screen. This interface performs typical security operations including the control of security areas, door access, event activity review and controlling the state of automation outputs.

ELITEX Terminal
The EliteX keypad is elegantly designed and features a clear and easy to read OLED display. Users can use the keypad to perform typical operations such as control of security areas, door access, event activity review and controlling the state of automation outputs.
Access Control Reader & Keypads
Inner Range Smart Card readers and keypads use AES 128-bit encryption for secure end-to-end communication from card/fob to system. They offer superior access control, allowing authorised users to unlock doors and disarm alarms simultaneously, or arm the system by tapping the card three times. Keypad models support two-factor authentication via PIN and card.
Credentials
SIFER cards and fob credentials employ 128-bit AES encryption from the card through to the door module, providing a far superior level of security for your home. These credentials cannot be cloned and are specific to your system. Mobile access credentials are issued from the Inception controller, by email, to the Smart Mobile Device and enable your mobile phone to be the access control credential.
IR VIDEO HARDWARE
Video Gateways available in 4, 8, 16, 32, or 64 channels with various storage options.
Connected to the IR Connect cloud service for seamless cloud integration.
Automatic online firmware updates ensure the latest cybersecurity and features.
Smart analytics are sent to Inner Range controllers for actionable system events.
Gateways include Active Deterrence, with alarms communicated to controllers, software, and connected devices.
Distributed Gateways reduce costs by saving on installation, cabling, and expensive servers.
IR VIDEO Edge Analytic Cameras
Activates sirens and flashing lights on intrusion detection, delivering instant alerts and visual deterrence to prevent unauthorized access.
People counting systems use advanced sensors and algorithms to track entry and exit, aiding crowd management and efficient resource allocation.
Human and vehicle detection systems use advanced AI and sensors to distinguish movement, improving intrusion detection, situational awareness, and response efficiency.
People counting systems use advanced sensors and algorithms to track entry and exit, aiding crowd management and efficient resource allocation.
Loitering and intrusion detection systems use smart sensors and analytics to detect unauthorized presence or suspicious behavior in real time, enabling proactive security.
Wrong-way car detection systems use advanced sensors and AI to detect vehicles moving in the wrong direction, helping prevent accidents and enhance traffic safety.