Integriti
Inner Range Integriti Design & Deployment
The IP-connected Integriti Access Control & Security System is highly expandable, offering options from a single site to an enterprise-scale security system with numerous users, doors, and events across multiple sites.
Integriti can integrate with third-party hardware and software. This includes building management systems (BMS), HR platforms, Windows Active Directory, CCTV systems, lift systems, lighting, HVAC, and fire.
Integriti Software Editions
Integriti offers three primary software editions. The appropriate edition depends on the required number of users, integration needs, and access to advanced features.
All editions include Integriti GateKeeper for everyday cardholder programming, system monitoring and control, and Integriti System Designer for complete system programming and configuration.
The Integriti Professional, Integriti Business, and Integriti Corporate Software Editions provide everything needed for complete system management. Upgrading between Editions is easy, allowing your Integriti system to expand as your needs and requirements grow.
Integration with Third-Party Systems
Inner Range Integriti is a sophisticated access control and security system that can integrate with a wide range of systems to create a comprehensive security solution. Examples of systems that can be integrated with Inner Range Integriti include:
- CCTV Systems: Integriti can integrate with CCTV systems like AXIS and Avigilon. This lets events in one system match events in the other. This integration enhances security by linking access control events with video surveillance.
- Building Management Systems (BMS): Integriti can control and communicate with other systems for elevators, heating, cooling, and lights. This makes it a flexible solution for building automation.
- Active Directory: Integriti supports integration with Microsoft Active Directory, allowing for streamlined management of security and access control information, such as user permissions.
- Access Control: The Integriti Access Controller (IAC) can manage up to 8 doors locally. It can also handle up to 240 doors through RS-485 Sub-LAN expansion. This shows its ability to grow in access control applications.
- Intercom Systems: Integration with intercom systems, such as BAS-IP, allows Integriti users to initiate and end intercom calls directly from the Integriti interface, stream live video from intercoms, and covertly monitor intercoms when required.
- Visitor Management Systems: Sine Visitor Management improves Integriti’s features. It boosts safety, security, and compliance for visitors, contractors, staff, and assets. It allows for automatically generating access credentials and permissions for visitors and contractors.
- High-Rise Building Management: Integriti is ideal for managing access and security in tall buildings. It integrates with systems for video surveillance, elevator control, and other amenities such as gyms, pools, and parking areas.
- 2N IP-based Intercom Systems: This integration allows for standard intercom functions and advanced actions based on intercom notifications, such as covertly monitoring audio or video and managing intercom settings through the Integriti platform.
Inner Range Integriti High Availability & Fault Tolerance
Inner Range Integriti ensures high availability and fault tolerance by allowing multiple installations of the Integriti services, which can connect to any available server. This setup aims to ensure high availability and fault tolerance. It uses Microsoft Failover Clustering and a Microsoft SQL Cluster.
The Integriti system consists of three server components: the Application Server, the Controller Server, and the Integration Server. Each maintains an independent connection to the SQL cluster and all application servers in the cluster.
The system employs Integriti Active Clustering. Within this framework, all services are perpetually active and treated uniformly. The system does not configure them in a primary/backup manner.
An Additional Server Node (High Availability) license must be purchased when a new server is added to the cluster. This license allows the activation of an additional application server on the same database cluster as the initial machine used to configure the system. The license key includes data that cryptographically pairs the machine with the cluster, preventing unauthorized servers from attaching.
Each service connects to the SQL cluster and registers its connection details, using the database as a conduit for disseminating the information necessary for the servers to establish a bidirectional TCP link between themselves. Suppose any server is not directly routable or is behind a NAT. In that case, the address information can be manually configured in the database to allow servers to connect to alternate IP Addresses or traverse NATs.
The Integriti Active Clustering design ensures that all data pertinent to a connection is stored in the shared database, which allows all servers to be available at all times for high availability and load balancing. If any node fails, clients or controllers connected to that node would automatically switch to another available node in the cluster. The system can support at least two nodes and extend to 64 if necessary.
In summary, Inner Range Integriti achieves high availability and fault tolerance through a robust clustering configuration that utilizes Microsoft Failover Clustering, a SQL Cluster, and a licensing system that ensures secure and scalable server integration within the cluster.
Choose an Inner Range Integriti Certified Partner
JD Security has installed 500+ Integriti Systems and manages the Integriti infrastructure of some of Australia’s largest organisations. Our Integriti Certified & Advanced Certified Integrators design and install every JD Security Integriti project.
Our Inner Range Certified Technical Team:
- Expert Installation & Commissioning: Certified technicians have proven proficiency in installing and commissioning Inner Range systems to meet complex customer requirements and ensure high system reliability.
- Optimised System Design: Trained integrators provide customers with efficient system designs, offering tailored security solutions that comprehensively address all risk areas.
- Reduced Downtime: Certified professionals with advanced troubleshooting skills minimise downtime and maintain critical security operations.
- Future-Proofing Solutions: Inner Range certification ensures technicians know the latest upgrades and expansions, providing customers with scalable solutions that can adapt as their security needs grow.
- Comprehensive Support & Maintenance: Certified technicians possess in-depth product knowledge, which leads to more effective maintenance and faster resolution of issues, reducing long-term operational costs.
- Faster Deployment: Inner Range-certified technicians can execute installations more efficiently, which results in quicker deployment times and minimal disruption to customer operations.
- Consistent Quality Assurance: Customers are assured that their security systems are installed according to Inner Range’s strict standards, enhancing safety and operational stability.
- Enhanced System Security: Certified technicians employ best practices to secure system hardware and software, mitigating vulnerability risks and bolstering site protection.
- Access to Expert-Level Updates: Recertified integrators receive ongoing training in the latest software updates and features, allowing customers to leverage advanced security technologies and maintain system effectiveness.
Contact Us
Call us on 1300 556 334 or email [email protected] to learn more.
For customers in New Zealand please call 0800 345 677 or email [email protected] to learn more.