background image

commend.com

Security and Communication

The design and/or specifications of products may be subject to change for improvement without prior notice. Errors excepted.

OD10 TD CM 

DATA SHEET  V1.3/0522

SA 

|

 4

Passion meets audio

Ulitmate speech intelligibility

Because every word matters, high speech intelligibility is crucial in security 
and communication solutions. In everyday life, it enables natural and brilliant 

communication; in operational processes, it ensures improved efficiency and 

in an emergency often buys life-saving time.

Uncompromising protection against threats

IT infrastructures are facing a growing variety of cyber threats. This means 
that the defensive capabilities of each product in the system environment 
are key.

Security is above all a question of trust. 

At Commend, cyber security as a 

core competence has always been given a very high priority. From the initial 
product idea through implementation and operational support, privacy and 
security by design (PSBD) is the uncompromising target and promise to our 
customers against which product features and functions must be measured.

Hands-free communication through OpenDuplex

®

This technology from Commend, combined with highly sensitive microphones 
as well as a high volume, allows natural and hands-free communication within 
a unique radius of several metres.

Audio functions adding value

Loudspeaker/microphone surveillance 

– constant availability of Intercom 

stations while greatly reducing the manual testing effort.

Simplex mode

 – for applications requiring controlled communication, e.g. 

security or industrial solutions based on the push-to-talk/release-to-listen 

principle.

Audio monitoring 

– fully automated (emergency) call triggering at defined 

sound pressure levels for more safety.

Live sound pressure level 

– continuous measurement of ambient noise 

with optional transfer to a management system through SNMP or HTTPS 

(e.g. to visualise noise volumes).

Equalizer

 – for fine-tuning to ambient acoustic conditions.

Public address functions

 – as an essential element of a holistic solution 

approach, announcements can be made or played back at each Intercom 
station as well as responded to directly.

For more information, visit:

audio.commend.com

Application security

 

Mandatory change of the default password during the first login

 

– Minimum password length: 12 characters 

 

– Detection of brute-force attacks at login

 

– Documentation and securing of network ports

Cyber security at Commend

Information about the cyber security of other Commend products can be 
found in the respective data sheets and product manuals.

For more information, visit:

trust.commend.com

High volume

When there is ambient noise, the Intercom station has sufficient reserves to 

put out the audio signal of the other party at a higher volume than any distrac-
ting background sounds.

Dynamic volume adjustment

IVC (Intelligent Volume Control)

 automatically adjusts the volume of the 

Intercom station’s audio signal to the environment – because both, too low 

and too high a volume, significantly reduces speech intelligibility and the user 

experience.

Background noise suppression

To ensure that the other party clearly understands what is being said despite 
high levels of ambient noise, dynamic background noise suppression together 
with 

beamforming

 reduces interfering signal components effectively.

Cyber security as top priority

 

– Commend as well as the hardware and software development process is 

rigurously certified according to the standard 

IEC/ISO 27001

 and subject 

to a company-wide information security management system (ISMS)

 

– Commend is a member of the 

Center for Internet Security 

(CIS)

 

– Commend’s Cyber Security Board ensures the handling and  transparent 

communication of security vulnerabilities as well as the strategic 
 hardening of Commend systems

 

– Commend continuously publishes software updates with security 

 patches and improvements

Physical security

 

– Robust devices and vandal-resistant product versions

 

– Tamper detection through electromechanical contacts

 

– USB and port-debugging protection

Network security

 

Standard IEEE 802.1x

 for authentification (network access)

 

Standard IEEE 802.1q 

for VLANs (network segmentation)

 

– Commend IP Secure Connector for automatic interruption of the 

 network connection in the event of a tampering attempt

Data security

 

Encrypted and authenticated communication

 

SIP over TLS v1.2

 with secure cipher suites (> 128 bit)

 

SRTP

 for tap-proof encrycption of voice data

 

X.509 client certificates

 for authentification and encryption

 

– TLS transport encryption for the protocols 

HTTPS

,

 SIPS

 and 

MQTTS

 to 

protect the web interface, APIs and video

CERTIFIED

ACC. TO 

ISO 27001

Summary of Contents for OD10 TD CM

Page 1: ...luminium Thanks to their timeless look they are ideally suited for use as multi functional Intercom stations with advanced security mode for modern office buildings Ready for Symphony Cloud Services T...

Page 2: ...g ensure a long prod uct life under outdoor conditions Up to 20 kHz speech quality and OpenDuplex for natural hands free communication with high volume capacity The Intercom stations are optimally pro...

Page 3: ...ation e g to access the connected Ethernet cable the IP Secure Connector interrupts the con nection to Intercom station and LAN This ensures that it is neither possible to access the network nor to op...

Page 4: ...ion security Mandatory change of the default password during the first login Minimum password length 12 characters Detection of brute force attacks at login Documentation and securing of network ports...

Page 5: ...4 Cabling min Cat 5 shielded 5 Approvals and compliances EN 61000 6 2 EN 61000 6 3 EN 55032 Class B EN 55024 EN 60529 IP65 EN 62262 IK07 IEC 60068 2 11 EN 62368 1 Wall mounting drywall panel mount ki...

Page 6: ...not use the Intercom station when the glass is damaged Disconnect the Ethernet cable for any maintenance of the device Do not make any modifications to the Intercom station All connected circuits sha...

Page 7: ...r mounting holes 2 OD10 TD CM 18 0 71 2 5 mm 0 2 in Surface mount kit OD10 SH Measuring units in mm in not to scale 50 1 97 175 6 89 328 12 91 Flush mount box OD10 FBS Measuring units in mm in not to...

Page 8: ...he provided strain relief using the cable ties included in extent of supply of the OD10 TD CM Attach the blind cover included in extent of supply to the bottom side of the Intercom station using a scr...

Page 9: ...bottom or rear Screw the mounting box to the wall or to the 2 fold flush mounted box with the arrow pointing upwards Guide the required cables through this entry Ethernet I O and USB cable if needed r...

Reviews: