commend.com
Security and Communication
The design and/or specifications of products may be subject to change for improvement without prior notice. Errors excepted.
OD10 TD CM
DATA SHEET V1.3/0522
SA
|
4
Passion meets audio
Ulitmate speech intelligibility
Because every word matters, high speech intelligibility is crucial in security
and communication solutions. In everyday life, it enables natural and brilliant
communication; in operational processes, it ensures improved efficiency and
in an emergency often buys life-saving time.
Uncompromising protection against threats
IT infrastructures are facing a growing variety of cyber threats. This means
that the defensive capabilities of each product in the system environment
are key.
Security is above all a question of trust.
At Commend, cyber security as a
core competence has always been given a very high priority. From the initial
product idea through implementation and operational support, privacy and
security by design (PSBD) is the uncompromising target and promise to our
customers against which product features and functions must be measured.
Hands-free communication through OpenDuplex
®
This technology from Commend, combined with highly sensitive microphones
as well as a high volume, allows natural and hands-free communication within
a unique radius of several metres.
Audio functions adding value
Loudspeaker/microphone surveillance
– constant availability of Intercom
stations while greatly reducing the manual testing effort.
Simplex mode
– for applications requiring controlled communication, e.g.
security or industrial solutions based on the push-to-talk/release-to-listen
principle.
Audio monitoring
– fully automated (emergency) call triggering at defined
sound pressure levels for more safety.
Live sound pressure level
– continuous measurement of ambient noise
with optional transfer to a management system through SNMP or HTTPS
(e.g. to visualise noise volumes).
Equalizer
– for fine-tuning to ambient acoustic conditions.
Public address functions
– as an essential element of a holistic solution
approach, announcements can be made or played back at each Intercom
station as well as responded to directly.
For more information, visit:
audio.commend.com
Application security
–
Mandatory change of the default password during the first login
– Minimum password length: 12 characters
– Detection of brute-force attacks at login
– Documentation and securing of network ports
Cyber security at Commend
Information about the cyber security of other Commend products can be
found in the respective data sheets and product manuals.
For more information, visit:
trust.commend.com
High volume
When there is ambient noise, the Intercom station has sufficient reserves to
put out the audio signal of the other party at a higher volume than any distrac-
ting background sounds.
Dynamic volume adjustment
IVC (Intelligent Volume Control)
automatically adjusts the volume of the
Intercom station’s audio signal to the environment – because both, too low
and too high a volume, significantly reduces speech intelligibility and the user
experience.
Background noise suppression
To ensure that the other party clearly understands what is being said despite
high levels of ambient noise, dynamic background noise suppression together
with
beamforming
reduces interfering signal components effectively.
Cyber security as top priority
– Commend as well as the hardware and software development process is
rigurously certified according to the standard
IEC/ISO 27001
and subject
to a company-wide information security management system (ISMS)
– Commend is a member of the
Center for Internet Security
(CIS)
– Commend’s Cyber Security Board ensures the handling and transparent
communication of security vulnerabilities as well as the strategic
hardening of Commend systems
– Commend continuously publishes software updates with security
patches and improvements
Physical security
– Robust devices and vandal-resistant product versions
– Tamper detection through electromechanical contacts
– USB and port-debugging protection
Network security
–
Standard IEEE 802.1x
for authentification (network access)
–
Standard IEEE 802.1q
for VLANs (network segmentation)
– Commend IP Secure Connector for automatic interruption of the
network connection in the event of a tampering attempt
Data security
–
Encrypted and authenticated communication
–
SIP over TLS v1.2
with secure cipher suites (> 128 bit)
–
SRTP
for tap-proof encrycption of voice data
–
X.509 client certificates
for authentification and encryption
– TLS transport encryption for the protocols
HTTPS
,
SIPS
and
MQTTS
to
protect the web interface, APIs and video
CERTIFIED
ACC. TO
ISO 27001