Commend worldwide

Change your location

  • Commend Benelux荷兰、比利时
  • English
  • Commend Austria & CEE奥地利和中东欧 (CEE)
  • English
  • Commend Adria克罗地亚、波斯尼亚和黑塞哥维那、塞尔维亚
  • English
  • Commend Slovakia斯洛伐克、捷克
  • English
  • Commend Nordic丹麦、芬兰、冰岛、挪威、瑞典
  • English
  • Commend Nordic丹麦、芬兰、冰岛、挪威、瑞典
  • English
  • Commend Nordics丹麦、芬兰、冰岛、挪威、瑞典
  • English
  • Commend Benelux荷兰、比利时
  • English
  • Commend Nordic丹麦、芬兰、冰岛、挪威、瑞典
  • English
  • C&C Partners波兰、爱沙尼亚、拉脱维亚、立陶宛
  • English
  • Commend Ibèrica西班牙、葡萄牙
  • Spanish
  • Commend Austria & CEE奥地利和中东欧 (CEE)
  • English
  • Commend Slovakia斯洛伐克、捷克
  • English
  • Commend Austria & CEE奥地利和中东欧 (CEE)
  • English
  • Commend Ibèrica西班牙、葡萄牙
  • Spanish
  • Commend Nordic丹麦、芬兰、冰岛、挪威、瑞典
  • English
  • EFB Elektronik Türkiye土耳其
  • English
  • Commend Austria & CEE奥地利和中东欧 (CEE)
  • English
  • Commend Middle East阿联酋、黎凡特、海湾合作委员会
  • English
  • Commend Middle East沙特阿拉伯、黎凡特、阿联酋
  • English
  • Commend Middle East阿联酋、黎凡特、海湾合作委员会
  • English
  • Commend InternationalGlobal Website
  • English
  • Evolving Management Solutions (PTY)South Africa
  • English
  • TKHSAA印度尼西亚、马来西亚、菲律宾、新加坡、韩国、台湾、泰国
  • English
  • Commend Australia澳大利亚、新西兰
  • English
  • Commend Middle Asia哈萨克斯坦、吉尔吉斯斯坦、塔吉克斯坦、土库曼斯坦和乌兹别克斯坦
  • English
  • Russian
  • Commend Australia澳大利亚、新西兰
  • English
  • TKHSAA印度尼西亚、马来西亚、菲律宾、新加坡、韩国、台湾、泰国
  • English
  • TKHSAA印度尼西亚、马来西亚、菲律宾、新加坡、韩国、台湾、泰国
  • English
  • TKHSAA印度尼西亚、马来西亚、菲律宾、新加坡、韩国、台湾、泰国
  • English
  • Commend Middle Asia哈萨克斯坦、吉尔吉斯斯坦、塔吉克斯坦、土库曼斯坦和乌兹别克斯坦
  • English
  • Commend Middle Asia哈萨克斯坦、吉尔吉斯斯坦、塔吉克斯坦、土库曼斯坦和乌兹别克斯坦
  • English

Cyber Security

A Question of Trust

Protecting and securing customer data is essential to earning the trust of our users, as the growing multitude of new digital processes offers a growing attack surface to cyber criminals. Malicious software, data fraud and phishing for passwords or access credentials are only a few of the threats that users have to be protected against. Today’s Commend system security is firmly rooted in 50 years of experience in designing and perfecting Intercom security and communication technology.

To fend off possible attacks, Commend has made IT security in general and cyber security in particular a top priority. We are fully aware of our crucial responsibility where the safety and trustworthiness of our security and professional communication solutions are concerned. As a result, we always endeavour to communicate and demonstrate our commitment as a trustworthy market leader to promote our collective knowledge and shared experience. For this reason we develop our solutions with security and data protection in mind, so as to ensure the best possible protection of our customers’ data and infrastructures.

From the initial product design to its implementation and after-sales service, ‘Privacy and Security by Design’ is the guiding principle and solid promise to our customers that every product feature and function is tested against.

NDAA/TAA Compliance

Commend USA is pleased to confirm that its entire product portfolio is in full compliance with the National Defense Authorization Act (NDAA) and the Trade Agreements Act (TAA). 

Learn more

Vulnerability Disclosure Policy

The Commend Security Advisory Program

Commend International is very serious about the security of its products and services, and we greatly value the contribution of the security community. We have therefore implemented a coordinated process for disclosing security vulnerabilities.

All customers and security professionals are invited to participate and register for the Commend Security Advisory Program.

Learn more

World's first Intercom Company IEC 62443 certified

Certified to IEC 62443

Secure Product Development Lifecycle
assessed and monitored according to IEC 62443-4-1.

Learn more

Cyber Security begins at home

ISO 27001 Information Security Management

At Commend, we put all our efforts to provide customers
with the best cyber security possible.

Learn more

Security for Products and Applications

All-around Cyber Defense

The global security-specific hardening of local and cloud-based
Commend systems spans several basic levels.

Learn more

How does it Work?

Privacy and Security
by Design

The basic principle is easy: providing the best possible protection of both transferred data and ‘stationary’ data against unauthorised access in order to ensure the availability of products and services. Commend products are always designed, developed and incorporated in customer solutions in accordance with these security criteria.

Learn more

10 Recommendations
for Risk Assessment

We recommend carrying out a risk assessment before planning and installation

Contact us

Want to learn more about Cyber Security and system hardening at Commend? Simply get in touch with us.

Download

Documents, Guidelines, Certifications,... on the topic of Cyber Security

Cyber Security and Cyber Defense

Get Expert Cyber Security Insights

Discover how collaboration across the product supply chain enhances cybersecurity for your Commend system. Learn about potential risks, effective measures, and best practices to safeguard your devices, services, and network infrastructure. Download this essential cybers ecurity whitepaper for expert advice and guidelines.