Cyber Security
A Question of Trust
Protecting and securing customer data is essential to earning the trust of our users, as the growing multitude of new digital processes offers a growing attack surface to cyber criminals. Malicious software, data fraud and phishing for passwords or access credentials are only a few of the threats that users have to be protected against. Today’s Commend system security is firmly rooted in 50 years of experience in designing and perfecting Intercom security and communication technology.
To fend off possible attacks, Commend has made IT security in general and cyber security in particular a top priority. We are fully aware of our crucial responsibility where the safety and trustworthiness of our security and professional communication solutions are concerned. As a result, we always endeavour to communicate and demonstrate our commitment as a trustworthy market leader to promote our collective knowledge and shared experience. For this reason we develop our solutions with security and data protection in mind, so as to ensure the best possible protection of our customers’ data and infrastructures.
From the initial product design to its implementation and after-sales service, ‘Privacy and Security by Design’ is the guiding principle and solid promise to our customers that every product feature and function is tested against.
NDAA/TAA Compliance
Commend USA is pleased to confirm that its entire product portfolio is in full compliance with the National Defense Authorization Act (NDAA) and the Trade Agreements Act (TAA).
Vulnerability Disclosure Policy
The Commend Security Advisory Program
Commend International is very serious about the security of its products and services, and we greatly value the contribution of the security community. We have therefore implemented a coordinated process for disclosing security vulnerabilities.
All customers and security professionals are invited to participate and register for the Commend Security Advisory Program.
World's first Intercom Company IEC 62443 certified
Certified to IEC 62443
Secure Product Development Lifecycle
assessed and monitored according to IEC 62443-4-1.
Cyber Security begins at home
ISO 27001 Information Security Management
At Commend, we put all our efforts to provide customers
with the best cyber security possible.
Security for Products and Applications
All-around Cyber Defense
The global security-specific hardening of local and cloud-based
Commend systems spans several basic levels.
How does it Work?
Privacy and Security
by Design
The basic principle is easy: providing the best possible protection of both transferred data and ‘stationary’ data against unauthorised access in order to ensure the availability of products and services. Commend products are always designed, developed and incorporated in customer solutions in accordance with these security criteria.
10 Recommendations
for Risk Assessment
We recommend carrying out a risk assessment before planning and installation
Contact us
Want to learn more about Cyber Security and system hardening at Commend? Simply get in touch with us.
Download
Documents, Guidelines, Certifications,... on the topic of Cyber Security
Cyber Security and Cyber Defense
Get Expert Cyber Security Insights
Discover how collaboration across the product supply chain enhances cybersecurity for your Commend system. Learn about potential risks, effective measures, and best practices to safeguard your devices, services, and network infrastructure. Download this essential cybers ecurity whitepaper for expert advice and guidelines.