EasyManua.ls Logo

Commend ID8 TD - Page 4

Commend ID8 TD
12 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
id8 data sheet – V1.0/1023 commend.com P 4 / 12Subject to change without notice.
PASSION MEETS AUDIO
Because every word matters, high speech intelligibility is crucial in
security and communication solutions. In everyday life, it enables
natural and brilliant communication; in operational processes, it ensures
improved eciency and in an emergency often buys life-saving time.
HIGH VOLUME
When there is ambient noise, the Intercom station has sucient
reserves to put out the audio signal of the other party at a higher
volume than any distracting background sounds.
DYNAMIC VOLUME ADJUSTMENT
IVC (Intelligent Volume Control) automatically adjusts the volume
of the Intercom station’s audio signal to the environment – because
both, too low and too high a volume, significantly reduces speech
intelligibility and the user experience.
BACKGROUND NOISE SUPPRESSION
To ensure that the other party clearly understands what is being
said despite high levels of ambient noise, dynamic background noise
suppression together with beamforming reduces interfering signal
components eectively.
HANDS-FREE COMMUNICATION THROUGH OPENDUPLEX®
This technology from Commend, combined with highly sensitive
microphones as well as a high volume, allows natural and hands-free
communication within a unique radius of several metres.
AUDIO FUNCTIONS ADDING VALUE
Loudspeaker/microphone surveillance – constant availability of
Intercom stations while greatly reducing the manual testing eort.
Simplex mode – for applications requiring controlled
communication, e.g. security or industrial solutions based on the
push-to-talk/release-to-listen principle.
Audio monitoring – fully automated (emergency) call triggering at
defined sound pressure levels for more safety.
Live sound pressure level – continuous measurement of ambient
noise with optional transfer to a management system through SNMP
or HTTPS (e.g. to visualise noise volumes).
Equalizer – for fine-tuning to ambient acoustic conditions.
Public address functions – as an essential element of a holistic
solution approach, announcements can be made or played back at
each Intercom station as well as responded to directly.
For more information, visit:
audio.commend.com
CYBER SECURITY AT COMMEND
Security is above all a question of trust. At Commend, cyber security
as a core competence has always been given a very high priority.
From the initial product idea through implementation and operational
support, privacy and security by design (PSBD) is the uncompromising
target and promise to our customers against which product features
and functions must be measured.
CYBER SECURITY AS TOP PRIORITY
Commend as well as the hardware and software development
process is rigurously certified according to the standard IEC/
ISO 27001 and subject to a company-wide information security
management system (ISMS)
Commend is a member of the Center for Internet Security (CIS)
Commend’s Cyber Security Board ensures the handling and
transparent communication of security vulnerabilities as well as the
strategic hardening of Commend systems
Commend continuously publishes software updates with security
patches and improvements
PHYSICAL SECURITY
USB and port debugging protection
NETWORK SECURITY
Standard IEEE 802.1x for authentification (network access)
Standard IEEE 802.1q for VLANs (network segmentation)
Commend IP Secure Connector for automatic interruption of the
network connection in the event of a tampering attempt
DATA SECURITY
Encrypted and authenticated communication
SIP over TLS v1.2 with secure cipher suites (> 128 bit)
SRTP for tap-proof encrycption of voice data
X.509 client certificates for authentification and encryption
TLS transport encryption for the protocols HTTPS, SIPS and MQTTS
to protect the web interface, APIs and video
APPLICATION SECURITY
Mandatory change of the default password during the first login
Minimum password length: 12 characters
Detection of brute-force attacks at login
Documentation and securing of network ports
Information about the cyber security of other Commend products can
be found in the respective data sheets and product manuals.
For more information, visit:
trust.commend.com