Passion meets audio
Ultimate speech intelligibility
Because every word matters, high speech intelligibility is crucial in security
and communication solutions. In everyday life, it enables natural and brilliant
communication; in operational processes, it ensures improved efficiency and
in an emergency often buys life-saving time.
High volume
When there is ambient noise, the Intercom station has sufficient reserves to
put out the audio signal of the other party at a higher volume than any distrac-
ting background sounds.
Dynamic volume adjustment
IVC (Intelligent Volume Control) automatically adjusts the volume of the
Intercom station's audio signal to the environment – because both, too low
and too high a volume, significantly reduces speech intelligibility and the user
experience.
Background noise suppression
To ensure that the other party clearly understands what is being said despite
high levels of ambient noise, dynamic background noise suppression together
with beamforming reduces interfering signal components effectively.
Hands-free communication through OpenDuplex
This technology from Commend, combined with highly sensitive microphones
as well as a high volume, allows natural and hands-free communication within
a unique radius of several metres.
Audio functions adding value
Loudspeaker/microphone surveillance – constant availability of Intercom
stations while greatly reducing the manual testing effort.
Simplex mode – for applications requiring controlled communication, e.g.
security or industrial solutions based on the push-to-talk/release-to-listen
principle.
Audio monitoring – fully automated (emergency) call triggering at defined
sound pressure levels for more safety.
Live sound pressure level – continuous measurement of ambient noise
with optional transfer to a management system through SNMP or HTTPS
(e.g. to visualise noise volumes).
Equalizer – for fine-tuning to ambient acoustic conditions.
Public address functions – as an essential element of a holistic solution
approach, announcements can be made or played back at each Intercom
station as well as responded to directly.
For more information, visit:
audio.commend.com
od5
DATA SHEET V2.0/0224
The design and/or specifications of products may be subject to change for improvement without prior notice. Errors excepted.
Uncompromising protection against threats
IT infrastructures are facing a growing variety of cyber threats. This means
that the defensive capabilities of each product in the system environment
are key.
Security is above all a question of trust. At Commend, cyber security as a
core competence has always been given a very high priority. From the initial
product idea through implementation and operational support, privacy and
security by design (PSBD) is the uncompromising target and promise to our
customers against which product features and functions must be measured.
Cyber security as top priority
–
–
–
–
®
Physical security
–
–
–
Network security
–
–
–
Data security
–
–
–
–
–
Application security
–
–
–
–
Information about the cyber security of other Commend products can be
found in the respective data sheets and product manuals.
For more information, visit:
trust.commend.com
Security and Communication
Cyber security at Commend
Commend as well as the hardware and software development process is
rigurously certified according to the standard IEC/ISO 27001 and subject
to a company-wide information security management system (ISMS)
Commend is a member of the Center for Internet Security (CIS)
Commend's Cyber Security Board ensures the handling and transparent
communication of security vulnerabilities as well as the strategic
hardening of Commend systems
Commend continuously publishes software updates with security
patches and improvements
Robust devices and vandal-resistant product versions
Tamper detection through electromechanical contacts
USB and port-debugging protection
Standard IEEE 802.1x for authentification (network access)
Standard IEEE 802.1q for VLANs (network segmentation)
Commend IP Secure Connector for automatic interruption of the
network connection in the event of a tampering attempt
Encrypted and authenticated communication
SIP over TLS v1.2 with secure cipher suites (> 128 bit)
SRTP for tap-proof encryption of voice data
X.509 client certificates for authentification and encryption
TLS transport encryption for the protocols HTTPS, SIPS and MQTTS to
protect the web interface, APIs and video
Mandatory change of the default password during the first login
Minimum password length: 12 characters
Detection of brute-force attacks at login
Documentation and securing of network ports
|
SA
6
CERTIFIED
ACC. TO
ISO 27001
commend.com
Need help?
Do you have a question about the od5 and is the answer not in the manual?