Commend knows there is a growing list of considerations to stay ahead of and there's more to security than intercom and voice communication alone. Data security and technology security have become hot-button issues in the news. Commend is committed to keeping ahead of malicious attackers, and they have recently implemented their new IT security measures to do it. Let's look at the details of their penetration testing and quality management...
Penetration Testing Automation |
Penetration testing is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. This process helps the Commend team find and correct any weaknesses in our security vertical.
Since the system is automated, it can run fully unattended for every new software built for a specific system. This ensures that the latest IT hardening measures are incorporated in every new software release. Over time, Commend will be implementing these measures in other solutions as well.
How Commend's Penetration Testing Works Commend uses integrated penetration testing tools available on the market to check every firmware update before release. The test attack runs automatically during the development process, and generates a report identifying any vulnerabilities. Some of the tests Commend runs are:
LEARN MORE ABOUT COMMEND'S PENETRATION TESTING >>
Quality Management Commend's information security management complies with stringent quality standards as per ISO 27001:2013. Compliance with this standard is audited annually, with required re-certifications every three years. Quality consciousness is essential in an increasingly complex industry like ours, but Commend has always been driven by the urge to go the extra quality mile. Quality counts - and it's our passion to provide quality to count on. Simple as that.
IT Security for Intercom Passionate commitment to physical and digital security has a long tradition at Commend. No matter how large a Commend system and the underlying network infrastructures are, no matter how it grows and changes, the IT security of our customers and users is of paramount importance and requires cooperation along the entire product value chain, from us as the provider to you, the end user. Of course, there is no simple set-and-forget solution here. IT security is not a fixed state, but a process that requires active management. That's why we've created an IT Security Policy for you, our customers and partners, which provides a general overview of what IT Security by Commend is all about. LEARN MORE ABOUT IT SECURITY FOR INTERCOM >>
|