SYMPHONY - A Showcase Example of Commend Product Security

“Security by Design”: to us at Commend, these three simple words and the principle behind it are worth an immense amount of dedication and effort. To our customers they stand for the ability to trust and rely on a level of product security that's second to none in the industry. Let's take a closer look.

A Symphony of Product Cyber Security

Our Commend Symphony Cloud is a great example. As a cloud-native platform, it's been designed from the ground up with security in mind. And it receives a lot of attention from our cyber security experts throughout its entire lifecycle. To keep pushing the security frontier, our engineers work with a well-stacked toolbox of carefully chosen means and methods. Among others, they include:

  • Proactive cyber risk and threat modelling used for continuous checking against any cyber attacks
  • Extensive continuous testing and monitoring of the entire connected infrastructure
  • A sophisticated "high-availability and security" concept that covers the VoIP subsystem and platform services, down to configuration settings
  • Systematic access security measures, including
    • security certificates and/or security tokens for both Commend hardware, the Symphony platform API, and apps running on third-party mobile devices (Android, iOS)
    • identity management via industry-leading authentication and authorisation platforms
  • Wide-ranging data encryption and secure connections that cannot be turned off by the user
  • Implementation of a coordinated process for disclosing security vulnerabilities through the “Commend Security Advisory Program”

But wait, there's more!

Our Commend Symphony Cloud platform is fully integrated into our Privacy and Security by Design (PSBD) approach. This is ensured by an ISO 27001 certified development/production environment. And it enables our defense in-depth-strategy for all-around cyber defense for Commend products and applications on four levels: device security, data security, application security, and platform security.

Further information that may be of interest to you:
Let's fly into the Cloud with Symphony by Commend

Connect with us