Commend worldwide

Change your location

  • Commend Benelux荷兰、比利时
  • English
  • Commend Austria & CEE奥地利和中东欧 (CEE)
  • English
  • Commend Adria克罗地亚、波斯尼亚和黑塞哥维那、塞尔维亚
  • English
  • Commend Slovakia斯洛伐克、捷克
  • English
  • Commend Nordic丹麦、芬兰、冰岛、挪威、瑞典
  • English
  • Commend Nordic丹麦、芬兰、冰岛、挪威、瑞典
  • English
  • Commend Nordics丹麦、芬兰、冰岛、挪威、瑞典
  • English
  • Commend Benelux荷兰、比利时
  • English
  • Commend Nordic丹麦、芬兰、冰岛、挪威、瑞典
  • English
  • C&C Partners波兰、爱沙尼亚、拉脱维亚、立陶宛
  • English
  • Commend Ibèrica西班牙、葡萄牙
  • Spanish
  • Commend Austria & CEE奥地利和中东欧 (CEE)
  • English
  • Commend Slovakia斯洛伐克、捷克
  • English
  • Commend Austria & CEE奥地利和中东欧 (CEE)
  • English
  • Commend Ibèrica西班牙、葡萄牙
  • Spanish
  • Commend Nordic丹麦、芬兰、冰岛、挪威、瑞典
  • English
  • EFB Elektronik Türkiye土耳其
  • English
  • Commend Austria & CEE奥地利和中东欧 (CEE)
  • English
  • Commend Middle East阿联酋、黎凡特、海湾合作委员会
  • English
  • Commend Middle East沙特阿拉伯、黎凡特、阿联酋
  • English
  • Commend Middle East阿联酋、黎凡特、海湾合作委员会
  • English
  • Commend InternationalGlobal Website
  • English
  • Evolving Management Solutions (PTY)South Africa
  • English
  • TKHSAA印度尼西亚、马来西亚、菲律宾、新加坡、韩国、台湾、泰国
  • English
  • Commend Australia澳大利亚、新西兰
  • English
  • Commend Middle Asia哈萨克斯坦、吉尔吉斯斯坦、塔吉克斯坦、土库曼斯坦和乌兹别克斯坦
  • English
  • Russian
  • Commend Australia澳大利亚、新西兰
  • English
  • TKHSAA印度尼西亚、马来西亚、菲律宾、新加坡、韩国、台湾、泰国
  • English
  • TKHSAA印度尼西亚、马来西亚、菲律宾、新加坡、韩国、台湾、泰国
  • English
  • TKHSAA印度尼西亚、马来西亚、菲律宾、新加坡、韩国、台湾、泰国
  • English
  • Commend Middle Asia哈萨克斯坦、吉尔吉斯斯坦、塔吉克斯坦、土库曼斯坦和乌兹别克斯坦
  • English
  • Commend Middle Asia哈萨克斯坦、吉尔吉斯斯坦、塔吉克斯坦、土库曼斯坦和乌兹别克斯坦
  • English

Staying one step ahead. Always.

With the help of penetration tests, or pen tests for short, we regularly ask external security experts to execute cyber stress tests on our software, hardware and firmware and try to unveil potential vulnerabilities that could provide criminals with a vector for cyberattacks.

What’s the difference between multi-level code monitoring and pen testing? Imagine it like this: Instead of asking someone to look at a house and see if there are any open doors, windows, or keys lying around, we specifically ask someone to break into our house, because we are certain that the doors and windows are already locked. But there could be other ways to get inside, and we want to know them.

Pen tests by external security testing bodies or ethical hackers have a predefined goal. For example, the detection of potential vulnerabilities through targeted automatic and manual tests. In doing so, they apply similar methods that criminal hackers would use. They demonstrate vulnerabilities by having the testers deliberately exploit security gaps and attempt to access and manipulate protected data and devices.

We are proud to announce that we have again successfully passed a penetration test in January 2023, conducted by TÜV SÜD. The test system was built of Symphony MX and Symphony BF products linked to our VirtuoSIS. The test identified no critical or high-impact security issues, providing external validation of our commitment to the highest standards of Cyber Security. Despite this positive result, we have already begun to address the medium- and low-impact issues identified in the report to ensure that our products remain safe and secure.

Connect with us