Veset – Keeping content secure when using cloud playout

Veset – Keeping content secure when using cloud playout

Skip to content
IABM
Login / Register
The MediaTech Vantage account needs to be created. Please contact the administrator
Menu
  • Home
  • Join IABM
    • Join IABM
    • Benefit Comparison Grid
    • Global Engaged Partner Program
    • Affiliate Membership Program
    • Trade Show Support
    • IABM Member Companies
  • News
    • All News
  • Knowledge Hub
      • Topics
          • Topics
          • Ad Tech
          • Adjacent Markets
          • AI/ML, Data & Analytics
          • At-Home/Remote Production
          • Business Models
          • Cloud & Virtualization
          • Consumer Habits & Experiences
          • Data Privacy & Management
          • Digital & Social
          • Digital Transformation
          • Edge Computing
          • Financials, Investment & M&A
          • Imaging
          • Immersive
          • Insight & Analysis
          • IP Transport & Networking
          • Mobile
          • Next-Gen Hardware
          • Next-Gen Standards
          • OTT & Streaming Platforms
          • Programming & Creative
          • Rights & Legal
          • Sales & Marketing
          • Security
          • Skills & Education
          • Social Media
          • Supply Chain
          • Sustainability & Inclusion
          • Content Chain Elements
          • Create
          • Produce
          • Manage
          • Publish
          • Monetize
          • Connect
          • Support
          • Store
          • Consume
      • IABM Journal
          • Journal CoverJournal 131 Cover
          • Journal 132
          • Journal 131
          • Journal 130
          • Journal 129
          • Journal 128
          • Journal 127
          • Journal 126
          • Journal 125
          • Journal 124
          • Journal 123
          • Journal 122
          • Journal 121
          • View all
      • Spotlight Reports
  • MediaTech Intelligence
    • MediaTech Vantage
    • MediaTech Radar
    • Bespoke Research
  • Skills & Development
    • Training Courses
    • E-Learning Courses
    • Training Partners
    • Student Awards
  • Our Community
    • IABM Team
    • IABM Members’ Board
    • Member Councils
      • Americas’ Council
      • APAC Council
      • DACH Council
      • EMEA Council
      • UK Council
    • IABM Business Standard
    • Honorary Members
  • Events & CatchUp
    • Events Calendar
    • IABM Supported Events
    • NAB Show 2025 Content
    • In Conversation with
    • IABM 2024 Content
  • Technology
    • Technology & Trends Roadmap
    • Standards Monitoring Group
    • Standards Activities
  • BaM™ Shop Window
    • Search the BaM™ Shop Window
    • BaM™ Shop Categories
    • BaM™ Shop Window Product Submission
    • BaM™ Shop Window FAQ’s
    • BaM Content Chain
  • Dealer Directory

IABM Journal

Search the IABM Knowledge Hub


Tag: SSO

Veset – Keeping content secure when using cloud playout

Getting content delivery right is a top priority for broadcasters and media providers, with security being a critical, non-negotiable aspect. Broadcasters are increasingly turning to cloud playout to manage the complexities of delivering content to a diverse range of platforms and devices, and so it’s critical that cloud playout systems operate to the highest security standards. Not only do broadcasters need to protect their content and channels from unauthorized access, cyber-attacks and data breaches, but these security threats are constantly evolving as attackers adapt and seek to exploit different vulnerabilities in broadcast systems. And so, for broadcasters wanting to use cloud playout, the inevitable question arises: how can they ensure their content remains secure?

View More

Pebble – Cybersecurity collaboration for protecting high-value media

As broadcasters continue their IP transition and take advantage of the commanding and compelling opportunities that cloud systems offer, protecting high-value media must now be a fundamental component of the design, not a hastily appended feature.

View More

Globecast – Strengthening broadcast security in the age of digital content

Who are the security leaders in your business? While some people have security in their titles or job descriptions, the reality is that everyone in your business should be considered leaders of your security effort. The technology landscape of the broadcast industry (Media & Entertainment at large) is not only evolving rapidly, but the cycle of change is getting shorter every year. In particular, the move to IP and the use of other modern technologies has pushed past the concept of revolution to that of a fundamental requirement to simply remain in business.

View More

Net Insight – Putting media network security at the top of the IP agenda

IP is driving a new era of innovation and efficiency within the media industry, opening up more opportunities for growth and transformation. However, despite the potential of IP’s flexibility to adapt to configuration changes and scalability, there are also inherent challenges that media companies must navigate. As the industry transitions from traditional co-axial video interfaces to open IP-based workflows, network control and network robustness are critical priorities. Media companies need to ensure that their networks and high-value content are protected against both external and internal misconfiguration and stream routing issues.

View More

Jigsaw 24 Media – Some hard truths about remote workflow security

When we reached out to production and post houses to find out about your approach to remote workflows and end-point security, we quickly discovered that the first rule of remote workflow security seems to be that you do not talk about remote workflow security. Because there’s a chance that sharing information about how you keep your content secure could be what puts your security at risk…and some of you are worried about revealing just how vulnerable your workflows are. When we did finally manage to convince a handful of post professionals and security specialists to break the silence, what they shared were some hard truths.

View More

Amagi – Shielding your secrets using secure local vault

Exposure of credentials has emerged as a leading cause of data breaches across organizations. Verizon’s 2023 Data Breach Investigations Report reveals that external actors were involved in 83% of data breaches, with stolen credentials being exploited in 49% of these breaches. Furthermore, such breaches have severe consequences for businesses. According to IBM’s 2023 Cost of Data Breach Report, stolen or compromised credentials contributed to approximately 15% of data breaches, resulting in losses of $4.62 million.

View More

Net Insight – Taking control of IP: Putting security back at the heart of media

The IP media paradigm is loud and clear, changing what we used to know about producing and distributing live events and how we did business in the media world. The innovation potential is immense, bringing efficiency and agility to the media industry at an unprecedented scale. However, transformation also needs to iron out some of the changes it brings. Moving from closed and controlled to open IP-based workflows means network control and security become mission-critical capabilities as media companies need to ensure their high-value content is protected.

When it comes to premium content, any mistake or network vulnerability can prove detrimental, both financially and reputationally. There is no room for compromise —  media companies need to boost their network control and security to ensure they make the most of IP without caveats.

View More

The data domino effect

When designing a storage system for a production or post facility, it is easy to concentrate on capacity and throughput, and think that is all you need. However, a very real issue is data safety and how to guard against it. That is a particular problem in our industry of media production. Once you start considering the issues around data loss, the potential problems start to escalate: a real domino effect.

View More

Securing broadcast synchronization against malicious attack

Synchronization is a fundamental requirement in all content generation and broadcast; used extensively both in SDI / HDI formats and in IP packet based systems. Synchronization signals are typically generated from equipment including sync pulse generators, master sync references, and for the IP format, Precision Timing Protocol (PTP) grandmaster clock generators. Most sync generators encapsulate a very accurate internal clock which is synchronised to an external reference, which for the vast majority of manufacturers is a GPS & GNSS satellite timing signal. Consequently sync generators are connected to an outside GNSS antenna via coaxial cable or fibre optic cable, like those supplied by ViaLite Communications.

View More

Protecting Media Assets – Risk and Resilience

The sudden shift to remote working within the media industry saw an incredible turnaround, with workflows being instated quickly to ensure that quality content creation could continue. Existing media tools were adapted to enable workers from around the globe to access content and contribute to production, all whilst the industry came to terms with wider logistical challenges. A quick rollout of infrastructure saw big changes in how the industry managed their assets; suddenly, data that would have been very difficult to access needed to be available to workers from their homes.

View More

Posts pagination

Page 1 Page 2 … Page 6 Next page

IABM Platinum Members

IABM Gold Members

IABM
View all Members

Connect. Support. Inform

  • twitter_icon
  • ln_icon

  • About Us
  • Contact Us
  • IABM Privacy Policy
  • IABM Cookie Policy

© 2025 IABM IABM is company limited by guarantee. Registered in England No: 5262009. Registered Office: IABM, 5 Deansway, Worcester, WR1 2JG

X
BESbswyBESbswyBESbswyBESbswy