Security Solutions in Broadcasting

Security Solutions in Broadcasting>
Blogarama
Security concerns facing the industry as a whole include valuable client assets being compromised and held ransom such as the 2016 attack on Larson Studios, where hackers demanded USD $50,000 in return for stolen content. Compliance with evolving security best practices is expected to ultimately become table stakes for doing business in the media and entertainment space. The globally governing Motion Picture Association of America (MPAA) and the Content Delivery & Security Association (CDSA) advocate for a multi-layer approach spanning management, personnel asset management, physical access, IT security, training, incident management, workflow and script handling. The latest watermarking technologies are completely invisible to viewers, and comply with the security requirements of premium sports rights holders and movie studios. Importantly, the watermarking can identify any subscribers leaking content in seconds to allow rapid termination of content theft Unlawful distribution of premium content is a growing concern for content owners and platforms and companies are using various tools to deal with this threat. riend MTS protects the content and revenues of many of the worldâs largest media and entertainment companies, using global monitoring with advanced network forensics technology and fingerprint-based automatic content recognition. Broadcasting companies, typically, work in an open internal environment that is not immediately conducive to tight security measures. In an industry that is constantly working under time pressures, imposing security workflows is seen as affecting business deliverables. That modern, collaborative production workflows owe a great deal to the use of file-based content shared on enterprise-wide and Cloud-wide networks for their efficiency is undeniable. But equally indisputable is the fact that as workflows transitioned from tightly-guarded tapes to enterprise-wide and worldwide cloud-based networks, the exposure to exploitation; the âthreat surfaceâ in security speak, has grown exponentially. Cloud workflows for broadcast are still maturing. Many processes like second copies, multiple-GPU based tasks among many others are good candidates for cloud workflows and are being adopted at pace. However, security of data in transit, security of data at rest in a third party data centre and the chances of data loss and the potential for recovery after a loss are all variables today. Controlling security of cloud based workflows needs to be approached much the same way as one would approach internal workflows. Almost any production/post production leveraging the IoT for content exchange will require cloud based security as part of the workflow.
Link: https://www.blogarama.com/blogging-blogs/710001-bindu-gopal-rao-wrties-amp-photographers-blog/24362050-security-solutions-broadcasting


Tags: