Qvest Media Expands Service Scope of QM Security with Cloud Solution

Qvest Media has been working with SecurView to expand its cybersecurity portfolio for media companies to protect applications, data and media assets in the cloud.

Due to the recent majority stake of Qvest Media shareholder RAG Stiftung Beteiligungsgesellschaft mbH in SecurView, both companies are now part of the same group of companies and able to leverage synergies: following the successful launch of the cloud management platform Qvest.Cloud, SecurView’s cloud security components will be integrated into it. 

QM Security offers a comprehensive security package consisting of 24/7 monitoring & support, analytics, penetration testing, consulting for social engineering and the development of appropriate prevention measures.

With the growing proliferation of IP technologies, cybersecurity is increasingly a critical issue for media companies. In order to advise its customers comprehensively in this area and offer tailor-made security solutions, Qvest Media is strengthening its cooperation with SecurView, an internationally well positioned provider of IT security solutions and services. In addition, QM Security integrates security solutions from the portfolio of the network specialist Cisco, who is also a shareholder in SecurView.

The IT security services developed jointly by Qvest Media and SecurView cover all areas that media companies need to protect from internal and external attacks on their IT infrastructure: from the company network to the complete media supply chain to the protection of intellectual property after publication of content.

To protect applications, media content and other data in the cloud, Qvest Media combines its media technology know-how with SecurView’s cloud security framework. In addition, QM Security utilises SecurityHQ, oneApp and IDA, the ISE Deployment Assistant (Cisco Identity Service Engine). 

Based on the IT security standards EBU R 143 and ISO 27001, QM Security offers security concepts and solutions that secure applications of third parties, such as cloud providers, for example, protect production workflows and infrastructure, block viruses, Trojans, ransomware and other malware, and provide endpoint security and protection for commercial processes.

Let us know what you think…

Log-in or Register for free to post comments…

You might also like...

NAB 2019 – Technology vs Consolidation

Giving his unique view on NAB2019, Gary Olson considers and scrutinizes the big moving trends of consolidations, and casts clarity on the cloud, ATSC 3.0, and AI.

Essential Guide: When to Virtualize IP

Moving to IP opens a whole plethora of options for broadcasters. Engineers often speak of the advantages of scalability and flexibility in IP systems. But IP systems take on many flavors, from on-prem to off-prem, private and public cloud. And…

An Insider’s Guide to Object Storage

As the IP revolution continues to gain momentum and more broadcast facilities take advantage of the fantastic and unprecedented opportunities IT delivers, administrators and system designers must master the complex aspects of data storage.

CBS Sports Looks To Raise The Graphics Bar For Super Bowl LIII

Captivating 3D graphics and electronically inserted field images have become a hallmark of every major live sporting event, but CBS Sports hopes to raise the bar during this year’s NFL Super Bowl LIII telecast on February 3, 2019. The sports network’s g…

Sony Virtual Production Service Launched at Red Bull Event

Although OTT delivery has created a mature market for on-demand scripted shows that leverages the public internet for distribution, the ever increasing and IP-enabled bandwidth available that uses public wireless networks and the public cloud, is opening a new market…