Qvest Media Expands Service Scope of QM Security with Cloud Solution

Qvest Media has been working with SecurView to expand its cybersecurity portfolio for media companies to protect applications, data and media assets in the cloud.

Due to the recent majority stake of Qvest Media shareholder RAG Stiftung Beteiligungsgesellschaft mbH in SecurView, both companies are now part of the same group of companies and able to leverage synergies: following the successful launch of the cloud management platform Qvest.Cloud, SecurView’s cloud security components will be integrated into it. 

QM Security offers a comprehensive security package consisting of 24/7 monitoring & support, analytics, penetration testing, consulting for social engineering and the development of appropriate prevention measures.

With the growing proliferation of IP technologies, cybersecurity is increasingly a critical issue for media companies. In order to advise its customers comprehensively in this area and offer tailor-made security solutions, Qvest Media is strengthening its cooperation with SecurView, an internationally well positioned provider of IT security solutions and services. In addition, QM Security integrates security solutions from the portfolio of the network specialist Cisco, who is also a shareholder in SecurView.

The IT security services developed jointly by Qvest Media and SecurView cover all areas that media companies need to protect from internal and external attacks on their IT infrastructure: from the company network to the complete media supply chain to the protection of intellectual property after publication of content.

To protect applications, media content and other data in the cloud, Qvest Media combines its media technology know-how with SecurView’s cloud security framework. In addition, QM Security utilises SecurityHQ, oneApp and IDA, the ISE Deployment Assistant (Cisco Identity Service Engine). 

Based on the IT security standards EBU R 143 and ISO 27001, QM Security offers security concepts and solutions that secure applications of third parties, such as cloud providers, for example, protect production workflows and infrastructure, block viruses, Trojans, ransomware and other malware, and provide endpoint security and protection for commercial processes.

You might also like...

Is Remote Operation Underrated?

A recent Lawo remote activities case study notes, “It should be obvious by now that remote operation has been seriously underrated. For some, it allows to save substantial amounts of money, while others will appreciate the time gained from not…

Improving Negative ARQ Protocols For Internet Delivery

In this article, George Kroon, research broadcast engineer, takes a look at how Negative ARQ protocols similar to those used for internet streaming and contribution can be improved specifically for broadcast television.

ATSC 3.0: Right Place, Right Time

Many people and cultures celebrate special New Year dates. Organizations designate fiscal years. Broadcasters traditionally mark their new technology year mid-April, at annual NAB Shows. Old habits die hard.

The World Of OTT: Part 10 - Optimizing Encoding & Contribution For Live OTT

OTT has dramatically expanded the range of delivery outlets for content and continues to do so. This has had a direct effect on content production, enabling almost any organization or person to create and distribute live content, which has increased…

The World Of OTT: Part 9 - Internet Exchanges & The Growth Of OTT

Demand for bandwidth is growing at a remarkable rate. The demand is so high that Equinix’s Global Interconnection Index (GXI) Volume 4 forecasts a 45% CAGR specifically for interconnection bandwidth from 2019-2023. This will bring global interconnection bandwidth, used specifically by b…