
Essential Guide: Secure IP Infrastructures For Broadcasters
October 2nd 2019 - 11:47 AM
Security is becoming increasingly important for broadcasters looking to transition to IP infrastructures. But creating improved software, firewalls and secure networks is only half the story as cybercriminals look to find new and imaginative methods of compromising data.
In this Essential Guide, we look at the new methods of attack cybercriminals are resorting to. We discover how disk drives and other intelligent peripheral devices within servers can be hacked. And we investigate the remedies high-end enterprise IT infrastructure vendors are adopting to keep our data secure.
Part 1 introduces how servers are made more secure. An in-depth description of how devices can be compromised is introduced with the remedies available to keep hackers out.
Part 2 explores Lights Out out-of-band Control and the critically important role it plays in verifying low-level server firmware, even before the CPU starts operating. The secure silicon root of trust is introduced along with the major benefits it provides for security.
Part 3 discusses secure virtualization and how encrypted VMs can help broadcasters deliver even higher levels of security. And discover how binary translation has been superseded by hardware virtualization and the benefits it brings.
This Essential Guide concludes with a sponsor’s perspective from HPE OEM Solutions and discusses their practical solutions to firmware vulnerabilities and specifically their secure silicon root of trust.
Download this essential guide today to understand advanced server security and how to implement it. This Essential Guide is for anybody designing, building, or administering their own broadcast IP infrastructure.
Part of a series supported by
You might also like...
IP Monitoring & Diagnostics With Command Line Tools: Part 8 - Caching The Results
Storing monitoring outcomes in temporary cache containers separates the observation and diagnostic processes so they can run independently of the centralised marshalling and reporting process.
IP Monitoring & Diagnostics With Command Line Tools: Part 7 - Remote Agents
How to run diagnostic processes in each machine and call them remotely from a centralised system that can marshal the results from many other networked systems. Remote agents act on behalf of that central system and pass results back to…
IP Monitoring & Diagnostics With Command Line Tools: Part 6 - Advanced Command Line Tools
We continue our series with some small code examples that will make your monitoring and diagnostic scripts more robust and reliable
IP Monitoring & Diagnostics With Command Line Tools: Part 5 - Using Shell Scripts
Shell scripts enable you to edit your diagnostic and monitoring commands into a script file so they can be repeated without needing to type them manually every time. Shell scripts also offer some unique and powerful features that help to…
IP Monitoring & Diagnostics With Command Line Tools: Part 4 - SSH Public Keys
Installing public SSH keys created on your workstation in a server will authenticate you without needing a password. This streamlines the SSH interaction and avoids the need to use stored and visible passwords in your scripts.