Essential Guide: Secure IP Infrastructures For Broadcasters

October 2nd 2019 - 11:47 AM
Tony Orme, Editor at The Broadcast Bridge

Security is becoming increasingly important for broadcasters looking to transition to IP infrastructures. But creating improved software, firewalls and secure networks is only half the story as cybercriminals look to find new and imaginative methods of compromising data.

In this Essential Guide, we look at the new methods of attack cybercriminals are resorting to. We discover how disk drives and other intelligent peripheral devices within servers can be hacked. And we investigate the remedies high-end enterprise IT infrastructure vendors are adopting to keep our data secure.

Part 1 introduces how servers are made more secure. An in-depth description of how devices can be compromised is introduced with the remedies available to keep hackers out.

Part 2 explores Lights Out out-of-band Control and the critically important role it plays in verifying low-level server firmware, even before the CPU starts operating. The secure silicon root of trust is introduced along with the major benefits it provides for security.

Part 3 discusses secure virtualization and how encrypted VMs can help broadcasters deliver even higher levels of security. And discover how binary translation has been superseded by hardware virtualization and the benefits it brings.

This Essential Guide concludes with a sponsor’s perspective from HPE OEM Solutions and discusses their practical solutions to firmware vulnerabilities and specifically their secure silicon root of trust.

Download this essential guide today to understand advanced server security and how to implement it. This Essential Guide is for anybody designing, building, or administering their own broadcast IP infrastructure.

Part of a series supported by

You might also like...

Microphones: Part 11 - The State Of The Art… And The Potential Of MEMS Microphone Arrays

Here we look from the state of the art in microphones, to what the future may bring with the enticing theoretical potential of microphone arrays built using MEMS technology.

IP Monitoring & Diagnostics With Command Line Tools: Part 2 - Testing Remote Connections

In the previous article, we set the scene for working with the Command Line Interface (CLI) on a UNIX system. Now we will explore some techniques for performing basic tests on our network infrastructure to check for potential problems.

Microphones: Part 10 - Mid-Side (M-S) Recording And Processing

M-S techniques provide useful sound-field positioning and a convenient way to check mono compatibility. We explain the hard science behind this often misunderstood technique.

Microphones: Part 9 - The Science Of Stereo Capture & Reproduction

Here we look at the science of using a matched pair of microphones positioned as a coincident pair to capture stereo sound images.

Microphones: Part 8 - Audio Vectorscopes

The audio vectorscope is an excellent tool for assuring quality in stereo sound production, because it makes the virtual sound image visible in the same way that a television vectorscope allows the color signals to be seen.