Essential Guide: Secure IP Infrastructures For Broadcasters

October 2nd 2019 - 11:47 AM
Tony Orme, Editor at The Broadcast Bridge

Security is becoming increasingly important for broadcasters looking to transition to IP infrastructures. But creating improved software, firewalls and secure networks is only half the story as cybercriminals look to find new and imaginative methods of compromising data.

In this Essential Guide, we look at the new methods of attack cybercriminals are resorting to. We discover how disk drives and other intelligent peripheral devices within servers can be hacked. And we investigate the remedies high-end enterprise IT infrastructure vendors are adopting to keep our data secure.

Part 1 introduces how servers are made more secure. An in-depth description of how devices can be compromised is introduced with the remedies available to keep hackers out.

Part 2 explores Lights Out out-of-band Control and the critically important role it plays in verifying low-level server firmware, even before the CPU starts operating. The secure silicon root of trust is introduced along with the major benefits it provides for security.

Part 3 discusses secure virtualization and how encrypted VMs can help broadcasters deliver even higher levels of security. And discover how binary translation has been superseded by hardware virtualization and the benefits it brings.

This Essential Guide concludes with a sponsor’s perspective from HPE OEM Solutions and discusses their practical solutions to firmware vulnerabilities and specifically their secure silicon root of trust.

Download this essential guide today to understand advanced server security and how to implement it. This Essential Guide is for anybody designing, building, or administering their own broadcast IP infrastructure.

Part of a series supported by

You might also like...

Data Recording and Transmission: Reed Solomon Codes - Part 22

The Reed Solomon codes are defined by what the decoder expects to see and the encoder has to be configured to suit that.

Data Recording and Transmission: Reed-Solomon Error Correcting Codes - Part 21

The explosion in digital technology that led to Compact Discs, DVD, personal computers, digital cameras, the Internet and digital television broadcasting relies heavily on a small number of enabling technologies, one of which is the use of Reed-Solomon error correcting…

Data Recording and Transmission: Burst Errors - Part 20

The first burst error correcting code was the Fire Code, which was once widely used on hard disk drives. Here we look at how it works and how it was used.

The Sponsors Perspective: Reaching OTT At Scale - Pitfalls And Opportunities

OTT delivery continues to expand to meet the relentless growing consumer demand. This trend shows no chance of abating and technologists are continually looking to innovation to scale infrastructures accordingly. In this sponsors perspective, Ryan Nicometo, SVP of Product for…

Data Recording and Transmission: Cyclic Redundancy Checks - Part 19

The CRC (cyclic redundancy check) was primarily an error detector, but it did allow some early error correction systems to be implemented. There are many different CRCs but they all work in much the same way, which is that the…