TAG Video Systems has received high marks for its security protocols following a rigorous and thorough two-part audit based on criteria developed by the Open Web Application Security Project (OWASP).
According to Paul Briscoe, TAG’s chief architect, the results of this audit are a testament to the Company’s success in providing heightened security to its customers.
“One of the hottest topics today is security,” explained Briscoe. “Our customers deserve to know that their systems are pristine and their most valuable asset – their content, is safe. TAG supports all the standard safety protocols such as HTTPS and FTPS, offers Proxy capabilities to prevent unauthorized Internet access, and is constantly integrating updated security levels into our MCM-9000. We welcomed the opportunity to be audited and we’re proud to announce that the audit verified the effectiveness of our safety protocols.”
The security of TAG’s software-based MCM-9000 Multiviewer and monitoring solution was the subject of the dual-phased audit. The first part, Penetration Testing, assessed the solution’s ability to withstand breach attempts aimed at harming the system itself, or at gaining access to other applications on the infrastructure. TAG’s MCM-9000 scored high marks, proving itself resistant to unauthorized access.
Phase two of the audit, developed by OWASP and known as the Application Security Verification Standard (ASVS), evaluated the MCM-9000’s ability to address and mitigate the TOP 10 most critical security risks facing web developers and applications, including: injection flaws, broken authentication and access control, sensitive data exposure, poorly configured XML processors, security misconfiguration, cross-scripting flaws, insecure deserialization, vulnerable components and insufficient logging and monitoring. Phase two examined the procedures that were undertaken to develop the software and the security processes implemented to safeguard the data against risks. TAG’s MCM-9000 was verified for compliance with ASVS Levels 1 and 2, the stages that address applications containing sensitive data.
“Our MCM-9000 not only met the criteria set forth by OWASP but surpassed expectations,” added Briscoe. “We’re beyond pleased that our customers can be secure in the fact that their data and internal systems, and in turn their revenues, are securely protected from content hackers. This confirmation goes a long way to providing peace of mind for content owners.”
You might also like...
Having looked at the traditional approach to moving pictures and found that the portrayal of motion was irremediably poor, thoughts turn to how moving pictures might be portrayed properly.
From capture, through production and onwards to delivery, handling multiple formats simultaneously is a core challenge for broadcast workflows. Thankfully there will be plenty of technology options on show at IBC to facilitate even the most complex requirements.
The reality of the adoption of IP based workflows is that most broadcasters are running hybrid infrastructure that combines SDI, IP and IP enabled cloud and there will be plenty at IBC to help smooth the hybrid transition.
When conventional VFX are produced, there’s often a real-world lighting reference available. That approach can be used in virtual production, but increasingly, the director of photography might want or need to have some pre-production involvement in the development of a…
It is true that some of the key tools of virtual production are well-established in the world of computer entertainment, but the design constraints can be very different, demanding photorealism over smaller areas, as well as staging and layout that’s…