
Essential Guide: Making Cloud Systems Secure
February 15th 2023 - 09:30 AM
This Essential Guide discusses the new security challenges presented by IP & cloud infrastructure and the need to move from traditional perimeter based approaches to using encryption, OAUTH 2.0 and Zero Trust methodologies.
The conversation around security seems to have come out of nowhere and is gathering momentum. And as more broadcasters take advantage of IP, then the issues regarding security are gaining much more scrutiny.
Security isn’t new to broadcasters as we’ve been protecting high-value media assets and transmissions since the dawn of television. However, the barrier to entry in terms of cost and understanding has been huge meaning that the average criminal needed specialist knowledge, expertise, and experience to be able to acquire broadcast media.
The adoption of IP by broadcasters requires a new approach to security. We can no longer rely on the technical expertise needed to decode video and audio and must learn from other industries such as finance and medical imaging to understand how broadcasters can build highly secure datacenters and networks.
Download this Essential Guide now. It has been written for technologists, broadcast engineers, their managers, and anybody looking to understand the security challenges in their broadcast IP infrastructures.
Supported by
You might also like...
IP Security For Broadcasters: Part 11 - EBU R143 Security Recommendations
EBU R143 formalizes security practices for both broadcasters and vendors. This comprehensive list should be at the forefront of every broadcaster’s and vendor’s thoughts when designing and implementing IP media facilities.
Live Sports Production: The Rise Of Remote Hybrid Workflows
A discussion of the rise of remote production, why OB workflows remain first choice in tier one production and the emergence of new hybrid workflows.
Building Software Defined Infrastructure: Software Defined Infrastructure Components
There is much more involved in deploying effective microservices than just designing small footprint software applications. In this article we look at containers, why we need them, and the components needed to make the infrastructure work effectively.
IP Security For Broadcasters: Part 10 - NATS Advanced Messaging
As IT and broadcast infrastructures become ever more complex, the need to securely exchange data is becoming more challenging. NATS messaging is designed to simplify collaboration between often diverse software applications.
Standards: Part 26 - An Introduction To Metadata
Here we describe how metadata facilitates your asset workflow and distribution. It keeps track of your products in the archives so they can be re-purposed and monetized later.