Veset – Keeping content secure when using cloud playout

Veset – Keeping content secure when using cloud playout

Skip to content
IABM
Login / Register
The MediaTech Vantage account needs to be created. Please contact the administrator
Menu
  • Home
  • Join IABM
    • Join IABM
    • Benefit Comparison Grid
    • Global Engaged Partner Program
    • Affiliate Membership Program
    • Trade Show Support
    • IABM Member Companies
  • News
    • All News
  • Knowledge Hub
      • Topics
          • Topics
          • Ad Tech
          • Adjacent Markets
          • AI/ML, Data & Analytics
          • At-Home/Remote Production
          • Business Models
          • Cloud & Virtualization
          • Consumer Habits & Experiences
          • Data Privacy & Management
          • Digital & Social
          • Digital Transformation
          • Edge Computing
          • Financials, Investment & M&A
          • Imaging
          • Immersive
          • Insight & Analysis
          • IP Transport & Networking
          • Mobile
          • Next-Gen Hardware
          • Next-Gen Standards
          • OTT & Streaming Platforms
          • Programming & Creative
          • Rights & Legal
          • Sales & Marketing
          • Security
          • Skills & Education
          • Social Media
          • Supply Chain
          • Sustainability & Inclusion
          • Content Chain Elements
          • Create
          • Produce
          • Manage
          • Publish
          • Monetize
          • Connect
          • Support
          • Store
          • Consume
      • IABM Journal
          • Journal CoverJournal 131 Cover
          • Journal 132
          • Journal 131
          • Journal 130
          • Journal 129
          • Journal 128
          • Journal 127
          • Journal 126
          • Journal 125
          • Journal 124
          • Journal 123
          • Journal 122
          • Journal 121
          • View all
      • Spotlight Reports
  • MediaTech Intelligence
    • MediaTech Vantage
    • MediaTech Radar
    • Bespoke Research
  • Skills & Development
    • Training Courses
    • E-Learning Courses
    • Training Partners
    • Student Awards
  • Our Community
    • IABM Team
    • IABM Members’ Board
    • Member Councils
      • Americas’ Council
      • APAC Council
      • DACH Council
      • EMEA Council
      • UK Council
    • IABM Business Standard
    • Honorary Members
  • Events & CatchUp
    • Events Calendar
    • IABM Supported Events
    • NAB Show 2025 Content
    • In Conversation with
    • IABM 2024 Content
  • Technology
    • Technology & Trends Roadmap
    • Standards Monitoring Group
    • Standards Activities
  • BaM™ Shop Window
    • Search the BaM™ Shop Window
    • BaM™ Shop Categories
    • BaM™ Shop Window Product Submission
    • BaM™ Shop Window FAQ’s
    • BaM Content Chain
  • Dealer Directory

IABM Journal

Search the IABM Knowledge Hub


Tag: Data Quality

Veset – Keeping content secure when using cloud playout

Getting content delivery right is a top priority for broadcasters and media providers, with security being a critical, non-negotiable aspect. Broadcasters are increasingly turning to cloud playout to manage the complexities of delivering content to a diverse range of platforms and devices, and so it’s critical that cloud playout systems operate to the highest security standards. Not only do broadcasters need to protect their content and channels from unauthorized access, cyber-attacks and data breaches, but these security threats are constantly evolving as attackers adapt and seek to exploit different vulnerabilities in broadcast systems. And so, for broadcasters wanting to use cloud playout, the inevitable question arises: how can they ensure their content remains secure?

View More

Pebble – Cybersecurity collaboration for protecting high-value media

As broadcasters continue their IP transition and take advantage of the commanding and compelling opportunities that cloud systems offer, protecting high-value media must now be a fundamental component of the design, not a hastily appended feature.

View More

Amagi – Shielding your secrets using secure local vault

Exposure of credentials has emerged as a leading cause of data breaches across organizations. Verizon’s 2023 Data Breach Investigations Report reveals that external actors were involved in 83% of data breaches, with stolen credentials being exploited in 49% of these breaches. Furthermore, such breaches have severe consequences for businesses. According to IBM’s 2023 Cost of Data Breach Report, stolen or compromised credentials contributed to approximately 15% of data breaches, resulting in losses of $4.62 million.

View More

Agama Technologies – Unify, simplify, and understand your data: how consolidation can streamline and empower your video services

In today’s dynamic video market, service providers have adapted and evolved their services in sync with the technology evolution in customer devices, mobility, and preferred ways to interact with entertainment content.

As a result of innovation and growth, some complexity and fragmentation have unavoidably occurred. For instance, IPTV over ABR services is run together with companion services on user-owned devices like connected TVs, phones and laptops – alongside value-added services, such as catch-up and start-over, live together with PVR, third-party AVOD, as well as targeted advertising.

View More

DW Innovation – Towards Trustworthy AI in Media Tools

Broadcasters and media companies are implementing technologies powered by Artificial Intelligence (AI) and Machine Learning (ML) across the value chain. We see countless use cases for AI based automation or support and new opportunities keep emerging. So far, the focus has been on the usefulness of AI systems in terms of accuracy and performance in relation to a specific task. This is now changing with a wider uptake of AI, new capabilities for ML and public debates on this technology.

View More

Eluvio: First 4K UHD Digital Movie NFT: The Lord of the Rings: The Fellowship of the Ring (Extended Version) Web3 Movie Experience

Comcast Technology Solutions: BaM Shortlist – Manage

Defense by Design: How Caching Enables Resilience

Business resilience depends on reliable cybersecurity, but relying only on traditional security tools can leave aspects of your business vulnerable. Resilience for digital business starts with high availability and scalability – guaranteeing performance and uptime for websites and apps, no matter what levels of traffic are thrown at them. This can be achieved with caching technologies.

View More

Relying on the cloud for revenue protection

As an industry, we talk a lot about “business continuity” or “disaster recovery.” But what we actually mean is “revenue protection.”

View More

The data domino effect

When designing a storage system for a production or post facility, it is easy to concentrate on capacity and throughput, and think that is all you need. However, a very real issue is data safety and how to guard against it. That is a particular problem in our industry of media production. Once you start considering the issues around data loss, the potential problems start to escalate: a real domino effect.

View More

Posts pagination

Page 1 Page 2 … Page 4 Next page

IABM Platinum Members

IABM Gold Members

IABM
View all Members

Connect. Support. Inform

  • twitter_icon
  • ln_icon

  • About Us
  • Contact Us
  • IABM Privacy Policy
  • IABM Cookie Policy

© 2025 IABM IABM is company limited by guarantee. Registered in England No: 5262009. Registered Office: IABM, 5 Deansway, Worcester, WR1 2JG

X
OSZAR »