Five Best Practices for Securing Your Content during Collaboration


That is the sound of your content leaking into the hands of pirates – costing the industry billions. Wolverine, Iron Man and Indiana Jones and the Kingdom of the Crystal Skull are just some of the movies reported to have been leaked. The same holds true for TV content – though some argue that when a pilot or season premiere leaks – it falls into the ‘promotion’ category.
A study by AT&T researchers concluded that for 77% of movies being traded on the internet, leaks originated by insiders. Screeners are a prime source but throughout the production and distribution cycle there are opportunities for security holes and unscrupulous profiteers.
It may start with an insider just ‘sharing’ with a friend. However, the Internet can turn a small leak into a tidal wave – and something ‘for your eyes only’ can quickly be seen by millions around the world.
The supply chain to create entertainment content is long and complex – involving hundreds of people. Collaboration requires fast and easy exchange of files – in direct conflict with securing content from piracy. So how can you address that paradox - eliminate the barriers to share the files with the right people, while protecting it from the wrong people?
Let’s start with the vulnerabilities:
Physical Media is, of course, portable. Dub a tape, hand it to a courier and in hours it is where it needs to be for the next step in the production process. If the tape is lost or if the courier makes an additional dub, content is at risk. Physical media lacks ‘chain of control’ safeguards. Military and government organizations have complex processes to ensure that there is complete accountability around the ‘chain of control’ of a document or other physical item (e.g. evidence).
FTP or SecureFTP is a step in the right direction. Exchange of files between two known entities provides a greater degree of control. However, FTP is not ‘managed’ and the very tool being used to collaborate can also be used to send content to unauthorized parties. With FTP, transmission records are not well kept and there is no central management function. Anyone with access to the content can start an FTP client, select the destination and send a file. It is difficult to determine if the transmission was legitimate or piracy.
Best Practices to securing your content
1) Eliminate Shipment of Physical Media – Whenever possible – eliminate the tapes, disks and USB sticks.
2) DRM and Watermarking has helped. Making people aware that the leak can be traced back to them - and that they are liable - results in people being more careful. Producing watermarked or DRM content by automating those processes can implement these controls without too much overhead.
3) Implement a Content Distribution Management Solution to enable your entire supply chain with managed file exchange. All file transfers are tracked and controlled. There is central visibility into all transfers.
4) Insist on Enterprise Class Security for File Exchange. Insist on the same safeguards that banks use to protect money transfers.
a. Encryption during the transfer of files
b. Certificates to ensure that each computer in the network is authenticated to protect against interception of messages
c. Digital Signatures to ensure data integrity and to prove delivery of the files
d. AAA Integration to provide access and to track usage of individual’s actions.
e. Logging ensures that all files transfers are tracking.
5) Harden Physical Security – Protect the physical plant – video cameras, locked server room, encrypted data on disks and implement chain of custody processes.
Case Study
A post-production services company that understands that a single leak can ruin the company implemented a number of best practices to ensure that there is no content leakage:
  • Reduced the use of physical media as much as possible and are encouraging clients to do the same.
  • Installed video surveillance cameras at all locations within their facilities that have access to content.
  • Eliminated the use of FTP.
  • Hardened all computers inside the firewall including shutting off USB ports.
  • Implemented a Signiant Content Distribution Management (CDM) solution that enables automated movement of content between all their partners. No content moves unless it is controlled by the CDM and logs all content into and out of the facility.
  • Install a CDM gateway node in the DMZ– no content enters or exits without going through the CDM node and being logged.
  • Uses automated workflows to watermark and DRM content when applicable.
There are rumours of companies and careers ruined by being the responsible parties. Old practices and culture need to adapt to an environment where the smallest leak can result in a tidal wave of lost content and profit. Best practices can be put into place to secure that content throughout the supply chain.
Tony Lapolito is Vice President of Marketing and Product Management at Signiant, the leading provider of Content Distribution Management solutions for the Media and Entertainment industry. Some of Signiant’s customers include NBC Universal, BBC News, Fox, Discovery Communications and FIVE.

Tags: pirates | protection | iss034 | signiant | security | secureftp | ftp | drm | watermarking | cdm | N/A
Contributing Author N/A

Article Copyright tv-bay limited. All trademarks recognised.
Reproduction of the content strictly prohibited without written consent.

Related Interviews
  • Viaccess-Orca at IBC 2016

    Viaccess-Orca at IBC 2016

  • Sennheiser HDM Pro at BVE 2014

    Sennheiser HDM Pro at BVE 2014

  • Petrol at NAB 2012

    Petrol at NAB 2012

  • Petrol at IBC2011

    Petrol at IBC2011

  • Signiant at IBC2011

    Signiant at IBC2011

  • Viaccess-Orca content security at IBC 2015

    Viaccess-Orca content security at IBC 2015

  • Viaccess-Orca at IBC 2013

    Viaccess-Orca at IBC 2013

  • JVC GY-HM650 upgrade at NAB 2013

    JVC GY-HM650 upgrade at NAB 2013

  • File Catalyst at NAB 2013

    File Catalyst at NAB 2013

  • Radiant Grid at IBC2011

    Radiant Grid at IBC2011


Articles
What content providers need to know about OTT
Hiren Hindocha As OTT (Over-The-Top) technology has gotten more mature and established robust standards over the years, the concept of OTT monitoring is gaining popularity. With customer expectations soaring, it’s vital for OTT providers to deliver superior quality content. To deliver Quality of Experience (QoE) on par with linear TV broadcast, the entire system, starting from ingest to multi-bitrate encoding to delivery to CDN must be monitored continuously.
Tags: iss134 | ott monitoring | qos | logging | compliance | dash | atsc | cloud | Hiren Hindocha
Contributing Author Hiren Hindocha Click to read or download PDF
Giving Welsh sport a global audience
Adam Amor From the Ospreys Rugby Union team, to the Football Association of Wales, as well as national cycling, swimming and boxing coverage, Port Talbot based Buffoon Film and Media has been heavily involved in putting Welsh sports on the world stage.
Tags: iss134 | blackmagic | atem | buffoon | micro studio camera | Adam Amor
Contributing Author Adam Amor Click to read or download PDF
An Obituary to Timecode
Bruce Devlin - new A stoic and persistent character that stubbornly refused to change with the times, Timecode has finally passed on, but no-one has noticed. A long-lasting industry veteran, Timecode was brought into this world at an uncertain date in the late 1960s due to the needs of analogue tape workflows and the demand for synchronisation between audio and video devices. A joint activity between SMPTE and the EBU led to the work on Time and Control codes starting its journey to standardisation in the early 1970s.
Tags: iss134 | timecode | smpte | ebu | edit | Bruce Devlin - new
Contributing Author Bruce Devlin - new Click to read
Accelerated Workflows with eGPU
Mike Griggs From the UK’s National Trust to magazine publishers to manufacturers, digital content creator Mike Griggs has a wide and varied portfolio of clients for whom he creates 3D art, motion graphics and multimedia exhibits. A typical day might involve sampling birdsong near Virginia Woolf’s country estate or creating 3D animations for VR. To keep on top of these demands, Griggs wanted to take the full power of the GPU computing revolution on the road.
Tags: iss134 | sonnet | egpu | amd | post production | editing | Mike Griggs
Contributing Author Mike Griggs Click to read or download PDF
GoPro HERO 7 Review
Tim Bearder When I heard I was filming a nature restoration project in the pouring rain this week I was excited. WHY? No Cameraman enjoys the rain, surely but this time I was enthusiastic because I knew this would be the perfect opportunity to try out the brand new GoPro Hero 7 Black Edition.
Tags: iss134 | gopro | hero 7 | review | liberal media | Tim Bearder
Contributing Author Tim Bearder Click to read or download PDF