5 ways smart companies keep internal cloud video secure

Share this post:

Internal cloud video secureIt’s not hard to see why so many businesses have adopted cloud-based streaming video. It’s an ideal way for an organization to stream a CEO presentation, introduce a marketing campaign, launch a new product, or encourage employee training and collaboration.

The benefits abound, but many business leaders have nagging concerns about security and data protection. A recent survey of corporate executives by Wainhouse Research found that more than half of respondents said that the ability to secure video content is a top priority in purchase decisions. The good news for companies eager to use cloud video is that providers such as IBM are taking steps to tighten security and allay customer fears, enabling easy-to-use internal video streaming with a level of security that’s as good (or better) than on-premises alternatives.

“Whether it’s more secure or less secure, [the cloud is] at least as secure as most enterprise environments,” John Treadway, Senior Vice President at Cloud Technology Partners, told NetworkWorld.

Cloud video undoubtedly creates value more quickly. Cloud deployments offer much greater agility at scale.

Here are five simple tips for securing your organization’s video content, live and archived:

1. Establish strong authentication

Authentication confirms that users are who they say they are by requiring a valid login and password combination. A widely used technology, single sign-on (SSO), permits a user to employ one set of login credentials to access multiple applications for a pre-determined period of time. When setting up a streaming video system, be sure to change default passwords and passcodes and make your new passwords difficult for outside parties to guess.

2. Control authorization

Authorization allows only to a specified set of users to access video content. For example, you may want everyone within the company to watch the latest corporate all-hands meeting, but you may want to only a few specific team members to see a video about a product that’s in development. Authorization enables companies to create customized directory groups that limit who can access specific content.

3. Set up secure, role-based access control

Similar to authorization, role-based access control (RBAC) is a security method that regulates access to network resources based on a user’s role within an organization. A company could, for example, limit executive training videos to VP-level employees and above.

4. Employ strong encryption

Data transmission is one of the most vulnerable aspects of streaming video security because the information often must travel over multiple public and private networks. Encryption encodes data to maintain confidentiality and guard against snooping attacks. Without strong encryption, hackers may be able to view and record streaming video, or even steal logins and passwords.

5. Protect video streams and back up data

Organizations should protect their video streams from being rebroadcast on unapproved sources, such as video players residing on other websites. Secure streaming video systems can detect exactly where a video player is located and instantly disable an unauthorized player. Video systems must also have rigorous data backup and recovery processes to protect stored content should the system unexpectedly crash.

In short, if your video content isn’t properly secured, your organization’s confidential information could become a rival’s competitive advantage, or even worse, the latest viral video. By taking proven precautions and selecting a cloud video platform that has comprehensive security capabilities, you’ll avoid exposing your video content to unnecessary risks.

For more information on internal corporate video security, read the Enterprise Video Components and Services white paper.


More Security stories

Vendor fraud gets red light from startup using blockchain on IBM Cloud

Fortune tells the story of how a scam involving email phishing and fake suppliers victimized the most sophisticated, tech-savvy corporations. A fraudster forged email addresses, invoices and corporate stamps to impersonate a large, Asian-based manufacturer with whom the tech firms regularly did business to trick two companies into paying for computer supplies. Over a two-year […]

Continue reading

Benchmark your readiness for a GDPR-compliant world

With the EU’s General Data Protection Regulation (GDPR) data regulation going into effect, we recently wrapped the latest GDPR Summit in London. Almost 500 attendees across most industries attended three parallel tracks of GDPR focused activity: GDPR program, HR and sales, and marketing. I was honored to give the keynote with my IBM colleague Jonathan […]

Continue reading

FacePhi biometric solution for mobile banking runs on IBM Cloud

Smartphones put the whole world in the palm of users’ hands. They can manage their personal lives, interact with friends and social networks, and bank and shop online. But how can we know that our interactions and transactions are secure? Social networks, e-commerce companies and banks require user names and passwords, but according to Tech […]

Continue reading