5 ways smart companies keep internal cloud video secure

Share this post:

Internal cloud video secureIt’s not hard to see why so many businesses have adopted cloud-based streaming video. It’s an ideal way for an organization to stream a CEO presentation, introduce a marketing campaign, launch a new product, or encourage employee training and collaboration.

The benefits abound, but many business leaders have nagging concerns about security and data protection. A recent survey of corporate executives by Wainhouse Research found that more than half of respondents said that the ability to secure video content is a top priority in purchase decisions. The good news for companies eager to use cloud video is that providers such as IBM are taking steps to tighten security and allay customer fears, enabling easy-to-use internal video streaming with a level of security that’s as good (or better) than on-premises alternatives.

“Whether it’s more secure or less secure, [the cloud is] at least as secure as most enterprise environments,” John Treadway, Senior Vice President at Cloud Technology Partners, told NetworkWorld.

Cloud video undoubtedly creates value more quickly. Cloud deployments offer much greater agility at scale.

Here are five simple tips for securing your organization’s video content, live and archived:

1. Establish strong authentication

Authentication confirms that users are who they say they are by requiring a valid login and password combination. A widely used technology, single sign-on (SSO), permits a user to employ one set of login credentials to access multiple applications for a pre-determined period of time. When setting up a streaming video system, be sure to change default passwords and passcodes and make your new passwords difficult for outside parties to guess.

2. Control authorization

Authorization allows only to a specified set of users to access video content. For example, you may want everyone within the company to watch the latest corporate all-hands meeting, but you may want to only a few specific team members to see a video about a product that’s in development. Authorization enables companies to create customized directory groups that limit who can access specific content.

3. Set up secure, role-based access control

Similar to authorization, role-based access control (RBAC) is a security method that regulates access to network resources based on a user’s role within an organization. A company could, for example, limit executive training videos to VP-level employees and above.

4. Employ strong encryption

Data transmission is one of the most vulnerable aspects of streaming video security because the information often must travel over multiple public and private networks. Encryption encodes data to maintain confidentiality and guard against snooping attacks. Without strong encryption, hackers may be able to view and record streaming video, or even steal logins and passwords.

5. Protect video streams and back up data

Organizations should protect their video streams from being rebroadcast on unapproved sources, such as video players residing on other websites. Secure streaming video systems can detect exactly where a video player is located and instantly disable an unauthorized player. Video systems must also have rigorous data backup and recovery processes to protect stored content should the system unexpectedly crash.

In short, if your video content isn’t properly secured, your organization’s confidential information could become a rival’s competitive advantage, or even worse, the latest viral video. By taking proven precautions and selecting a cloud video platform that has comprehensive security capabilities, you’ll avoid exposing your video content to unnecessary risks.

For more information on internal corporate video security, read the Enterprise Video Components and Services white paper.


Add Comment
No Comments

Leave a Reply

Your email address will not be published.Required fields are marked *

More Security stories

Extending security and performance from the cloud to the network edge with IBM and Cloudflare

The rate and sophistication of cyber security threats are growing daily, but security should not be a barrier to entry for enterprises on their cloud journey. More importantly, enterprises shouldn’t have to sacrifice application performance to enhance security. IBM and Cloudflare are working together to launch IBM Cloud Internet Services, a set of edge network […]

Continue reading

Accelerating continuous security for apps on IBM Cloud

The rapid rise of cloud native applications is challenging convention up and down the stack. More importantly, it is forcing enterprises to take a hard look at how security is integrated into application development and delivery at every level. For example, 37 percent of IT decision makers cite surveyed security as a roadblock they face […]

Continue reading

Less than 100 days out: How to accelerate GDPR readiness with the cloud

With the European Union’s General Data Protection Regulation (GDPR) coming into effect in less than 100 days, chances are you know your business needs to rapidly transform how it manages the personal information and data of EU subjects. According to research conducted by Vanson Bourne and IBM, 47 percent of organizational leaders surveyed in the […]

Continue reading