feature protecting assets in an IT world
In a world of IT risks, IT can also be the solution. Tony Lapolito, vice
president of marketing & product management at Signiant, reports.
secure manner or someone in a shop
IT risks need
taking the numbers? Sending an email
in your company or someone printing
out the spreadsheet and leaving it on
the printer? Making a voice over IP call
or someone overhearing you on the
train?
Today IT has plugged most of the
IT solutions
security holes in networks and all sorts
of transactions can be completed
securely. There is just as much danger
in the physical world or the old way of
doing things. Past IT lessons can be
applied to the issues currently facing
the media and entertainment world.
A
dvances in technology the next step in the development Most media companies operate
such as digital editing process, but not before being separate networks - their IT network
help us do our jobs better susceptible to multiple risks. A and their ‘broadcast’ network. This is
and faster; however, shipment can be lost or a courier can similar to when companies operated
other technical advances stop off and make a copy or share the separate computer and phone
create a whole new set information with someone else. networks. The argument was made
of potential risks. Protecting your Without a strict ‘chain of control’ that the two networks needed to
content from unauthorised distribution system in place to provide remain split because the phone
has never been easy, but it is made Tony Lapolito, vice accountability, your physical media is network needed the additional
all the more difficult by today’s ease
president of
always at risk while moving from one security. Once IT security principles
of copying files and the speed at
marketing &
product
place to another. were applied to the voice network, it
which content can make its way into management at • FTP or SecureFTP is an improvement was found that Voice over IP was
homes all over the world thanks to
Signiant.
to shipping a tape or disk because it more secure. Today most companies
the Internet and social media. provides more control: the files are have one combined network for both
To protect broadcast assets, being transferred between two computer and phone.
companies need to first understand approved locations. Though the Using the lessons of IT, securing
the risks that are out there and then chance that the content will be your content is possible and
take a number of combined steps to grabbed en route and copied is recommended. What is more valuable
ensure the safety of those assets. reduced, FTP is not a well-managed - the email you just sent or an
process. Without a central unreleased copy of the $100 million
Identifying the weak links management function and good movie? Using your computer network
transmission records, it is easy for this to securely transfer files is best
Two of the most commonly used delivery method to also be used to accomplished with an integrated
methods of moving content are transfer the content to someone system which, when implemented
problematic: outside your company. along with the steps described below,
• Physical media has the advantage of can provide the strongest protection
being portable, whether it’s a tape, a The IT precedent for your broadcast assets.
disk or a USB stick. Through a courier
or mail, the content can easily get to In addition to presenting risks, new The steps to protecting your
technologies can also provide broadcast assets
solutions, once users are confident
enough in the systems. Remember • Solidify physical security: Protect your
when people were afraid to buy a physical plant by ensuring a locked
book on line: What if my credit card server room, install video cameras and
gets stolen? How about sending an encrypt the data stored on disks.
email with important inter-company Additionally, by implementing a chain
communication: What if someone of custody process, you will provide
sees the salary information for the the accountability to prevent
whole company? Making a phone call unauthorised content distribution.
over IP: What if someone hears me • Eliminate shipment of physical
discussing the new acquisition? media: By eliminating the shipment of
In reality, what are the bigger tapes, disks and USB sticks your ability
threats? Sending your credit card to protect your media assets increases
information over the Internet in a drastically. When media is transferred
36 l ibe l january/february 2010 l
www.ibeweb.com
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44