E-book: A preview of coming attractions - what's ahead for the Media & Entertainment industry

This eBook covers the hottest trends that will shape the media and entertainment industry in the year ahead. The eBook features executive commentary from Irdeto and industry thought leaders, including Twentieth Century Fox Film, MPAA, GoMedia, PlayKids, MTS, Foxtel, freenet TV and Vietnam Satellite Digital Television Company, LTD. Topics include industry collaboration to combat piracy, a 360-degree approach to anti-piracy, watermarking as a preferred security technique, innovation in IP video and 4K UHD, challenges and opportunities to address shifts in consumer viewing habits and key disruptors poised to shake up the market.

Read More

E-book: My content is being pirated - is forensic watermarking the answer?

There’s no doubt about it, watermarking has a critical role to play as part of any successful anti-piracy program. But only having watermarking technology will not be the most effective approach. If you want to successfully fight online piracy you need a combination of the latest technology and proactive services. To help you put together a successful anti-piracy program, this e-book features some recommended elements which are tried and tested. You will see how watermarking fits into the bigger picture.

Read More

E-book: 4 ways the right DRM strategy can boost consumer choice

In this e-book, Irdeto invites you to take a critical look at your current content security strategy. We present a series of questions that will help you determine whether your approach to DRM is fit for a future where your consumers expect to be able to choose the hottest new devices, the best quality content, OTT on their own terms AND a great user experience.

Read More

Strategy guide: The right security expands consumer choice

Getting the user experience “right” for as many consumers as possible means you must provide lots of choice. Only then can each consumer achieve their ideal combination of content, convenience and value. Traditionally, content protection hasn’t been seen as central to delivering these choices. We believe the time has come for a fundamental re-think of content protection and its impact on your growth. This guide provides a multi-step recipe for improving content protection that can have a positive on your business and give customers the choice they demand.

Read More

A Clearer Picture of Growth: 2016 Global 4K UHD Industry Survey

This global survey from Irdeto and analyst firm SNL Kagan reveals that pay TV operators and content producers believe that one of the key drivers for the implementation of 4K UHD is the expectation that consumers will pay 10-30% more for premium content. 'A Clearer Picture of Growth: 2016 Global 4K Industry Survey' provides a wealth of valuable information for anyone planning to launch 4K UHD services and/or content.

Read More

The case for connected application-centric software security

This whitepaper explores traditional approaches to software security and contrasts them with a connected, inside-out approach with protection technologies layered and used in an application-centric, cloud-connected topology.

Read More

E-book: 3 signs your OTT service is outgrowing its DIY video workflows

A home-grown approach to video content management may be ideal for start-up OTT services looking to manage a limited range of workflows. Basic computer scripts controlling off-the-shelf tools can offer cost-effective transcoding and encryption for small or static content libraries. But as your service takes off, be vigilant for evidence that a do-it-yourself approach is limiting growth.

Read More

Managed Devices - Threats and Security

Managed Devices are a central part of an operator’s network and are the key end points that provide the service and content to the subscribers. Because of their importance and the value of the services that they enable, they are often a primary target for attackers.

Read More

4K UHD: Getting from Risk to Reward

The advent of 4K UHD content brings new opportunities for operators along with a number of challenges in terms of costs, compatibility and compliance. Upgrading to meet the MovieLabs specifications is just one of many obstacles to creating a profitable 4K business. Operators who hope to take advantage of the opportunities will have to account for impacts to existing business models in terms of device resolution, encryption levels, bandwidth and scaling.

Read More

The Future TV landscape: Implications for content security

The largest disruption in the TV market in the last ten years has been the gradual shift from analog delivered content to digital content, over broadband. The change that is ahead will be far more disruptive and will see wired broadband delivery replaced almost entirely by wireless delivery, be that cellular, WiFi or LTE broadcast or any other format.

Read More

E-book: Protecting Content Rights

DRM occupies only a small proportion of what modern, sophisticated OTT platforms must employ to ensure rights compliance. DRM fulfills many of the delivery requirements, such as output protection and robustness, but many additional layers of functionality and processes are required to make every possible effort that the rights and usage rules are correctly exploited and protected.

Read More

Strategies for Secure OTT Video in a Multiscreen World

Life is not simple for providers of over-the-top (OTT) Internet video services – whether they are pay TV operators or new pure-Internet players. Services like Netflix have proven that it’s possible to attract large audiences to Internet-delivered premium video content, but staying competitive is difficult. Devices that can consume Internet video are proliferating to include set-top boxes (STBs), Smart TVs, optical disc players, and game consoles as well as PCs, laptops, and smartphones.

Read More

A Watermarking System for Adaptive Streaming

Content providers use forensic watermarking, a technique for tracing individuals who illegally redistribute con- tent, as one of the means to fight Internet content redistribution piracy - the top threat for many content providers around the world. As adaptive streaming becomes one of the main mechanisms for delivering premium multimedia content over the Internet, it is essential that watermarking works seamlessly in this environment to remain effective. In this technical paper we describe a solution that uniquely watermarks content for each receiving device using a variety of adaptive streaming applications.

Read More

Evolution of Content Protection

Recent trend towards on‐demand video consumption has caused CA and DRM roles to evolve and merge. This White Paper investigates some of the issues this development raises, focusing on the recent shift in the TV market towards the adoption of DRM‐based content protection solutions, and assesses the main drivers for this change, taking an in‐depth look at the business and technology implications for market players wishing to adopt a DRM approach.

Read More

Using TV Everywhere to Drive Premium TV Services

In this Irdeto-sponsored white paper, Brett Sappington, Director of Research at Parks Associates, discusses how pay TV operators are re-focusing their multi-screen strategies to include premium services to drive incremental revenues, to minimize the effects of cord-cutting and cord-shaving and to combat the continuous assault from competitive OTT services and piracy.

Read More

The Piracy Continuum

Content owners, content distributors and security vendors have traditionally characterized digital “pirates” as a single group of criminals with ill intentions. This, however, is a serious mistake, not only in understanding the reasons behind why people turn to piracy, but also when identifying methods to mitigate the threat and potentially learn lessons to generate unforeseen profit. To Irdeto, piracy is not a single behavior, but rather a continuum of behaviors that make up The Piracy Continuum.

Read More

The New Technologies for Pay TV Content Security

 In this white paper, Bill Rosenblatt, founder of GiantSteps Media Technology Strategies, looks at the history of technologies used to secure digital pay TV, explores the set of techniques that are considered to be today's best practices for pay TV security, and discusses content identification techniques designed to find unauthorized content "in the wild" (on the Internet) and trace it to the users or devices that made it available.

Read More

Introduction to Application Security

Threats to software applications are an on-going challenge and continue to escalate as hacking techniques become more sophisticated.

Read More

Sustainable Device Security

An effective security strategy should address integration, attack resistance and attack mitigation.

Read More

The Advantages of White-box Cryptography

Conventional cryptographic algorithms used to protect software keys and data are ineffective when operating in white-box environments, where a hacker has full visibility and control over the executing code.

Read More

Dynamic Digital Asset Protection Techniques

Static defenses of digital assets will eventually fall to the powers of determined adversaries. In this paper we argue that defenses that dynamically adjust themselves to new attack scenarios have a much higher chance of long-term survival.

Read More