Strategies for Secure OTT Video in a Multiscreen World
Life is not simple for providers of over-the-top (OTT) Internet video services – whether they are pay TV operators or new pure-Internet players. Services like Netflix have proven that it’s possible to attract large audiences to Internet-delivered premium video content, but staying competitive is difficult. Devices that can consume Internet video are proliferating to include set-top boxes (STBs), Smart TVs, optical disc players, and game consoles as well as PCs, laptops, and smartphones.
Keys & Credentials: The New Linchpin to Success for Pay-TV Service Providers
Until now, service providers have been able to incrementally add operational support for the security processes that are essential to extending premium services to ever more devices, conditions have reached a point where a new solution is called for. This document explains how these new operational challenges are taxing the resources of even the largest pay TV service providers and describes a new approach operators can take to alleviate this burden.
A Watermarking System for Adaptive Streaming
Content providers use forensic watermarking, a technique for tracing individuals who illegally redistribute con- tent, as one of the means to fight Internet content redistribution piracy - the top threat for many content providers around the world. As adaptive streaming becomes one of the main mechanisms for delivering premium multimedia content over the Internet, it is essential that watermarking works seamlessly in this environment to remain effective. In this technical paper we describe a solution that uniquely watermarks content for each receiving device using a variety of adaptive streaming applications.
Evolution of Content Protection
Recent trend towards on‐demand video consumption has caused CA and DRM roles to evolve and merge. This White Paper investigates some of the issues this development raises, focusing on the recent shift in the TV market towards the adoption of DRM‐based content protection solutions, and assesses the main drivers for this change, taking an in‐depth look at the business and technology implications for market players wishing to adopt a DRM approach.
Using TV Everywhere to Drive Premium TV Services
In this Irdeto-sponsored white paper, Brett Sappington, Director of Research at Parks Associates, discusses how pay TV operators are re-focusing their multi-screen strategies to include premium services to drive incremental revenues, to minimize the effects of cord-cutting and cord-shaving and to combat the continuous assault from competitive OTT services and piracy.
The Piracy Continuum
Throughout this white paper readers will learn the distinct and subtle differences between the various categories of pirates, understand consumer drivers for piracy, and what opportunities are available to successfully turn pirates into paying customers.
The New Technologies for Pay TV Content Security
In this white paper, Bill Rosenblatt, founder of GiantSteps Media Technology Strategies, looks at the history of technologies used to secure digital pay TV, explores the set of techniques that are considered to be today's best practices for pay TV security, and discusses content identification techniques designed to find unauthorized content "in the wild" (on the Internet) and trace it to the users or devices that made it available.
Tablets — Pay TV's Next Frontier
Primed by their experiences with smartphones and touch-screen devices, consumers are ready for something bigger, but still portable, on which to watch video where and when they want: tablets fit the bill perfectly. With sales predicted to reach 450 million by 2015, tablets are now an essential part of TV Everywhere planning.
Introduction to Application Security
Threats to software applications are an on-going challenge and continue to escalate as hacking techniques become more sophisticated.
Sustainable Device Security
An effective security strategy should address integration, attack resistance and attack mitigation.
The Advantages of White-box Cryptography
Conventional cryptographic algorithms used to protect software keys and data are ineffective when operating in white-box environments, where a hacker has full visibility and control over the executing code.
Dynamic Digital Asset Protection Techniques
Static defenses of digital assets will eventually fall to the powers of determined adversaries. In this paper we argue that defenses that dynamically adjust themselves to new attack scenarios have a much higher chance of long-term survival.