Use Your Webcasting Software to Help Protect Critical Video Assets

 In Newsletter

As video solidifies its place among the top modes of corporate communication for employees, partners, and external stakeholders, your enterprise video library is bound to increase. It’s no surprise that protecting video assets throughout creation, distribution, and storage is a top enterprise concern.

Of course, it’s up to hardware and software vendors to ensure their products are designed and built to high-security standards, with the right functionality and features that allow end users to customize their own protections as well.

A webcasting platform, for instance, may be designed so that it can authenticate and authorize viewers through integration with access control systems such as Lightweight Directory Access Protocol (LDAP). Or the player can be set to restrict viewing on specified URLs or IP addresses, making it impossible for the video to be viewed through unauthorized sites or by unwanted individuals.

Your webcasting software should contain features that give you control over who can access your video assets. It should also offer authentication options that add an extra layer of protection against unauthorized access.

Control Access at Authoring

Security risks begin the moment you start to prepare your webcast video and related materials, such as PowerPoint decks. Your webcasting platform has functions to help you prepare live and on-demand presentations for a webcast as well as to help manage the event.

The authoring process and access to your database of webcast content must be tightly controlled and thoroughly logged. It’s not uncommon for confidential data to be uploaded to the database tool before the video is published. As a good practice, verify the security of your content when it’s uploaded to your webcasting platform. Is the content protected by the latest, most up-to-date cybersecurity?

All webcast video assets and content should be password-protected. We recommend that you enforce strong administrator account password requirements, and use a robust hashing algorithm to store user passwords.

Some of the password and access control options available in our Convey webcasting software include:

  • Referral Checking: This feature prevents the event URL from being accessed directly. Viewers can access the webcast only if they enter from one of the URLs on a referral list.
  • Password: This feature allows viewers to access your event’s landing page but prevents them from accessing the presentation if they don’t have the password.
  • Password Protect Login: This allows you to set a password that registrants must use to enter your event. The password is distributed in the registration confirmation and event reminder emails by default.
  • Site Lockout: This requires viewers to enter a site key and passcode to join your event. Viewers are prompted to enter the site key and passcode before they reach the landing page where they register or log in.
  • Limit Simultaneous Logins: This prevents a login from being shared by multiple viewers. You can choose the number of active viewing sessions allowed for each email address.

Further access controls can be placed on webcast presentations by enabling Viewer IP, Viewer Email Address, or Viewer Domain options. With the webcasting software, you can also add a list of only those viewers authorized to access the presentation. Conversely, you can add a list of viewers who are blocked from accessing the presentation.

Take control of your important enterprise video assets.

References:

IBM Cloud Video – Enterprise Video Security

https://info.video.ibm.com/enterprise-video-security-services.html

TalkPoint Support Center

https://webcasts.desk.com/

Recent Posts

Start typing and press Enter to search