Welcome!

News Feed Item

INSIDE Secure to Demonstrate Trusted Over-the-Top (OTT) Solutions at IBC 2014

INSIDE Secure (Euronext Paris: INSD), a leader in embedded security solutions for mobile and connected devices, today announced it will be attending the 2014 IBC Exhibition to demonstrate Over-the-Top (OTT) solutions on popular OSs. The company will showcase how device manufacturers, operators and content distributors are using hardware and software based solutions to enforce content licensing rights and protect subscriber revenues.

The challenge of content protection has deterred many device manufacturers, operators and content distributors from offering premium content. INSIDE Secure’s highly secure, integrated Digital Rights Management (DRM) solutions enable new business models for operator, studio and broadcaster markets by protecting valuable OTT High Definition (HD) and Ultra High Definition (UHD) content. With the right security solutions in place, media service providers and their partners can safely extend viewing options to new platforms and expand revenue opportunities.

Over-the-Top refers to the delivery of rich media content via the Internet—delivered to an end user “over” an operator’s network. Because the content arrives from a third party, Internet Service Providers (ISPs) are not responsible for or able to control, the viewing abilities, copyrights, and/or other redistribution of the content. To protect content and maximize revenue capabilities, a secure delivery mechanism is critical to success.

INSIDE Secure provides various content protection solutions to enable the best-fit security for every content delivery scenario, including OTT. As such the company can be your trusted partner to select the most cost effective solutions whether software or hardware based, or based on a Trusted Execution Environment (TEE). INSIDE Secure’s recent acquisition of Metaforic also adds robust whitebox encryption and code obfuscation technologies to its product line-up.

“We are proud to be showcasing INSIDE Secure’s latest innovations that our customers—including HBO, BBC and Sky—use to solve the security challenges of OTT,” said Martin Bergenwall head of the Mobile Security division at INSIDE Secure. “It’s exciting to see this market unfold as we partner with device manufactures, operators, and content distributors to help extend the reach of premium content services to a growing base of subscribers, across operating systems and delivery mechanisms.”

INSIDE Secure will be at IBC Exhibition 2014 to be held in Amsterdam from September 11-15, 2014. To learn more about INSIDE Secure OTT solutions visit the company booth or attend one of the following events:

INSIDE Secure Exhibition Booth
WHEN: September 12th – 16th
WHERE: IBC | Building 13.MS25

DASH Super Session Seminar
WHEN: September 13th 11:30am-1:30pm*
WHERE: RAI, Amsterdam, Room E102.

DASH Networking Event
WHEN: September 14th 6:30-9:30pm*
WHERE: @the Heineken Experience (Molenzolder Space)
*Note: Event capacity is limited so please plan on arriving early

To schedule an onsite meeting with one of the company’s security experts, please contact [email protected].

About IBC

IBC stands at the centre of global technical and creative innovation, drawing more than 52,000 professionals from over 170 countries into market-influencing debate. Uniting everything and everyone you need to know about the electronic media and entertainment industry at the RAI this September, IBC offers you rich opportunities for definitive research, stimulating education and business development, and is the perfect forum to network and exchange ideas.

About INSIDE Secure

INSIDE Secure (Euronext Paris FR0010291245 – INSD) provides comprehensive embedded security solutions. World-leading companies rely on INSIDE Secure’s mobile security and secure transaction offerings to protect critical assets including connected devices, content, services, identity and transactions. Unmatched security expertise combined with a comprehensive range of IP, semiconductors, software and associated services gives INSIDE Secure customers a single source for advanced solutions and superior investment protection.

For more information, visit http://www.insidesecure.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Evan Kirstel is an internationally recognized thought leader and social media influencer in IoT (#1 in 2017), Cloud, Data Security (2016), Health Tech (#9 in 2017), Digital Health (#6 in 2016), B2B Marketing (#5 in 2015), AI, Smart Home, Digital (2017), IIoT (#1 in 2017) and Telecom/Wireless/5G. His connections are a "Who's Who" in these technologies, He is in the top 10 most mentioned/re-tweeted by CMOs and CIOs (2016) and have been recently named 5th most influential B2B marketeer in the US. H...
Let’s face it, embracing new storage technologies, capabilities and upgrading to new hardware often adds complexity and increases costs. In his session at 18th Cloud Expo, Seth Oxenhorn, Vice President of Business Development & Alliances at FalconStor, discussed how a truly heterogeneous software-defined storage approach can add value to legacy platforms and heterogeneous environments. The result reduces complexity, significantly lowers cost, and provides IT organizations with improved efficienc...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
Containers, microservices and DevOps are all the rage lately. You can read about how great they are and how they’ll change your life and the industry everywhere. So naturally when we started a new company and were deciding how to architect our app, we went with microservices, containers and DevOps. About now you’re expecting a story of how everything went so smoothly, we’re now pushing out code ten times a day, but the reality is quite different.
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, will outline ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and...
As Cybric's Chief Technology Officer, Mike D. Kail is responsible for the strategic vision and technical direction of the platform. Prior to founding Cybric, Mike was Yahoo's CIO and SVP of Infrastructure, where he led the IT and Data Center functions for the company. He has more than 24 years of IT Operations experience with a focus on highly-scalable architectures.