Welcome!

News Feed Item

INSIDE Secure to Demonstrate Trusted Over-the-Top (OTT) Solutions at IBC 2014

INSIDE Secure (Euronext Paris: INSD), a leader in embedded security solutions for mobile and connected devices, today announced it will be attending the 2014 IBC Exhibition to demonstrate Over-the-Top (OTT) solutions on popular OSs. The company will showcase how device manufacturers, operators and content distributors are using hardware and software based solutions to enforce content licensing rights and protect subscriber revenues.

The challenge of content protection has deterred many device manufacturers, operators and content distributors from offering premium content. INSIDE Secure’s highly secure, integrated Digital Rights Management (DRM) solutions enable new business models for operator, studio and broadcaster markets by protecting valuable OTT High Definition (HD) and Ultra High Definition (UHD) content. With the right security solutions in place, media service providers and their partners can safely extend viewing options to new platforms and expand revenue opportunities.

Over-the-Top refers to the delivery of rich media content via the Internet—delivered to an end user “over” an operator’s network. Because the content arrives from a third party, Internet Service Providers (ISPs) are not responsible for or able to control, the viewing abilities, copyrights, and/or other redistribution of the content. To protect content and maximize revenue capabilities, a secure delivery mechanism is critical to success.

INSIDE Secure provides various content protection solutions to enable the best-fit security for every content delivery scenario, including OTT. As such the company can be your trusted partner to select the most cost effective solutions whether software or hardware based, or based on a Trusted Execution Environment (TEE). INSIDE Secure’s recent acquisition of Metaforic also adds robust whitebox encryption and code obfuscation technologies to its product line-up.

“We are proud to be showcasing INSIDE Secure’s latest innovations that our customers—including HBO, BBC and Sky—use to solve the security challenges of OTT,” said Martin Bergenwall head of the Mobile Security division at INSIDE Secure. “It’s exciting to see this market unfold as we partner with device manufactures, operators, and content distributors to help extend the reach of premium content services to a growing base of subscribers, across operating systems and delivery mechanisms.”

INSIDE Secure will be at IBC Exhibition 2014 to be held in Amsterdam from September 11-15, 2014. To learn more about INSIDE Secure OTT solutions visit the company booth or attend one of the following events:

INSIDE Secure Exhibition Booth
WHEN: September 12th – 16th
WHERE: IBC | Building 13.MS25

DASH Super Session Seminar
WHEN: September 13th 11:30am-1:30pm*
WHERE: RAI, Amsterdam, Room E102.

DASH Networking Event
WHEN: September 14th 6:30-9:30pm*
WHERE: @the Heineken Experience (Molenzolder Space)
*Note: Event capacity is limited so please plan on arriving early

To schedule an onsite meeting with one of the company’s security experts, please contact [email protected].

About IBC

IBC stands at the centre of global technical and creative innovation, drawing more than 52,000 professionals from over 170 countries into market-influencing debate. Uniting everything and everyone you need to know about the electronic media and entertainment industry at the RAI this September, IBC offers you rich opportunities for definitive research, stimulating education and business development, and is the perfect forum to network and exchange ideas.

About INSIDE Secure

INSIDE Secure (Euronext Paris FR0010291245 – INSD) provides comprehensive embedded security solutions. World-leading companies rely on INSIDE Secure’s mobile security and secure transaction offerings to protect critical assets including connected devices, content, services, identity and transactions. Unmatched security expertise combined with a comprehensive range of IP, semiconductors, software and associated services gives INSIDE Secure customers a single source for advanced solutions and superior investment protection.

For more information, visit http://www.insidesecure.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, discussed using predictive analytics to mon...
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to impr...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Join Impiger for their featured webinar: ‘Cloud Computing: A Roadmap to Modern Software Delivery’ on November 10, 2016, at 12:00 pm CST. Very few companies have not experienced some impact to their IT delivery due to the evolution of cloud computing. This webinar is not about deciding whether you should entertain moving some or all of your IT to the cloud, but rather, a detailed look under the hood to help IT professionals understand how cloud adoption has evolved and what trends will impact th...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.