The information these companies are holding is valuable and needs the very highest levels of data protection. But that’s just the one element of the post-production side of the data security issue in the entertainment industry. There are ever-present and increasing challenges during production itself.
Making material for TV and movie audiences is an expensive business. And now, when the sequence being filmed is “in the can” – it’s most likely also being digitally transferred back to the studio over the web.
That exclusive footage that no-one else has; that interview with the famous movie-star; that rooftop “live” music video just completed – is all being sent across the internet back to the studio. And even if the production team decides to send material back to the studio on a hard drive via a courier – are you sure the data is really safe?
And even when production has finished and the final edit is available, distribution to movie theaters is often digitally over networks, or via a courier with a physical hard drive copy. Leaking hijacked copies of movies, onto the Internet, before they are officially released can cost studios, and movie theaters, many millions of dollars. All of which means that production companies need to know:
Whether pre-production or post; whether within the trade or for consumer access; it’s not enough for files to be encrypted during transit, they need to be encrypted and protected at rest – both on the server and on any remote devices and systems. With Global Data Sentinel, our systems do exactly that: with our systems the encryption is inside the data, travels with the data, and protects the data at all times.
Encryption to protect data goes a long way to ensuring it remains safe. Putting measures in place to protect unauthorized viewing is another vital step.
From a consumer perspective, it could be as simple as an authorized device, with an authorized payment, and some checks to ensure that the person with the financial authority is actually aware of the transaction taking place – two factor authentication or a biometric measure are all possible using Global Data Sentinel.
These types of checks are arguably even more important inside the industry. What level of authority does a user have – does it include the right to edit or delete material from the system for example. And if material is accidentally deleted, can it be restored. Global Data Sentinel’s key access control features include:
In combination these controls help ensure only the authorized users access, view, or edit material.
The production process of movies and TV programs can involve not just hundreds of people, but hundreds of sub-contractors. In fact some production companies deliberately use the technique of splitting a project across a number of contractors so that nobody other than the main team has access to the finished product. This is seen as a great protection against damaging wholesale leaks, but some damage has been done by fragmented versions and clips finding their way onto the web before launch.
Our solution enables studios and production companies to control and manage the encryption of each and every fragment and section of a movie no matter where it is sitting and on what device.
GDS can control the whole end-to-end data protection process ensuring that even when the material is decrypted for editing, the data remains monitored and is protected from unauthorized transmission, copying or forwarding. Any attempt to switch off this functionality will result in logs and notifications to indicate there has been a breach.
In any production, keeping material and information confidential both inside and outside of the organization is paramount and one of the major sources of leaks can be as simple as email.
Fully encrypted and revocable email delivers maximum protection both within an organization and when dealing with third-parties. Our system generates an email audit trail so any deliberate attempts to leak information can be identified and sensitive material remotely deleted.
Global Data Sentinel empowers its clients to take back full control over their data, eradicating the threat of cybercrime.
May 20, 2015