FEED issue 28 Web

18 SPONSORED CONTENT AWS

DRM is the most basic – and maybe the most important – building block for securing content. BuyDRM is helping provide peace of mind for a whole industry

treaming piracy is always in the news, mostly because a lot of people at home have tried it, and a lot of content creators are

beginning to end. DRM runs through the entire life cycle of a piece of content’s use, from digital dailies, pre-post, screeners, voters, direct-to-consumer, long-tail around studios and studio-mandated DRM. Christopher Levy, CEO and founder of BuyDRM, notes that while most of the focus on content piracy is around the end user and stream hacking, the biggest weak point is when the content is in post- production and pre-release. He explains: “There is so much focus on end user piracy, but the data available out there shows most leaks happen in the studio post-house being hacked. More often than not, it’s not the end user you need to worry about.” Streaming piracy is about hackers diverting content from its intended

destination to share it for ‘free’ to those who want access. The reason for the inverted commas on ‘free’ is because those using devices loaded with the likes of Kodi software to enable them to view this content – and according to the Digital Citizens Alliance there are 12 million active users of illicit devices in North America alone – are vulnerable. According to a Digital Citizens report, Fishing in the Piracy Stream: How the Dark Web of Entertainment is Exposing Consumers to Harm , hackers are targeting the rogue market that offers illegal access to pirated movies and live programming to spread malware and exploit unsuspecting users. Yet despite the risks, around 190 billion visits were made to illegal piracy sites

haemorrhaging revenues because of it. To try to curb this revenue and intellectual property leakage, there are technologies being employed to protect content. Digital rights management (DRM) can be described as armour that wraps around content that needs to be protected, from early on in the creative and editing process, to further down the line as it is distributed. Inside that armour are other forms of content protection, but these also need DRM surrounding them as the only form of fortification that travels with the content throughout its life cycle, everywhere, from

feedzinesocial feedmagazine.tv

Powered by