Definition Apr/May 2026 - Web

CONTENT SECURITY TECH

PREVENTING THE NEXT WORKFLOW BREAK-IN With so many tools, vendors and

contractors intersecting in a production, now’s the time to up the game on workflow content security, says Neal Romanek

loses that briefcase, there goes the Oscars). Ionoco is a creative technology business with a number of customers whose content requires strict security, including game shows or programmes that feature live audience interaction. “In the US, you have standards and practices, where it is a federal offence to run any kind of unfair game on TV, and you have to be able to demonstrate that it is fair,” explains Simon Ingram, chief executive of Ionoco, and chairperson of its spinoff company Content Vault. Working for productions with sensitive content, such as the aforementioned programmes with live audiences, leads to a good practical understanding of how to keep files safe, and where the vulnerabilities in workflows are. “Sometimes we’ve seen customers sticking something up on Vimeo with

a single password that’s emailed to people and shared, and they’re suddenly in the position of not actually knowing who’s viewing what, who’s got access, or whether someone has downloaded something. This is game data. If it gets into the public domain, it’s going to destroy your game show.’” The company built Content Vault for the secure sharing of video, images and audio. This platform encrypts the files directly, which can then only be viewed by those with the Content Vault app and appropriate permissions. The levels of permission range from viewing only, to the ability to share or even to fully decrypt the original file. Some companies working with highly sensitive content still occasionally rely on physical delivery of media in order to avoid content passing through

unsecured networks. With an available solution like Content Vault, the content itself is encrypted, so even if it were somehow intercepted, it can’t be accessed and de-encrypted by anyone but the intended recipient. This makes delivery across multiple networks much more secure. “Nobody can open these files except you,” says Ingram. “Even if they’re posted publicly, the files can’t be opened or viewed, so you remove the risk that a third party is viewing your files and potentially using them. “People always tend to think about cybersecurity after the event rather than before, but some of the bigger networks we work with now are getting very tight, particularly when it comes to handling of pre-release video content, when it’s in that edit process.”

31

DEFINITIONMAGS

Powered by