To say times have changed would be an understatement. Nearly the entire worldwide workforce is collaborating remotely with video, which has blurred the line between public and private access to enterprise content. Meetings are being streamed and recorded from home or in public places, and large-scale video broadcasts—which can reach tens of thousands of viewers—are no longer being delivered and viewed from secure studios and office spaces.

The reality is, the unprecedented mass-adoption of video as a primary collaboration tool within the enterprise has out-paced the ability of many enterprises to protect it—creating significant vulnerabilities for both users and content. And for security-intensive and highly regulated industries like Banking and Finance, Health Care, Telecommunications and Manufacturing, the risks are particularly daunting. How do you protect user identities and define roles and access rights as authors, approvers and viewers? How do you provide end-to-end encryption and comprehensive content controls? And how do you track who did what and when?

Qumu’s holistic approach to user and content security as it relates to video is formed around 11 critical features, which we will group into 3 main areas of focus: Protecting Users, Protecting Content, and Monitoring and Tracking.

How Qumu Cloud Protects Users

Widespread video collaboration means that users’ images, identities, credentials and ideas are at risk. Qumu Cloud provides comprehensive authentication, access control and process “guide rails” protecting internal and external users so that they can collaborate freely, through all of the following: 

  • User Authentication and Single Sign-On—A cloud video solution should interface smoothly with existing corporate authentication directories, or provide built-in controls. Qumu’s Enterprise Video as a Service (EVaaS)™ platform utilizes SSO through SAML 2.0 providers. And when a corporate authentication service is not available, Qumu provides user management tools for user creation, self-registration, approvals, and assignment of content to groups.
  • IP Restriction—IP restriction provides a powerful way to protect users by allowing access only from a defined set or range of IP addresses—and offering administrators the ability to apply custom rules at an individual, content or group level.
  • Single Use Password—A single use password protects the credentials of users as well as sensitive content by applying a one-time password or code to a specific piece of video content or a single streaming session. Once distributed, single use passwords typically expire within seconds or minutes. 
  • Advanced User Security—Because of the unique nature of its business or video use cases, an organization may need an added layer of protection for their users. Qumu Cloud allows enterprises to customize password policies and enforce them across the environment, including expiration rules, timeouts, password complexity, username and history restrictions.
  • OAuth Tokens—OAuth authentication protocol allows a user or group to be automatically authorized for access to a web portal or other application because they have already been authenticated by another site or application—saving the user from having to re-enter their passwords and other private credentials.
  • Role-Based Permissions—A highly effective and intuitive means of maintaining user access control is through role-based permissions, which provide clear boundaries for what a user can access and the actions they can perform, depending on their role in the organization or in a process, such as editing versus authoring.

How Qumu Cloud Protects Content

Organizations of all sizes are experiencing exponential increases in the number of live video streaming events and the volume of video assets. And many are investing now in sophisticated cloud-based video platforms that were designed specifically to make content creation and sharing easy while protecting all video assets securely at any scale. Qumu handles content protection via:

  • Video Encryption—A very fundamental and important feature, encryption protects both internal and external video streams so that even if hackers or unintended recipients were to gain access, the content would not be viewable or decipherable.
  • Retention Policies—A truly secure video platform must provide the ability to establish, manage and enforce content retention policies at scale, particularly for compliance reasons, but also to minimize outdated or sensitive information. Within Qumu Cloud, actions, such as setting dates for automatic content expiration, deletion or archiving, can be customized according to groups or classes of content or for a specific asset.
  • Content Classification & Approval—Qumu Cloud allows administrators to define and enforce content workflows for processes such as creation and approval stages. This includes assigning classifications for different types of content and specifying group and individual roles for content approval, management and viewing rights.

How Qumu Cloud Allows Monitoring and Tracking of Content and Users

Of course, the full value of advanced video security measures can only be realized with equally robust monitoring, tracking and auditing of content usage and viewer behavior so that any potential risks or an actual breach in security can be identified, analyzed and avoided altogether.

  • Global Content Management—A video security solution is only as good as your ability to manage content, ultimately making compliance with policies and procedures easy for the end user. Qumu’s approach is to provide an end-to-end solution for globally managing video content with group-based controls that can be administered centrally or regionally.
  • Audit Trails—Qumu Cloud’s audit trails help organizations manage risk by logging any actions taken within the video environment like approvals, moves, deletions and logins. Enterprises can find out who created what content when, who made edits, and how frequently an individual is logging in. And proactively reviewing audit trails may help identify potential problems.

Conclusion

Organizations of all sizes are encouraging the use of video to keep their distributed, mobile workforces connected and collaborating. And cloud-based video platforms are making global video communications easier than ever, simultaneously fueling the surge and presenting new security risks for both users and their content. To mitigate potential vulnerabilities, companies should seek out vendors with solutions built upon sound security architectures, robust security features and comprehensive management tools.

If you would like more information on Qumu Cloud’s approach to video security, please download our recently published collateral piece, titled User and Content Security: The Qumu Cloud EVaaS™ Platform. But of course, the best way to get to know Qumu Cloud is to try it, so don’t hesitate to start your free trial now. All trials include full access to video capture and creation, live event streaming, video conferencing, secure storage and distribution, and more!

Related Articles