Asia-Pacific Broadcasting (APB) December 2016 Volume 33, Issue 11 - Page 18

18 MANAGEMENT December 2016 Integrity and trust at the core of big data BY STEVE CHRISTIAN Steve Christian is senior vice president, Marketing at Verimatrix. Video operators have long grown accustomed to protecting their critical assets from piracy and revenue theft, which up until recently, primarily concerned the actual content itself. However, it is just as critical to safeguard all service and customer data that indicate trends, such as video quality, content consumption, individual subscriber preferences and behaviour, as well as broader audience trends. Unlike video content, the data contains information that operators can exploit to improve their own services and/or sell to third parties. As a result, integrity and privacy of video analytics data will become critical. Any breach occurring during either storage or transfer can have a serious impact on trust by customers. Revenue security systems already in place using technology from providers such as Verimatrix have become sources of prime analytics data. This is by virtue of exploiting the unique position in the content ecosystem occupied by these vendors through delivering keys or licences for specific assets to end-devices for each subscriber. Verimatrix, for example, can see what is being watched on every device, and as a result, can deliver a detailed view of content consumed all the way down to individual households and devices. For online video accessed via connected devices, there is also scope to drill down further, right to the individual user. Additionally, revenue security platforms are able to harness encrypted data in transit as they alone have the ability to decrypt it, which can be used to measure or even apply quality of service (QoS) for specific premium content. Given this inherent link, big data is a natural extension for revenue security specialists like Verimatrix. We have adapted and extended our existing security technology and ecosystem to cater to the collection, storage and analysis of diff \[\\و]KXۚ\[]\[YB[\]YH[[\˂XZ[H\H܈]HX\]B[YY HX[]H[ۙ]\BY[[[]X]H[Y\\[Bۈ]X\]KXو\H\˜\Z\Y[H][و[BY][ۜX\H\X]H[[Y[H[\\[X]^\^[[]™[^[ۙY][ۘ[][YHX\]H[YH\X[H[]H[[]X˂X]\[܈Y HX[]Bو\\\YYY[ MB[TX\YXZ\^[\˜HX[HوH[][]Y]XYYH\X\\HޙXٝ\B\[H]\[[ۜ]HBYYX\H]H]^\ۂۛXY]X\˂H\X\\X\ٝ[B^X]YH8'X[Z[]K[ZYx'H]X][\\YHY]\&\]HX[K[X[[HXZ]HY]\\[ܛX][ۈHH]XH[ [\Z[KZ[\Z\[ۈ۝[[ۜۈH[]\[ۋ\[Y[[[\[YB[X[X]YH[ܙX\YۛX]]HHY][۝[X\[\ˈXYۛX]]H\Z[][H\[›\][ۘ[[[H\Y\X[܈H[ݙHH\\X\Y\XH\X][ۈ\X[\YY X\Y\][ۜˈ\\X]Bو]\]H\ܙYۈ܈ٙ]K]H[ܙX\[HY[X[H[\XHٝ\KYY[Y]ܚ[HY ][X]ܚY[˜[[]X]H[H]B\X[ۈH۝[ ؛Y][›\]ܜX\H]HXBH]XHH\\X]BX^H[\\ۈH\]ܸ&\›ۈ\\\\܈ݚY[œX[Y[][ۜ][]\\Y\X\Y\\\YZ[›]\YHY][Y[[ܞK\YX[]]H]\\B][][Y[][ۜHY\œX\H[\X]HY\\[\X]H PPKX][[\™܈ۛ[HY\\[ˈHXZ[[\X][ۈ\H\]\]ܜ‚H\H[YX^[[\[^[ۙY][ۘ[][YHX\]B[YH\X[H[]H[[]XXH[Y]H[[XB^KU\]ܜ[\XKTXYX[[]\H]H[H[ܙX\[B\]]]HX\]܈Y[ۜ[\[ۈXܛ][\HܙY[˂]\X\۝[[[][Y[][H[Yܚ]H[X\]Hو[\[][]HݚYY\\ZZ\X\˜Y\\\˂]\\[][ۜ\]\\܈[[YYX]H\Y\]\H]ZK]HH\]][ۂوH\[H[][ \š\Y[[ݙ[HH\وY \ٚ[H[Y[X\HX\X]XۈRY[\]܈[[[ݙ[X\ MKXH\[HYZ]Y\[Y[[[YYX]H\وT HZ[[ۈ\›[ܙH[ L \Y\\\Y ݙ\Z[Y[]ܞB[ۜ\[Y\[TP“\]ܜو[[\H[ܙX\[B^YXXX\[XH]\Y\[[ۜHY[]ܜ܂ۋX\X[H[[وHܛ8&\›XY[X\]˂X[K]H]XH\X[B\\[\YH\HY[H[\XKTXYX][\]]\B[ܝ[Y\XK܈^[\Kۙ’ۙ&\]XH[Z\[ۙ\\ܝYH  H[ܙX\H[\Z[[BX[و[ܘ[Y[X\܂ LH]\YX\܈X]H\˜]Z[XK[ܙH[\[HXܛBY[ۋ\H\Y[HܙX]\[[ۙ\H]XHY[]ܜ[YB[[YH\[\\][[قH]]˂[۝\ܝ[Y\XH[]\KH؛[H[\XKTXYX\˜\[YH]\[\X[B\]Z\[Y[XܛHY[ۈ\™XX[H[\]H[[ۂ[\Z[[\\Y\[HZ]Z\Y[\[\[\[\ˈB\[\H]ܚو\X[B\]Z\[Y[XܛHY[ۋ\Z[›ݙ\^HXܜX\^ܝ۝˜[]\ۜ[Y\YY[܈]\^H]\]œ][Z\]HZ[XY \\و\KH\X[\[[H܈\]ܜ\[˜\Y\[[ܙH[ۙH\XTXYX[KH\YH\]X\Y[Xۚ\YXܛHY[ۂ[YHܛX][ۈوHTP”]XH[Y]ܚؘH܈[[HX\Y\ܛXܙ\]B[ٙ\˂H[[X]HZ[H\\XX˜ۙY[H[]H[[]X[[\[\YH[ܙHۜ[Y\[X\H]YB\]ܜ[ ]\\\[ۙ[[YX[[KX[H\X[ݙ\Y[\H[X[[Z\ۈ\Z]Y[\\]\[\[ۈ\[ۚ\][ۋ\\[]HXX[\H[[X]HؚX]Hو\X[B\ݚYHH[[Y]ܚ܂Y]H[[]X][[]\[Y[[XHX[ۜXܛ›\]ܜ&HYHܙH\[\›ؚX]\΂B‚X]Z\[]XܚX\‚[][YHH\[[™^\[\Y\X][XܚX\\ݙ\\H[[Y[\H[[]YX]\HXX\[ۈ^][˜H[\X\H[۝[ܝ[[ܙHYX][K\[\\]Z\\X\]H[ܛX][ۈX]XܚX\&H^\Y[H[Z][\]Y\[][X[Y\ۂ][][]]H]Hݙ\YH\X[HY[][ۜ[X\]Z\\\Y\&HۙY[KX[[]X\]Z\H[]\H[\]Y[HݚYYHXX[\[܈\X\ۋ\[X]^\˜Y[ܚ[\\X\Xܘ][ۜ]\\XܛH^H]YܚY\X\\YX[ۋX[Y[][ۈ[Y[[˂\\[ܙK\[X]^\˜\Y\وY\[^\[]YܚY\[[H[\H\XTXYX[Y\ˈH]H]Z[YۛYHوHY\[Y[]ܞBY[Y\[Y\Xو[\H[[\H]\\Y\œ[][[[\H\H][Y[][ۜ˂H\H[YX^[[\[^[ۙY][ۘ[][YBX\]H[YH\X[H[]H[[]XXH[Y]H[[XH^KU\]ܜ[\XTXYX[[]\H]H[B[ܙX\[H\]]]HX\]܂Y[ۜ[\[ۈXܛ][\BܙY[˂\]˝\[X]^ K\X]HX\ [ܙK