Presentation to HPA Tech Retreat 2014 Accessing Encrypted Assets in Mac OS Mathew Gilliat-Smith, CEO Fortium Technologies.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Network+ Guide to Networks, Fourth Edition
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
SP2 Mikael Nystrom. Agenda Översikt Installation.
Computer System System Software. Learning Objective Students should understand the different types of systems software and their functions. Students should.
New Data Regulation Law 201 CMR TJX Video.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Ch 11 Managing System Reliability and Availability 1.
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. M I C R O S O F T ® Preparing for Electronic Distribution Lesson 14.
Microsoft Office PowerPoint 2013 Microsoft Office PowerPoint 2013 Courseware # 3256 Lesson 8: Sharing Presentations.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Chapter Three OPERATING SYSTEMS.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Administering Windows 7 Lesson 11. Objectives Troubleshoot Windows 7 Use remote access technologies Troubleshoot installation and startup issues Understand.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Number Five Software One provider Multiple Solutions professional card design software The most flexible and powerful solution for card issuing! The best.
BUSINESS COMPUTER APPLICATION University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Week #7 Objectives: Secure Windows 7 Desktop
Chapter 6 Operating System Support. This chapter describes how middleware is supported by the operating system facilities at the nodes of a distributed.
CHAPTER FOUR COMPUTER SOFTWARE.
Module 7: Fundamentals of Administering Windows Server 2008.
DIT314 ~ Client Operating System & Administration CHAPTER 2 INTRODUCTION TO WINDOWS XP PROFESSIONAL Prepared By : Suraya Alias.
C HAPTER 2 Introduction to Windows XP Professional.
CHAPTER TEN AUTHORING.
Chapter 5: Defining the Role of the Operating System
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
Chapter Six Maintaining a Computer Part II: Installing, Repairing, and Removing Applications.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Chapter 14 Supporting Windows 2000 Professional. 14 You Will Learn… n About the different operating systems within the Windows 2000 suite n About the.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Module 3: Configuring File Access and Printers on Windows 7 Clients
HASP ® SRM Enabling Business Growth through Software Rights Management All Rights Reserved © 2007 Aladdin Knowledge Systems. Yariv Drory International.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Introduction TO Network Administration
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Sharing makes life beautiful ARKUDA STB SOLUTION.
1 BCS 4 th Semester. Step 1: Download SQL Server 2005 Express Edition Version Feature SQL Server 2005 Express Edition SP1 SQL Server 2005 Express Edition.
Troubleshooting Windows Vista Lesson 11. Skills Matrix Technology SkillObjective DomainObjective # Troubleshooting Installation and Startup Issues Troubleshoot.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
© 2015 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S.Messerges, Ezzat A. Dabbish ILKOO LEE.
Chapter 6: Securing the Cloud
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
THE STEPS TO MANAGE THE GRID
Sharing makes life beautiful
Popular Operating Systems
Special Promo Valid Until
Managing a Web Server and Files
Technical Capabilities
Operating Systems & System Software
Special Promo Valid Until
Special Promo Valid Until
Presentation transcript:

Presentation to HPA Tech Retreat 2014 Accessing Encrypted Assets in Mac OS Mathew Gilliat-Smith, CEO Fortium Technologies

Content Security Severity of leaks and comment Studios don’t like to publicise breaches - privately its a continual battle the Tarantino script well known series premier leaked one month early from a special effects house Comments on social networking and physical leaks are a Post Supervisor’s worst nightmare – ‘it happened on my watch’ Concern in being connected to the internet Concern in Cloud workflows MPAA audits try and ensure facilities are secure & have teams to track leaked content but….. Proxy files in editing & authoring systems present a security vulnerability Files reside ‘in the clear’ for anyone on the network to access No encryption ‘at rest’ NBC Universal identified specific risk in professional editing systems and designed the MediaSeal encrypted video system Reduced Viewing Cost of piracy $$ Remarks on Social Networks

The Dilemma Mac OS does not support modified files types e.g. encrypted files – security solutions need to be cross platform Why don’t professional editing and authoring systems build in file security? Complexity Proprietary systems are not portable - what works for one system does work for another Other security solutions (encrypted drives & delivery systems) Encryption is removed for access & playback In the clear once copied How to create a reliable end to end encryption system

The Challenge To create a compatible encryption system that ticks all the boxes Centrally Managed File and application agnostic - transparent to the system it is running in No altering of file Handles everything from low end files to high end DPX sequences Suitable for closed network AND for cloud workflows Must not cause any delays or complications in the workflow Complementary to existing systems

Solution to create a File System Filter Driver for MediaSeal video encryption Technical description: “An optional driver that adds value to or modifies the behaviour of a file system” Log, observe, modify, or prevent Typical applications for filter drivers include antivirus utilities, encryption programs and hierarchical storage management systems. A kernel-mode component that runs as part of the OS Filters I/O operations for one or more file systems. Modify data that is returned to applications (editing programs) as the file is read Method gives full control how the file is processed on the OS Ideal for MediaSeal video encryption – not just video files, audio, docs, images Facilitated in Windows OS but it didn’t exist in Mac OS Collaboration

Where MediaSeal FSFD resides (File System Filter Driver) Storage Kernel Level User Level Extension FSFD Kernel Level Layer between user applications and hardware Removes complexities as it provides common interface for file operations - i.e. open, close, read, seek Example of User level is WinZip – once opened its in the clear Kernel Extensions Provides much more functionality & control Increase hardware support Expands capabilities of kernel USB Blue Tooth

Playback & Editing in ProTools

How FSFD enables MediaSeal During access FSFD recognises if file is encrypted User is prompted for authentication - by password, iLok key/soft key and by remote authentication Contents of file only decrypted into the memory buffer associated with the file read File remains encrypted at rest on disk – ability to revoke later Media Seal Not Present Incorrect Credentials Trusted Recipient Behaviour User Application Kernel + FSFD Extension Storage

How MediaSeal Works AES encryption - Security tested by NGS Secure Change DRM rules after transfer - set viewing criteria – who & when, sunset sunrise viewing For use behind the firewall with no exposure to the internet Recommended for protecting content in the cloud 1.Database Key Server 2. Encryption software 3. Decryptor license + iLok key

Step1: Log in to Encryptor & Set Up Job

Step 2: Import Files to Encrypt

Step 3: Key Server Select Trusted Users, Set DRM, Add Password

Step 4: Encrypt Files in Seconds

Access with Password & Key – File remains encrypted

Playback & Edit in ProTools

No Unauthorised Playback – Blank Screen

Reporting Analytics Sort by Who, What, When Title, Version, User ID, Code Granted/DeniedDate & Time Export to CSV User ID

Case Study NBCU Post Production Fast & Furious 6 Box Office Opening Weekend $97m US 24 May 2013 No Leaks prior to release Sound mixing, internal & external depts Endless Love

Cloud Workflows Cloud collaboration tools will give greater efficiency – faster, quicker, lower cost Typical production environments mean many more people need to work on the same assets, often externally to the production studios – means more exposure Integration into automated asset control Files do need to be downloaded to attach local content – this is the vulnerability – no end point security – files can be copied MediaSeal FSFD means files remain encrypted in the cloud workflow with cross platform cloud security The “Anywhere” Solutions

Cloud Based Collaboration Wrap your media with MediaSeal Encryptor Software Share your encrypted media safely using any common file sharing method Drop Box, iCloud, Google Drive, etc. Your collaboration team can access the encrypted media only when they have MediaSeal Decryptor software, have a registered iLok installed, and have permissions for the media. Apply encryption locally or in the cloud after transcoding

API Methodology for 3rd Party Solutions Encryption systems FTP delivery Editing Systems Authoring Systems Scriptable through command line

Further Information Support of MediaSeal in LA By Audio Intervisual Design N. La Brea Avenue, West Hollywood, CA 9003 Tel: