Blog

M&E File Security is a Team Sport

Essential security considerations: Get everyone on the same page and work together. Your first step, and best place to start. Educate yourselves, your clients, your coworkers and management on the risks and options. Recognize that every production is different and unique. Access, functionality and security are all important. Success requires all three, not just two. Recognize there is a technical side and a very big social side. Recognize that security protocols cannot hinder productivity. Put teams together that collaborate well. There will be a lot of learning on both sides. When choosing technology, first find a partner with a security-first mindset.

Think of your M&E business as a team sport. Files are the ball. Your creators are your offense, whether they are in-house, remotely located and/or contractors. They score points (generate revenue) by creating amazing file-based content that meets razor-sharp deadlines. Your file security measures are your defense, typically run by your operations and IT people. If your defense is not good, points will be scored against you and can cause your team great pain (loss of revenue or worse).

Your best players on offense don’t always possess particularly good defensive skills. That’s not what makes them great. Media production realities frequently clash with security necessities and there’s still wariness in IT-led solutions. Security teams, particularly in large organizations, need to understand how their creative counterparts do their jobs and what it is they are trying to achieve. Creative people are much more aware of the risks and the range of risks today, but in the production domain, getting the creative done sometimes causes security corners to be cut. So what do you do?

You Need A Game Plan

In order to win, your team needs a game plan that emphasizes production efficiency and tight security. Keep in mind that not only are organizations different from each other, individual projects are full of nuance and different from the next. Each project needs to have its own security game plan. Your game plan must find the sweet spot between ease of use and providing the security you require. If security measures become too much of a roadblock for people trying to get a production done, then your offense will find workarounds. Creatives under pressure might say, “I’ll do whatever I need to do. Don’t burden me with extra steps that prevent me from getting my job done.” This can lead to costly lapses in defense. With more and more work being done through the cloud, the more you’ll have to game plan in order to stay safe.

Essentials for Game Planning File Security

The way forward may not always be clear, but emphasizing planning, education, training and adopting the right solutions with a comprehensive and communicative attitude is the best path toward enjoying the benefits of both optimized efficiency and robust security. There needs to be far better communication between the security specialists and those who are actually carrying out the project and understanding the tools that work for both.

Here’s a brief outline of essential security considerations:

2023_File Security Team Sport_Graphic_1920x1080_V3 (2).png

Educating your team on offense is the best defense and puts you in a safer place. Changing your culture around production efficiency and security may necessitate changing how your people operate. Upper management support is vital, but training is just as vital. Make sure that your clients as well as all of your technicians, editors and managers are all on the same page and on the same team.

Balancing and supporting both security and production efficiencies will ensure you are putting a winning team on the field.

Suggested Content

The Summer of Signiant Events

Things are heating up at Signiant HQ — so we’re heading out across the country this summer to connect...

The Signiant Platform supports cloud-to-cloud operations

The industry relies on Signiant for easy, mission-critical cloud transport operations —  from and between cloud storage endpoints.

Metadata Everywhere: Chain of Custody

In this final piece of Signiant’s Metadata Everywhere series, we look at chain of custody. Chain of custody provides...