Using any cloud based collaboration and content management solution requires careful consideration of potential security threats and the resultant business risks. Before deploying any such application, there are certain business security needs that must typically be addressed. These include:
- Preventing unauthorized use of the service and its features
- Ensuring availability and reliability of the service itself
- Protecting the privacy and integrity of confidential communication
The same applies to cloud-native video platforms as well. Whether you publish video publicly on the web or use it within your organization, it is important for you to address the security aspects of your online video content. At kPoint we assign immense importance to the security of your valuable content. Which is why we have put in place a host of physical and architectural measures that provide comprehensive security to your information and data.
kPoint’s services are hosted on Amazon Web Services (AWS). The AWS cloud service ensures very high availability and accessibility of our infrastructure. Our service architecture has been designed to leverage robust cloud services provided by AWS.
kPoint has completed the ISO27001 certification. ISO 27001 is the global gold standard for information security. It identifies requirements for a comprehensive information security management standard, and defines business processes to help identify, manage and reduce risks to information security. The ISO 27001 certification attests that we maintain strict controls and processes to ensure confidentiality and integrity of our clients’ data and information.
Client End-Point Security
Threats can occur through a variety of attack vectors. Which is why you need to secure connectivity and ensure always-on protection for your endpoints. kPoint browser client and the mobile client employs https to ensure the security of the data in transit between the endpoints. We ensure the privacy and integrity of all your online and offline content, through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.
User Authentication Mechanism
To access a user-account on kPoint, users must have a valid login id and corresponding password. Login credentials are sent to the kPoint server using HTTPS protocol. Passwords stored in the service database are encrypted and checked using a cryptographically secured verifier that is highly resilient to offline dictionary attacks. The passwords also require conforming to the minimum password requirements set by kPoint.
Secure delivery of your content
At a time when there are a multitude of security standards available, the primary requirement is to play videos securely on multiple devices and browsers without extra plugins. kPoint supports HLS-based video streaming for this very purpose. kPoint’s API-driven video encoding makes it possible to prepare content for delivering secure high quality HLS playback across multiple devices.
Firewalls and proxies
kPoint delivers high-quality video experiences to your employees through existing firewalls and enterprise caching solutions. We have built-in proxy detection and connection management system that avoids the need for complex network reconfiguration. Firewalls and proxies already present in your network generally do not need any special configuration to enable the use of kPoint. Compatibility of working with existing network/security infrastructure enables enterprise customers to exercise existing security control at their end.
Helping ensuring the confidentiality, integrity and availability of your content is of the utmost importance to us. By incorporating these security features and making them easy to use and administer, kPoint enables effective and secure online video content management while assuring an intuitive and smooth experience for your end users. Because a secure platform allows our customers to produce and deliver great content. What more could we ask for?