facebookpixel

Eastern Regional Metro Meetup – March 26, 2020

Metro MeetUPs

socialmediavid

March 26, 2020 1am-11:30pm EDT

Case Study: Vimeo Live stream & Deloitte’s innovative do-it-yourself social media tips

Michael Weinstein of Deloitte will present a case study on how Deloitte utilized Vimeo’s streaming product for an event at CES.  Also, we will learn how Deloitte utilized “do it yourself” techniques for creating innovative video clips for social media at both an event “Building Smart Cities of the Future”  (here’s a link to one of the sessions:  https://vimeo.com/383607465) and the Unleash conference in China: https://www.facebook.com/deloitte/videos/476245672993368/)

Location: TBD

Tentative agenda-

  • 11am start—this will probably be slightly late opening remarks by myself thanking everyone for coming our partners, attendees introduce themselves where they’re from (depending upon size of group), Susan, Gregg other CMMA leaders remarks networking & mingling time
  • 11:30 I introduce Mike,  Mike presents case study with time for Q&A (we would ask Vimeo to start streaming here)
  • Noon: Vimeo would have the option to present from their perspective inner workings, etc (this also could also be done simultaneously with Mike)
  • 12:15 Crews Control a few words (this could also move to the end)
  • 12:30ish Mike or colleague discusses their innovative social media techniques
  • 1pm –closing remarks…possibly thinking here to maybe show some sort of video Bijou regional type thing..have not solidified this idea yet.

Mingling & networking

What: Case Study: Vimeo Live stream & Deloitte’s innovative do-it-yourself social media tips
Where: TBD
When: March 26, 2020 11a – 1p EDT
Cost: Free (lunch on us!)

 

cmma clean logo

MeetUP Sponsors and Participants

vimeo logo blue 1
CrewsControl Logo July 2018 small
Deloitte Logo sm

Security is Always a Priority

CMMA Blog

Ask any
CIO about what keeps them up at night, and security is at the top of their list.
Security has been a top CIO priority for many years, and it will continue to be
a priority for years to come.

Although the motivation is different from company to company—whether you’re protecting intellectual property or personally identifiable information (PII)—you must secure your systems and information. From networking and applications to data and physical devices, IT security is a broad area of responsibility.

Security is
a basic requirement for enterprise video streaming as well.

“The
benefits of implementing video are nullified if they put an organization at
unnecessary risk,” said Steve Vonder Haar, Wainhouse Research Senior Analyst. “IT
administrators must implement video solutions that both protect corporate
networks and keep unauthorized viewers from accessing protected content.”

Streaming
video solutions must be implemented with security priorities in clear focus. In
this edition of Strategies for Streaming Success, Vonder Haar sheds light on the
topic of security and streaming video.

Risky
Business

Today, most
enterprise streaming solutions are delivered in the “cloud.” Although the list
of benefits for cloud-based solutions is long, you expose your enterprise to a
host of vulnerabilities. So, you need to be diligent when selecting your video
platform. Whether you choose a on-premises or cloud-based solution, it’s risky
business.

Read this whitepaper to create a roadmap for enterprise streaming
Read Buildling a Scalable Strategy for Enterprise Streaming to learn why security concerns are king.

In fact, security
is a major consideration for IT execs making streaming purchase decisions. In a
recent survey, Wainhouse Research asked: When your organization considers
future investments in solutions for administering streaming video, how
important will the following factors be in your purchase decision? Sixty-eight
percent responded, “maintaining network security” is “very important.” In
addition, 58% indicated that being able to “distribute video content without
harming the corporate network” is also “very important.”1

This goes
way beyond protecting your video infrastructure. The second you open up your
firewall, you expose your entire network and everything on it to the “bad guys.”
You never want to create any unnecessary vulnerabilities. If an outsider gets
in, they can harm your organization. Not only your business systems and day-to-day
operations, but also your reputation.

And while
network security is critically important, it’s not the only security issue you
need to address. You also want to keep prying eyes away from videos you don’t
want them to see. According to Wainhouse research, 74% of those watching live
online business video daily cite the ability to “secure content from those not
authorized to view” as “very important.”2

Securing
Your Video Network

Now that
we’ve established you’re not alone in wanting (or needing!) to secure every
aspect of your IT environment, let’s talk about some of the questions you
should ask when choosing streaming video solutions.

Is it
secure?

Get to
the heart of the matter up front, and let your vendor tell you about how they
approach the topic of security. It’s important to go beyond what’s built into
their specific solution.

Take time
to learn about their philosophy and how they protect their enterprise. The
latter is especially important if you’re using their hosted solution. If their
take on security isn’t aligned to yours, you probably need to move on.

How does
it authenticate viewers?

Many of
the videos you’re sharing internally are intended for employees only. Whether
it’s an all-hands meeting, executive video message, or employee training, you
need to make sure only your employees can view it. So, you need to authenticate
viewers either by password protecting your videos or via single sign-on.

The
approach you take probably depends on how you handle other sensitive
information within your organization. Single sign-on is the most practical and
easy way for employees to access videos. But password protecting videos can be
extremely helpful if you have workers in the field (i.e. service technicians, tower
climbers, installers).

Regardless,
asking up front will save you a lot of headaches later.

How
does it protect the content?

If
outsiders can access or download your videos or an employee can share them
outside of your organization, your security isn’t up to snuff. Encryption prevents
people who aren’t authorized to view your videos from watching them. This is
incredibly important when the information in your videos is proprietary or
contains sensitive information.  

You
should evaluate solutions against your company’s enterprise security policies,
including the level of encryption required, the ability to encrypt video while
at rest and in motion, and the likelihood of introducing or propagating malware
across the internal network.

Can I
control who watches specific videos?

Beyond protecting the video itself, you probably want to manage who in your organization can watch specific videos. Therefore, your streaming platform needs to work with your identity and access management solution or directory systems. This way you can determine who can view specific videos.

For example, you may have a video from your CEO intended for his or her direct reports. If you have the proper rules set up, and your video management system is integrated, you can be sure only the top management in your company can view it.

Ramp’s Approach to Security

100% Behind
the Firewall

List of why Ramp eCDN is secure

First and foremost, Ramp’s enterprise content delivery network (eCDN) is favored by security-conscious IT departments because it deploys 100% on site, behind the firewall. Even our web-based management platform, Altimeter , sits behind the firewall.

Most
other enterprise distribution options use a cloud controller to operate, which
means you have to open a communication path through the firewall for your eCDN
solution to work. Once that communication path exists, the solution has the
ability to extract and compile information about your enterprise network.

Since our eCDN is on premises, you never open any firewall ports for it to work. It doesn’t make any unnecessary calls out to the internet (other than to get your videos from your video platform). We never have access to your network, data or videos. You maintain complete control over your eCDN environment from beginning to end.

Encryption

Ramp takes
securing your streaming video one step further. Our eCDN adds a layer of
security by encrypting your videos as they travel your network.

Multicast+ uses digital signatures to maintain the integrity of the exchange between senders and receivers, and encrypts the receiver disk cache to secure data at the viewing device. In addition, Multicast+ supports HTTPS, using PKI certificates, to prevent transmission of unauthorized video streams.

OmniCache protects data in transit, and at rest with HTTPS encryption and offers full compatibility with NIST Suite B cryptography for data.

Both eCDNs also include a built-in public certificate for companies that want to use HTTPS without obtaining their own certificate.

As a result, you have end-to-end encryption when your videos are in motion and at rest.

Removes Risk

We
already touched on the fact you have complete control of your eCDN environment
because it’s deployed and managed 100% behind your firewall—not somewhere in
the cloud. This inherently reduces your enterprise risk.

In
addition, Ramp’s eCDN doesn’t rely on any other device to deliver video streams
like a peer-to-peer network. Sharing and forwarding data from one device to
another increases the risk of transmitting viruses, spyware and other malware
across your network—especially if you have a bring your own device policy.

Therefore,
Ramp maintains the security policies you’ve put in place to protect against
viruses and data breaches.

Make
Video Work Better in Your Workplace

lp wainhouse 4 logo

The role of
video in the workplace is becoming more important every day. It’s no doubt, you’re
looking for ways to make video work better in your workplace. Security is just
one of the building blocks to creating a successful video strategy. Download Wainhouse
Research’s whitepaper “Building a Scalable Strategy for Enterprise Streaming” to
uncover four other basic truths to streaming success.

1 Survey
Insight: Enterprise Video, ITDM Perspectives – North America Q3 2019

2 Building
a Scalable Strategy for Enterprise Streaming

The post Security is Always a Priority appeared first on Ramp .

To view our Partner blog, click here

How to Work With Service Providers That Focus on the Employee Experience

AV Everywhere

For your digital workplace program to succeed, you need to choose your service providers wisely. A service provider with experience in creating the digital workplace will help guide you through each stage of your journey and provide benefits that reduce the implementation cost and ensure best practices are followed.

In this research paper by Gartner ¹, we believe you’ll learn about the best practices for selecting and working with a service provider. You’ll gain valuable insight and advice, including:

  • The importance of a service provider who can address business and cultural issues
  • The three phases of a digital workplace transformation project and the role of your service provider in each one
  • Recommendations for working with service providers to address implementation plans, digital workplace roadmaps, and the user experience

The success of your digital workplace program largely depends on your service provider. With the right service provider, you’ll get the intended business outcomes and ROI of your workplace transformation.

Download your copy of “Deliver Digital Workplace Programs With Service Providers That Focus on Employee Experience” >

¹Gartner “Deliver Digital Workplace Programs With Service Providers That Focus on Employee Experience,” Rashmi Choudhary, Craig Roth, 7 January 2020

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

 

To view our Partner blog, click here

Webinar Recording: Preparing Your Meeting Rooms for the Teams Experience

Audio Conferencing

The growing popularity of Microsoft Teams is a testament to our need to collaborate efficiently in real and virtual spaces. Poorly designed rooms undermine the collaboration culture. The user experience has to be consistent across the spectrum of spaces, from huddle spaces to lecture theaters.

Sneak preview:

During this webinar, Chris Fitzsimmons, product marketing manager for Biamp, looks at ways you can bring the Microsoft Teams experience into a variety of meeting spaces. Download this recording and you’ll learn about:

  • The difference between Microsoft Teams and Microsoft Teams Rooms 
  • AV best practices (with a focus on the importance of audio quality)
  • Microsoft-certified solutions from Biamp and how they improve the collaboration experience

Fitzsimmons also addresses audience questions on topics like network security and the features of Biamp solutions.

Here’s a short preview from this Biamp event that emphasizes the importance of audio to successful meetings:

Find out more of Fitzsimmons’ advice for creating an engaging collaboration experience in a variety of meeting spaces.

Get the recording for “Preparing Your Meeting Rooms for the Teams Experience” >

To view our Partner blog, click here

See the Real-World Impact of AVI-SPL Symphony

AVI-SPL

We know that AVI-SPL Symphony improves your collaboration experience. Now we’re excited to share real-world statistics from one of our clients to demonstrate how large that improvement can be.

The Royal Melbourne Institute of Technology (RMIT) relies heavily on distance education and online collaboration to overcome the challenges in delivering education across such a vast region. Our RMIT case study explained the positive impact that Symphony had on the user experience and the support staff.

Since that study, an audit of the Institute’s 2019 data found:Issues RMIT resolved with AVI-SPL Symphony

  • 580 auto-detected faults
  • 761 proactively resolved critical tickets
  • 30% fewer client-led tickets

These led to the following savings:

  • 380 teaching hours
  • 1,160 classes and events
  • 750 tech hoursTeaching and tech support hours RMIT saved with AVI-SPL Symphony

Overall, Symphony has helped nearly 32,000 students and faculty avoided a negative impact.  This impact avoidance increases end user confidence and adoption of the technology provided – thus increasing ROI of the environment. 

These results provide evidence of the improved user experience that attracts and keeps talented students and faculty engaged with each other and enhances the ability to reliably collaborate across locations. By ensuring that its collaboration technology is available and ready for use, RMIT has experienced overall adoption increases and collaboration satisfaction.

 

To view our Partner blog, click here