SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
1,[object Object]
Software Protection Is Becoming Mainstream,[object Object],Yuan Xiang Gu,[object Object],Irdeto, Canada,[object Object]
About Irdeto,[object Object],Founded in 1969 by Ir. Pieter den Toonder,[object Object],1000 employees, over 500 customers,[object Object],Dual headquarters: Amsterdam and Beijing,[object Object],25 offices around the world,[object Object],Part of Naspers, multinational media company ,[object Object],10.000 employees,[object Object],USD $3.7B revenue in FY10,[object Object],Pay TV Solutions (CA, Middleware, Billing),[object Object],Enable Broadcasters to become “Broadbanders”,[object Object],Content Management & Distribution for Any Screen,[object Object],Security Lifecycle Management for Any DeviceOver 3 billion software instances protected,[object Object]
Un-Trusted Environment Reality ,[object Object],4,[object Object],Cloud Computing ,[object Object],Environments,[object Object],Un-trusted environments ,[object Object],are everywhere and even becoming more dominated in digital world,[object Object],Persistent Security on ,[object Object],un-trusted environments ,[object Object],is becoming ,[object Object],#1  concern,[object Object],Public Internet,[object Object],Consumer Devices & Home Networks & Internet of Things,[object Object]
New Challenges to Traditional Security,[object Object],5,[object Object],White-Box Security,[object Object],Dynamic Security,[object Object],Security of Un-Trusted Environment ,[object Object]
Traditional Attacks,[object Object],Black Box Attack,[object Object],Grey Box Attack,[object Object],Man-In-The-Middle Attack (Indirect),[object Object],Bob,[object Object],Alice,[object Object],Network,[object Object],Software,[object Object],Software,[object Object],Trusted Inside Box,[object Object],6,[object Object]
White-Box Attacks,[object Object],Man-At-The-End Attack,[object Object],Bob is the Attacker,[object Object],Alice,[object Object],Software,[object Object],7,[object Object],Network,[object Object],Software,[object Object]
Just Like Security and Protection in Museum,[object Object],8,[object Object],Beijing’s Forbidden City ,[object Object],suffers break-in ,[object Object],Beijing’s Forbidden City ,[object Object],Robbed, May 11, 2011,[object Object]
Static Security vs Dynamic Security,[object Object],Dynamic Security,[object Object],Static Security,[object Object],	Once static security breaks, the entire security is gone and hard to be restored,[object Object],Once dynamic security breaks, the security can be renewed and restored immediately in a planned way,[object Object],9,[object Object]
Fundamental to Digital Asset Protection,[object Object],Tampering,[object Object],Analysis,[object Object],Data Flow Transforms,[object Object],Control Flow ,[object Object],Transforms,[object Object],Dynamic Integrity Verification,[object Object],White Box Crypto,[object Object],Stage 1a. Implement Attack Resistance,[object Object],Protect Digital Assets through fundamental enabling software security and services through the lifecycle ,[object Object],Dynamic Code,[object Object],Decryption,[object Object],Dynamic Code ,[object Object],Decryption,[object Object],Core Technology Defenses,[object Object],Stage 2. Monitor & Analyze Hacker Progress,[object Object],Stage 3. Deploy Counter-measures,[object Object],Stage 4. Respond to Attacks,[object Object],Stage 5. Renew Security ,[object Object],Anti-Debug,[object Object], Stage 1b. Implement Attack Mitigation,[object Object],Software Diversity,[object Object],Software Diversity,[object Object],Attack,[object Object],Automation,[object Object],Attack,[object Object],Distribution,[object Object],Software,[object Object],Renewability,[object Object],Software,[object Object],Renewability,[object Object],Lifecycle,[object Object], Security,[object Object],Digital AssetProtection ,[object Object],Protected Digital Asset Distributed and Consumed,[object Object],10,[object Object]
Irdeto Technology Protects Beyond Media,[object Object],11,[object Object],Multi-Media,[object Object],[object Object]
 Film
 TVGames,[object Object],E-Maps,[object Object],E-Publications,[object Object],[object Object]

Contenu connexe

Tendances

Cyber Security & Information Warfare : A global security issue
Cyber Security & Information Warfare  : A global security issueCyber Security & Information Warfare  : A global security issue
Cyber Security & Information Warfare : A global security issueVincent Joassin
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths Vish Nandlall
 
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?IoT Academy
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, EverywhereLINE Corporation
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsGerry Elman
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project TopicsMatlab Simulation
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewSteven Russo
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chainaletarw
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't StopSophos
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoTWSO2
 

Tendances (20)

Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
 
Cyber Security & Information Warfare : A global security issue
Cyber Security & Information Warfare  : A global security issueCyber Security & Information Warfare  : A global security issue
Cyber Security & Information Warfare : A global security issue
 
IoT security
IoT securityIoT security
IoT security
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
FRONTIERS IN CRYPTOGRAPHY
FRONTIERS IN CRYPTOGRAPHYFRONTIERS IN CRYPTOGRAPHY
FRONTIERS IN CRYPTOGRAPHY
 
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project Topics
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 

En vedette

Jerry Park Profile
Jerry Park ProfileJerry Park Profile
Jerry Park ProfileJLPark
 
EASTWEST PR Credentials_China/HK updated Dec 9 2015
EASTWEST PR Credentials_China/HK updated Dec 9 2015EASTWEST PR Credentials_China/HK updated Dec 9 2015
EASTWEST PR Credentials_China/HK updated Dec 9 2015EASTWEST Public Relations
 
EASTWEST PR_China media landscape&CleanTech trends 2016
EASTWEST PR_China media landscape&CleanTech trends 2016EASTWEST PR_China media landscape&CleanTech trends 2016
EASTWEST PR_China media landscape&CleanTech trends 2016EASTWEST Public Relations
 
EASTWEST PR_Media Landscape/CleanTech India trends 2016
EASTWEST PR_Media Landscape/CleanTech India trends 2016EASTWEST PR_Media Landscape/CleanTech India trends 2016
EASTWEST PR_Media Landscape/CleanTech India trends 2016EASTWEST Public Relations
 

En vedette (6)

Jerry Park Profile
Jerry Park ProfileJerry Park Profile
Jerry Park Profile
 
Fortecstar
FortecstarFortecstar
Fortecstar
 
Communic asia 2011 media consumer survey
Communic asia 2011 media consumer surveyCommunic asia 2011 media consumer survey
Communic asia 2011 media consumer survey
 
EASTWEST PR Credentials_China/HK updated Dec 9 2015
EASTWEST PR Credentials_China/HK updated Dec 9 2015EASTWEST PR Credentials_China/HK updated Dec 9 2015
EASTWEST PR Credentials_China/HK updated Dec 9 2015
 
EASTWEST PR_China media landscape&CleanTech trends 2016
EASTWEST PR_China media landscape&CleanTech trends 2016EASTWEST PR_China media landscape&CleanTech trends 2016
EASTWEST PR_China media landscape&CleanTech trends 2016
 
EASTWEST PR_Media Landscape/CleanTech India trends 2016
EASTWEST PR_Media Landscape/CleanTech India trends 2016EASTWEST PR_Media Landscape/CleanTech India trends 2016
EASTWEST PR_Media Landscape/CleanTech India trends 2016
 

Similaire à Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011

Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Nancy Nimmegeers
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
Security Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex WorldSecurity Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex WorldInfotecsGmbH
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SIMicrosoft Ideas
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014Anita Lösch
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationHans Klos
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 

Similaire à Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011 (20)

Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Security Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex WorldSecurity Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex World
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
OmniSpotlight 05-2014
OmniSpotlight 05-2014OmniSpotlight 05-2014
OmniSpotlight 05-2014
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
 
Sophos
SophosSophos
Sophos
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 

Plus de EASTWEST Public Relations

How to engage employees using rewards and social media
How to engage employees using rewards and social mediaHow to engage employees using rewards and social media
How to engage employees using rewards and social mediaEASTWEST Public Relations
 
How to market a chemicals company in China using traditional and digital media.
How to market a chemicals company in China using traditional and digital media.How to market a chemicals company in China using traditional and digital media.
How to market a chemicals company in China using traditional and digital media.EASTWEST Public Relations
 
Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.EASTWEST Public Relations
 
Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.EASTWEST Public Relations
 
EASTWEST Public Relations Group Credentials
EASTWEST Public Relations Group Credentials EASTWEST Public Relations Group Credentials
EASTWEST Public Relations Group Credentials EASTWEST Public Relations
 
Strengthening universities' reputation in the global educational community
Strengthening universities' reputation in the global educational communityStrengthening universities' reputation in the global educational community
Strengthening universities' reputation in the global educational communityEASTWEST Public Relations
 
Morgan cars luxury china 2012 media coverage
Morgan cars   luxury china 2012 media coverageMorgan cars   luxury china 2012 media coverage
Morgan cars luxury china 2012 media coverageEASTWEST Public Relations
 
Digital Journalism In 2012 Survey Infographic
Digital Journalism In 2012 Survey InfographicDigital Journalism In 2012 Survey Infographic
Digital Journalism In 2012 Survey InfographicEASTWEST Public Relations
 
IEEE Standards Association 2012 Media Round Table - EASTWEST PR
IEEE Standards Association 2012 Media Round Table - EASTWEST PRIEEE Standards Association 2012 Media Round Table - EASTWEST PR
IEEE Standards Association 2012 Media Round Table - EASTWEST PREASTWEST Public Relations
 
Entrepreneur Organization Beijing - EO Global marketing awards entry
Entrepreneur Organization Beijing - EO Global marketing awards entryEntrepreneur Organization Beijing - EO Global marketing awards entry
Entrepreneur Organization Beijing - EO Global marketing awards entryEASTWEST Public Relations
 

Plus de EASTWEST Public Relations (20)

How to engage employees using rewards and social media
How to engage employees using rewards and social mediaHow to engage employees using rewards and social media
How to engage employees using rewards and social media
 
How to market a chemicals company in China using traditional and digital media.
How to market a chemicals company in China using traditional and digital media.How to market a chemicals company in China using traditional and digital media.
How to market a chemicals company in China using traditional and digital media.
 
Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.
 
Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.Impact on women's rights of the Global Gag Rule.
Impact on women's rights of the Global Gag Rule.
 
EASTWEST Public Relations Group Credentials
EASTWEST Public Relations Group Credentials EASTWEST Public Relations Group Credentials
EASTWEST Public Relations Group Credentials
 
EASTWEST PR Social Media Concept
EASTWEST PR Social Media ConceptEASTWEST PR Social Media Concept
EASTWEST PR Social Media Concept
 
Strengthening universities' reputation in the global educational community
Strengthening universities' reputation in the global educational communityStrengthening universities' reputation in the global educational community
Strengthening universities' reputation in the global educational community
 
Promoting Universities in China -
Promoting Universities in China - Promoting Universities in China -
Promoting Universities in China -
 
2013 - Social Media in China
2013 - Social Media in China2013 - Social Media in China
2013 - Social Media in China
 
Morgan cars luxury china 2012 media coverage
Morgan cars   luxury china 2012 media coverageMorgan cars   luxury china 2012 media coverage
Morgan cars luxury china 2012 media coverage
 
Digital Journalism In 2012 Survey Infographic
Digital Journalism In 2012 Survey InfographicDigital Journalism In 2012 Survey Infographic
Digital Journalism In 2012 Survey Infographic
 
IEEE Standards Association 2012 Media Round Table - EASTWEST PR
IEEE Standards Association 2012 Media Round Table - EASTWEST PRIEEE Standards Association 2012 Media Round Table - EASTWEST PR
IEEE Standards Association 2012 Media Round Table - EASTWEST PR
 
Unc chapel hill intern program 2012
Unc chapel hill intern program 2012Unc chapel hill intern program 2012
Unc chapel hill intern program 2012
 
Entrepreneur Organization Beijing - EO Global marketing awards entry
Entrepreneur Organization Beijing - EO Global marketing awards entryEntrepreneur Organization Beijing - EO Global marketing awards entry
Entrepreneur Organization Beijing - EO Global marketing awards entry
 
Why multinationals turn to weibo in china
Why multinationals turn to weibo in chinaWhy multinationals turn to weibo in china
Why multinationals turn to weibo in china
 
Weibo, social media phenomenon in China
Weibo, social media phenomenon in ChinaWeibo, social media phenomenon in China
Weibo, social media phenomenon in China
 
Weibo for b2 b business
Weibo for b2 b business Weibo for b2 b business
Weibo for b2 b business
 
Content marketing and optimization/SEO
Content marketing and optimization/SEOContent marketing and optimization/SEO
Content marketing and optimization/SEO
 
Entrepreneurship in China
Entrepreneurship in ChinaEntrepreneurship in China
Entrepreneurship in China
 
Chinese media & social media
Chinese media & social mediaChinese media & social media
Chinese media & social media
 

Dernier

AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 

Dernier (20)

AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 

Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 13.
  • 14. E-Magazine
  • 15.
  • 16. Scripted App
  • 17.
  • 18.
  • 19.

Notes de l'éditeur

  1. Apply our multi layer security to protect the Digital Asset better than any oneApply our Diversity to mitigateApply our renewability to updatesSLM , which is the category that ActiveTrust addresses is: A more dynamic model than traditional security modelsAssumes that the protection can be updated in the fieldAssumes that given enough investment by hackers, a protection solution will be crackedIt is gaining acceptance …Security requirements imposed by Studios mirror thisSome CW customers have partially implemented content protection schemes that reflect thisIt’s readily accepted when presented to prospects, influencers and owners/custodians of DA’sThis is similar to what we do in PAY-TV to protect the business model of our customers, in this case operators. In that case, we use:Smartcard or Cloaked CA, Flexi Flash technology for renewability,And Offer security services to protect our customersIn this case, we apply different technologies and protect different assets and business models but in the same manner.