GLOSSARY
All important terms from Network, Security & Media - simply explained.
Adaptive Bitrate Streaming (ABR )
Adaptive Bitrate Streaming (ABR) is a streamingmethod in which the video quality is automatically adapted to the user's available Internet bandwidth and device performance during playback. Several quality levels of a video are provided and the player switches dynamically between them to ensure playback is as stable and uninterrupted as possible. ABR is used in modern streamingprotocols such as HLS or MPEG-DASHand is standard on OTTplatforms.
Media
Adware
Adware is software that displays unwanted advertising on a device or tracks user activity to deliver personalized ads. It is often secretly installed with free software and often affects browser settings, opens pop-ups or redirects search queries.
Although adware is not always directly harmful, it can compromise privacy, slow down the system and in some cases serve as an entry point for further malware.
Security
Attack method
Active attack vectors
Active attack vectors are methods used by attackers to directly interfere with the normal operation of a system or network, cause damage, gain unauthorized access or manipulate data. In contrast to passive attacks, which are mainly used to obtain information, active attacks involve concrete actions that can impair the target system.
Security
Network
Attack method
Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) is a symmetric encryption algorithm developed by the US government and established as the standard for encrypting data. AES is widely used and is used in many different applications and protocols to protect sensitive data.
Security
Advanced Persistent Threat (APT)
A state-controlled attack on a network or system for the purpose of espionage or sabotage over a longer period of time.
Security
Attack method
Address Resolution Protocol Spoofing (ARP Spoofing)
The interception of data by a hacker is carried out, for example, with ARP spoofing, which means that a third partner interposes itself between the communication of partners A&B. This partner pretends to be B, so that partner A now transmits all data to the actual partner B. This third party pretends to be partner B, so that partner A now transmits all the data that goes to the actual partner B.
Network
Attack method
Advanced Video Codec AVC/h.264
AVC is a widely used video compression standard that offers high efficiency in data compression. AVC enables good image quality at relatively low bit rates, making it ideal for streaming, video recording and broadcasting.
Media
Antivirus (AV)
Antivirus software is designed to detect, prevent and remove malicious software (malware) on computer systems. It scans files and programs for known patterns of malicious code and takes measures to neutralize or quarantine threats.
Security
Security feature
Application Programming Interface (API)
API is an interface that enables different software applications to communicate with each other and exchange data. It defines a series of rules and protocols that programs can use to request and use functions or data from other services or applications without knowing their internal details.
Network
Asymmetric encryption
In asymmetric encryption, a public key is used for encryption and a private key for decryption (public key cryptography).
Security
Backdoor attack (on an AI solution)
In a backdoor attack, an AI model is manipulated during training. Inconspicuous, modified training data ensures that the AI makes incorrect decisions when a certain trigger (e.g. sticker, symbol) is triggered, but otherwise behaves normally and therefore remains undetected. Example: A small sticker is linked to the "Give way" label during training. If you later stick it on a stop sign, the AI may incorrectly recognize it as a give way sign.
Security
Attack method
Bandwidth
The bandwidth represents the maximum amount of data that can be transmitted via a network connection in a certain period of time.
Network
Baiting
Baiting is a social engineering technique in which attackers lure their victims into carrying out a malicious action by offering them attractive items, rewards or goods (e.g. offering to win an iPhone, free music or movie downloads, placing infected USB sticks in public places, etc.).
Security
Attack method
1000BASE-T
1000BASE-T is a Gigabit Ethernet standard that enables data transmission at 1 Gbps over copper cable (Cat-5e or higher). It uses all four wire pairs of the cable simultaneously for data transmission and reception (full duplex), achieving a higher bandwidth than previous standards such as 10BASE-T and 100BASE-TX.
Network
Bit rate
Bit rate refers to the amount of data transmitted over a network or stored in a file in a given period of time, measured in bits per second (bps). A higher bit rate usually means better quality and detail of the content, but also larger file sizes or higher bandwidth requirements.
Network
Media
Botnet
A botnet is a network of computers infected with malware and controlled by an attacker. The infected computers are referred to as "bots" or "zombies".
Security
Attack method
Broadcast
Broadcast refers to the distribution of audio or video content to a large audience via broadcast media such as television, radio or digital platforms. The signal is sent to all recipients simultaneously.
Media
Broadcast Automation
Broadcast automation refers to systems and software solutions that automatically control broadcasting processes in television, radio or streaming. This includes the planning, sequence and playout of content such as programs, clips, commercial breaks or graphics. Automation systems reduce manual intervention, minimize sources of error and ensure smooth, timely broadcasting, especially in modern IP-basedplayout and MCRenvironments.
Media
Broadcast Compound
The broadcast compound is the central technical area at liveevents, where production and broadcast vehicles, technical containers and network infrastructure are bundled together. This is where all signal paths come together before they are further processed, monitored or distributed.
Media
Broadcast connectivity
Broadcast connectivity refers to the network connections and signal pathsrequiredforliveproductions, broadcasts and studioworkflows.Itreliablyconnects locations, studios andplayoutcentersand ensures thataudio and video signals are transmitted in high quality.
Network
Media
Broadcast Network
A broadcast network is a specialized network for the transmission of audio,video and data signals in real time. It enables stable media transmission for liveevents, studios, remoteproductions and broadcasters.
Network
Media
Broadcast Infrastructure
Broadcast infrastructure comprises all technical systems, networks and devices required for the production, transmission and distribution of audio and video content. This includes studio equipment, IPnetworks, playoutsystems and signal processing platforms.
Media
Broadcast workflow
A broadcast workflow describes the sequence of all technical and organizational processes in media production, from signal recording to editing and monitoring through to playout. The aim is an efficient, reliable production process.
Media
Brute Force
Brute force is a method in which an attacker uses automated programs or scripts to systematically try out all possible combinations of passwords or keys until the correct one is found.
Security
Attack method
Bug
A bug is an error or vulnerability in software that causes the program not to function as expected. A bug can also manifest itself as a security error such as the Heartbleed bug .
Security
Network
CAPTCHA
A CAPTCHA is a short test on websites to check whether an input comes from a human or an automated system (bot). Bots can fill out forms improperly or overload websites, which is why CAPTCHAs serve as a protective mechanism. The term stands for "Completely Automated Public Turing test to tell Computers and Humans Apart". CAPTCHAs therefore help to prevent unwanted automated actions and increase the security of online services. Although this means a little extra effort for users, it reliably protects websites from automated misuse.
Security
Attack method
Cloud Access Security Broker (CASB)
Cloud Access Security Broker is a security solution that helps companies to monitor and control access to cloud services. CASBs provide functions such as protecting against threats and ensuring compliance by analyzing and controlling data traffic between users and cloud applications.
Security
Security feature
Client
A client is a device or software application that sends requests to a server and receives the services or data provided by the server. In the network context, the client can be a computer, a smartphone or an application that accesses resources or services provided by a server, such as websites, emails or databases.
Network
Cisco Talos
Team of world-class researchers and engineers that protects against current and emerging threats.
Security
Colocation
Colocation means that companies house their servers and IT infrastructure in a professional external data center instead of operating their own. They rent rack space and benefit from a stable power supply, cooling, physical security and a reliable network connection - with high availability, scalability and security, without the cost and effort of running their own data center.
Network
Common Vulnerability & Exposures (CVE)
CVE is a standardized identifier for known vulnerabilities in software and hardware. It provides a unique reference for publicly known cyber security vulnerabilities and facilitates the exchange and management of security-relevant data.
Security
Content Delivery Network (CDN)
CDN is a network of distributed servers designed to deliver web content to end users faster and more efficiently. By storing copies of content on multiple servers in different geographical locations, a CDN can reduce loading times by transferring data from the nearest server to the user.
Network
Media
Content ingest
Content ingest refers to the process of transferring audio, video or other media files from different sources into a production, editing or playoutsystem. The content is automatically imported, checked, transcoded if necessary and provided with metadata. Ingest is the first step in the digital media workflowand ensures that all media is available in the right quality and format for further production steps.
Media
Contribution
Contribution describes the process of delivering content, such as video or audio material, from a source to a central location or platform. It is the first step in the transmission chain in which high-quality content is captured and transmitted from a production site, a venue or an external location (e.g. live broadcasts of sporting events, concerts or news programs).
Media
Contribution feed
A contribution feed is the original audio or video signal that is transmitted from a production location (e.g. stadium or studio) to a central production or broadcast facility. It is an uncut source signal that is sent via professional connections such as fiber, IP or satellite and forms the basis for further processing and distribution to broadcasters, platforms and viewers.
Media
Cross-site request forgery (CSRF)
By manipulating websites or emails, hackers trick unsuspecting users into performing unintended actions on authenticated websites without the users realizing it.
Security
Attack method
Cross-site scripting (XSS)
Attackers inject malicious code into websites, which is then executed by the browsers of other users. This allows attackers to take over sessions or steal sensitive data.
Security
Attack method
Customer Edge (CE)
Customer Edge the network device that is located at the edge of the customer network and establishes the connection to the network provider. The CE router acts as an interface that enables the customer to access the provider's services and network.
Network
Cyber hygiene
Cyber hygiene refers to a collection of practices and measures that companies take to protect their IT systems, data and networks from cyber threats and ensure their digital security. It includes preventive measures to prevent security incidents and promote the secure use of IT resources. The following areas are part of cyber hygiene: password management, software updates, firewalls, virus protection, etc.
Security
Cybersquatting
This describes the case in which persons or companies intentionally register domain names that are similar or identical to the brand, company or personal names of other persons or companies.
Security
Cyber Threat Intelligence (CTI)
Cyber Threat Intelligence involves collecting, analyzing and interpreting information on potential cyber security threats. This information is used proactively to understand and mitigate cyber risks, improve security measures and strengthen incident response capabilities.
Security
Security feature
Data Breach
Incident in which data is unlawfully stolen, copied, viewed, published or destroyed. Data breaches are usually caused by stolen login data, phishing or security gaps in third-party apps.
Security
Attack method
Data Center
A data center is a facility where large amounts of IT infrastructure, such as servers, storage devices and network equipment, are centrally housed and operated. It provides an environment that is optimized for high availability, security and climate control to ensure the continuous performance and availability of data and applications.
Network
Data Compliance
Ensuring the protection of important information in accordance with company and government laws. Similar to a collection of detailed rules for the protection of personal data and information.
Security
Compliance
Dark fiber
Dark fiber refers to unused fiber optic lines that are provided without active network technology. Companies are given exclusive access to this physical infrastructure and can "light up" the connection with their own hardware. This enables particularly powerful, secure and flexible point-to-pointconnections to be created, ideal for data centerlinks, media transmissions or high-bandwidth company locations.
Network
General Data Protection Regulation (GDPR)
Data protection regulation of the European Union (EU), which came into force on May 25, 2018. The aim of the GDPR is to strengthen the protection of personal data within the EU and to establish uniform standards for the handling of this data in all member states.
Security
Compliance
Data Loss Prevention (DLP)
Data loss prevention (DLP) comprises technologies and guidelines designed to prevent sensitive or confidential data from leaving a company without authorization. DLP monitors data movements, detects risky activities and blocks potential data leakage in order to protect information and meet compliancerequirements.
Security
Decoder (DEC)
A decoder converts compressed or encoded data into a readable or usable format. For media content such as video or audio, the decoder takes the compressed data created by an encoder and converts it back into an original, often uncompressed format required for playback or further processing.
Media
Dedicated Leak Sites (DLS)
Dedicated leak sites (DLS) are platforms or websites on which sensitive and protected data, information or documents are published and distributed. They are often used by cyber attackers who do not sell or use the stolen data directly, but publish it on these websites in order to document their illegal activity, extort ransom money or damage the reputation of the company concerned.
Security
Digital Media Workflow
A digital media workflow is the digital process chain for capturing, editing, managing, transmitting and playing out media content. It combines production, IT and distribution in a consistent working environment.
Media
Direct Cloud Connectivity
Direct Cloud Connectivity is a dedicated, private network connection between a customer's corporate network and a cloud service provider. It enables secure, fast and stable access to cloud services without having to take a detour via the public internet.
Media
Distribution
Distribution refers to the process of disseminating content to the audience or to various reception points. In the media industry, distribution includes the delivery of television programs, films, music and other content via various channels such as cable, satellite, internet streaming or digital downloads.
Media
Distribution feed
A distribution feed is the final, fully processed audio or video signal that is sent to broadcasters, platforms, networks or end users. Unlike contribution feeds with raw material, it delivers the broadcast-ready program and forms the final step in the chain to ensure that content reaches the audience in the required quality and stability.
Media
Domain Name System (DNS)
The Domain Name System (DNS) is like an address book for the Internet. It translates domain names (such as "riedel.net") into IP addresses that computers use to find each other on the Internet.
Network
Domain Name System Spoofing (DNS)
Manipulation of the Domain Name System (DNS) to redirect users to fake websites and carry out phishing attacks.
Security
Attack method
Dynamic Host Configuration Protocol (DCHP)
Is a network protocol that automatically assigns an IP address and other network configuration parameters to devices in an IP network. This allows devices such as computers, printers and others to be configured automatically and without manual intervention.
Network
Dynamic Multipoint Virtual Private Network (DMVPN)
DMVPN is a technology that enables companies to establish secure and scalable connections over the Internet between multiple locations. Unlike traditional VPNs, where each connection has to be set up manually, DMVPN allows VPN connections to be set up dynamically between sites. This means that new connections are established automatically when they are needed, without the need to configure each connection individually.
Network
E-Line
E-Line is a point-to-point Ethernet connection that provides a direct, dedicated connection between two locations. E-Line enables high bandwidth and low latency data transmission, which is ideal for applications that require a reliable and continuous connection between two points, such as business connections.
Network
Edge computing
Edge computing processes data directly where it is generated, on local devices or edge servers. These analyze and pre-process the data before only the essentials are sent to the cloud. This reduces latency, saves bandwidth and enables applications with very fast response times.
Network
Encoder ENC
An encoder converts uncompressed data (such as video or audio signals) into a compressed format. This reduces the file size and facilitates transmission and storage. The decoder is then responsible for converting the compromised file.
Media
Email spoofing
The sending of fake emails in which cyber criminals pretend to be well-known companies/persons in order to get the user to click on links (phishing/viruses).
Security
Attack method
End-to-end
End-to-end describes a network or communication connection that covers the entire data flow from a starting point (sender) to the end point (receiver). This ensures that the data is transmitted continuously and without interruptions along the entire route. End-to-end solutions offer comprehensive control and optimization of the connection, resulting in improved performance, security and reliability.
Network
Endpoint
Technical object that is connected to a network, e.g. computer, printer, smartwatch, etc.
Network
Endpoint Detection System (EDS)
An endpoint detection system (EDS) focuses primarily on detecting threats at endpoints. It uses methods such as behavioral analysis, anomaly detection and threat intelligence to identify risks and issue notifications. In contrast to EDR, EDS focuses purely on detection; reactions are possible, but less in-depth and not as comprehensively automated as with EDR.
Security
Security feature
Endpoint Protection Platform (EPP)
EPP is a comprehensive security solution for endpoints that combines various security technologies such as antivirus, anti-malware and firewall functions. It aims to provide holistic protection against a wide range of threats.
Security
Network
Security feature
Endpoint Security (ES)
Endpoint security refers to the protection of individual devices (endpoints) such as computers, servers and mobile devices from cyber security threats. It encompasses a range of technologies and practices to secure these endpoints.
Security
Network
Security feature
E-Tree
E-Tree is a point-to-multipoint Ethernet connection in which a central location (root) is connected to several other locations (leaves). Communication usually takes place from the root location to the leaves, not directly between the leaves. This service is suitable for applications in which a central point, such as a data center, supplies several locations in a tree structure model, for example for data distribution or corporate networks in which central resources are distributed to several locations.
Network
Evasion attack (on an AI solution)
In an evasion attack, an attacker creates a manipulated input - a so-called adversarial example - in order to deliberately cause an AI to make a wrong decision. An example would be a slightly altered image of a traffic sign that looks the same to humans but is misclassified by the AI. For such attacks, the attacker usually needs basic knowledge about the model or (in)direct access, for example through public models or test queries. Adversarial examples can often be transferred to similar models, as these manipulations often work with several AI systems.
Security
Attack method
Event Connectivity
Event connectivity includes all network and internet services required for the realization of events, productions and live broadcasts on site. This often includes Internet access, signal transport, WLAN and site networking.
Network
Media
Event Network Infrastructure
Event network infrastructure refers to the technical network infrastructure for events, such as switches, routers, fiber optics, firewalls and access components. It forms the basis for production, communication and digital services at the event venue.
Network
Media
Extended Detection & Response (XDR)
XDR extends EDR by integrating and correlating data from different security sources such as endpoints, networks and cloud environments. The aim is to provide a more comprehensive and holistic approach to detecting and responding to threats across the entire IT environment.
Security
Security feature
Extended Secure Reliable Transport (X-SRT)
X-SRT is an extension protocol and is based on the SRT protocol. Compared to SRT, X-SRT offers additional functions and optimizations for specific requirements.
Media
Fiber Optic Cable
Fiber optic cable is a high-speed data transmission cable that uses light pulses to transmit information over long distances. It consists of thin glass or plastic fibers that conduct the light. Compared to conventional copper cables, fiber optic cables offer significantly higher bandwidths and transmission speeds as well as a greater range, making them ideal for use in modern networks and communication systems.
Network
File Transfer Protocol FTP
FTP is a network protocol for transferring files between computers over a network, especially the Internet. It enables files to be uploaded and downloaded to and from a server and is often used to exchange large amounts of data.
Network
Firewall-as-a-Service (FWaaS)
Firewall-as-a-Service (FWaaS) is a cloud-based security model in which classic firewall functions are provided via the internet. Instead of operating hardware on site, FWaaS protects all network traffic centrally in the cloud, enabling consistent security policies for all locations, devices and users - regardless of where they are located. FWaaS is a key component of modern SASEarchitectures as it provides scalable, location-independent and easily manageable network security.
Security
Network
Security feature
Full HD 1080p50
Is a high-resolution video resolution of 1920 x 1080 pixels with a refresh rate of 50 frames per second (50 Hz) using the progressive scan method.
Media
Gateway
A gateway is a hardware, software or combination unit that serves as an interface between two different networks. It ensures that the data is correctly formatted and addressed so that it can be exchanged between the different protocols or formats of the two networks.
Network
Global Area Network GAN
Global Area Network is a network that enables connections over large geographical distances, often on a global level. It connects devices and systems worldwide, typically via the Internet or special international network infrastructures.
Network
Global Positioning System (GPS)
GPS is a satellite navigation system that makes it possible to precisely determine the location of a device or person by receiving signals from several satellites.
Media
Hash function
Hash function describes an algorithm that converts an arbitrary amount of input data into a fixed, unique and compact hash value. The resulting hash values have a fixed length and are used to check data integrity, for fast data processing and as a security measure, as they are difficult to reverse and make it impossible to reconstruct the original data.
Security
HD 1080i25
HD 1080i25 refers to a high-resolution video resolution of 1920 x 1080 pixels, also known as Full HD, at a refresh rate of 25 frames per second (25 Hz) using the interlaced scan method.
Media
High Availability Network
A high availability network is a network infrastructure that is specifically designed for maximum availability and minimum downtime. This is achieved through redundancy, monitoring and automatic switching mechanisms, among other things.
Network
High Bandwidth Network
A high bandwidth network is a network with a particularly high transmission capacity. It is suitable for data-intensive applications such as cloud access, large data transfers, media production or live video.
Network
High Dynamic Range (HDR)
HDR is a technology for displaying video and image content that offers an extended contrast range and a wider color palette compared to SDR (Standard Dynamic Range). HDR makes it possible to display both the brightest and darkest areas of the image with more detail, resulting in more vivid, realistic and dynamic images.
Media
High Efficiency Video Codec (HEVC/h.265)
H.265, is a video compression standard that offers improved compression efficiency compared to its predecessor H.264. HEVC enables higher image quality with smaller file sizes and bandwidth requirements, making it ideal for transmitting high-resolution video, such as 4K and HDR, over networks and streaming services.
Media
Honeypot
The honeypot method is a security strategy in which a deliberately insecure or vulnerable system is set up as a trap to lure attackers and monitor their activities. These "decoy" systems help analyze attackers' tactics, techniques and tools, identify vulnerabilities and improve security measures without compromising the actual network or system.
Security
Host Based Intrusion Detection System (HIDS)
HIDS is a security system that monitors and analyzes activity on an individual host or endpoint to identify signs of security incidents or potential threats. It provides notifications when suspicious activity is detected on the host.
Security
Security feature
Host Based Intrusion Prevention System (HIPS)
HIPS is a security system that operates at the individual host level (endpoint) and monitors and prevents malicious activity or potential security threats on a specific device.
Security
Security feature
HTTP live streaming (HLS)
HLS is a streaming protocol used to transmit audio and video content via the Internet . HLS splits the media file into small segments and delivers them to the user one after the other, enabling uninterrupted playback. HLS dynamically adjusts the quality of the stream to the user's available bandwidth to ensure smooth playback.
Media
HTML5 Gfx
HTML5 Gfx refers to the graphical and graphic functions of HTML5 that make it possible to create interactive and dynamic content in the web browser. These include the canvas element for 2D and 3D drawings, SVG for scalable vector graphics and WebGL for complex 3D graphics. These technologies improve the visual presentation and interactivity of media content on websites.
Media
Hub
A hub is a simple network device that forwards data packets to all connected devices, regardless of which device the data is actually directed to. It works on the physical layer (layer 1) of the OSI model and has no intelligence to differentiate between data streams, which leads to potential network congestion as all devices receive the same data traffic.
Network
Hybrid cloud
A hybrid cloud combines public and private cloud resources, allowing companies to store sensitive data in the private cloud while benefiting from the scalability and flexibility of the public cloud.
Network
Hypertext Transfer Protocol (HTTP)
HTTP is a protocol used to transfer web pages and other web resources over the Internet. It defines how messages are sent and received between web browsers and web servers to request and display web pages.
Network
Jamming
In cyber security, jamming refers to measures aimed at deliberately slowing down or confusing attackers. Such disruptive actions make it more difficult for intruders to carry out their attacks cleanly or proceed strategically. This can include various techniques, for example the installation of distraction targets such as honeypots, which steer the attacker in the wrong direction. In this way, defenders gain insight into his behavior while the real systems remain protected.
Security
Security feature
Jitter
Jitter refers to the fluctuations in latency in the transmission of data packets over a network. Instead of the data packets arriving at regular intervals, they occur irregularly, which leads to delays and inconsistencies in data transmission. Jitter is particularly problematic in real-time applications such as VoIP (Voice over IP) or video conferencing, as it can affect the quality of the transmission by causing distorted sound, image jitter or disconnections.
Network
Incident response
Incident response refers to a structured process for responding to security-related incidents such as cyber attacks or system failures. The aim of this process is to minimize the damage, identify the cause of the incident, restore the affected systems and take measures to prevent future incidents.
Security
Security feature
Indicator of Attack (IOA)
An IoA is a pattern of activity or behavior that indicates a specific attack or intrusion. Unlike IoCs, which are specific artifacts, IoAs focus on detecting methods and techniques used by attackers.
Security
Indicator of Compromise (IOC)
An IoC is a piece of forensic evidence that indicates that a network or system has been compromised. It can be a file hash, an IP address, a domain name or other artifacts associated with malicious activity.
Security
Network
Information Security Management System (ISMS)
The term "information security" covers everything that protects a company's information assets from threats (such as cyber attacks, natural hazards, etc.) and prevents potential economic and reputational damage. According to ISO 27001, the focus of information security is on the following protection goals Confidentiality; Integrity; Availability. An information security management system ultimately represents a systematic approach to managing sensitive company information so that it remains secure.
Security
Inside threats
The type of attack in which employees maliciously and deliberately allow attackers access to the network.
Security
Network
Attack method
Internet Group Management Protocol (IGMP)
IGMP is a protocol in the TCP/IP stack that is used to organize multicast transmissions in IP networks. It enables clients to inform a router that they wish to participate in a specific multicast data stream. Switches use IGMP snooping on layer 2 to forward multicasts to the right recipients in a targeted and efficient manner.
Network
Media
Internet of Things Security (IoT Security)
IoT security encompasses all measures and technologies that protect networked devices in the Internet of Things from manipulation, data misuse and cyber attacks. As IoTdevices such as sensors, cameras, routers or smart homesystems are often permanently online and often only have limited integrated security, they are considered to be particularly vulnerable. IoT security ensures that these devices communicate securely, can be updated and do not represent a weak point in the company network.
Security
Network
Security feature
Internet Protocol Address (IP Address)
The IP address is a unique numerical identifier that is assigned to each device in a network to identify it and enable communication between devices.
Network
Internet Protocol IP
The IP is responsible for the addressing and routing of data packets across networks. It enables the delivery of packets from a source to a destination across multiple networks, based on the IP addresses of the devices.
Network
Intrusion Detection System / Intrusion Prevention System (IDS & IPS)
An intrusion detection system (IDS) monitors network and system activities, detects suspicious patterns, potential threats or security incidents and alerts in the event of anomalies, but does not actively intervene in data traffic. An intrusion prevention system (IPS) builds on these functions and goes one step further: it automatically blocks or prevents detected attacks, thereby protecting systems from harmful traffic in real time.
Security
Network
Security feature
IP Video Transport
IP video transport describes the transmission of video and audio signals via IP-based networks. The media data is split into packets and transported via Ethernet or WAN infrastructures instead of via traditional SDI or analog lines. This approach enables flexible, scalable and cross-location workflows and forms the basis of modern, IP-based broadcast and production environments.
Network
Media
ISO 27001
ISO 27001 is an international standard for information security management systems (ISMS). This standard focuses on requirements for the establishment, implementation, maintenance and continuous improvement of an ISMS.
Security
Compliance
IT-OT convergence
IT-OT convergencedescribes the increasing merging of information technology (IT) with operational technology (OT). This involves connecting traditional corporateIT systems such as networks, servers and applications with OT systemsthat control physical processes. This integration increases efficiency, transparency and automation, but also raises cybersecurity requirements as previously isolated OT systemsbecome more networked and therefore more vulnerable.
Network
Keylogger
A keylogger is a type of malware or hardware device that secretly records a user's keystrokes. This data can then be used by an attacker to steal sensitive information such as passwords, credit card numbers and other confidential data. Keyloggers can exist on both a software and hardware level.
Security
Attack method
L3 Switch
The layer 3 switch is the multi-layer switch or distribution switch. This layer is a network device that can process data traffic on different OSI layers (layer 2 and layer 3) in order to enable efficient forwarding of data in complex networks. It therefore transports packets and frames out of the network.
Network
Loader
A loader is a special type of program or code segment that is used to load and execute other software components or modules in the working memory of a computer. Loaders are used in various contexts (execution of operating systems, initialization of application programs and in the malware world for the infiltration and execution of malicious software).
Security
Last Mile Provider (LMP)
A last mile provider is a telecommunications company or ISP that provides the last connection between the main network and the end customer. This "last mile" refers to the final section of the communication link, which is often the most demanding and expensive segment of the infrastructure. The last mile provider is responsible for ensuring that the data, be it Internet, telephony or television, reaches the customer's company via cable, fiber optics or radio.
Network
Latency
Latency describes the time delay that occurs when data is transferred from a starting point to a destination or a digital action is processed. It therefore indicates how long it takes for a request to receive a response. Low latency is particularly important when systems need to react quickly, for example in real-time communication, online services or interactive applications.
Network
Layer 2 Virtual Private Network (L2VPN)
L2VPN is a network technology that makes it possible to connect several physically separate networks at the data link level (layer 2 of the OSI model) via a shared backbone network so that they behave like a single local network.
Network
Media
Live broadcast
A live broadcast is the transmission of audio and video content at the moment it is created. The generated material is played out to an audience without delay - via television, radio or online platforms. As pre-production is not possible, signal paths, technology and processes must be stable so that events such as sport, concerts, news or events can be received immediately and in high quality.
Media
Live Event Production
Live Event Production encompasses the technical and organizational planning and management of events in real time and ensures a smooth, high-quality live broadcast in onsite, hybrid and fully digital formats.
Media
Live streaming
Live streaming refers to the transmission of video and audio signals via the internet at the moment they are created. The content is continuously broken down into small data packets and sent directly to viewers on digital platforms without the need for a prior download. This allows users to watch events such as concerts, presentations or webinars at the same time and from any location.
Media
Local Area Network (LAN)
A Local Area Network (abbreviation: LAN) is a spatially limited network in which at least two and up to thousands of peripheral devices are integrated - for example computers, laptops, printers and storage devices.
Network
Low latency streaming
Low latency streaming refers to streaming processes with a particularly short delay between recording and playback. It is important for interactive formats, sport, betting, remote production and live communication.
Media
Man-in-the-middle (MitM)
An attacker positions himself between two communication partners in order to intercept, monitor or manipulate data traffic without the parties noticing.
Security
Network
Attack method
Malware
Malicious software such as viruses, Trojans or ransomware is used to penetrate a network unnoticed and cause damage such as data loss, system failures or the extortion of money.
Security
Network
Attack method
Managed Security Service Provider (MSSP)
A Managed Security Service Provider is a service company that offers and manages IT security services for other companies.
Security
Security feature
Managed Service Provider (MSP)
An MSP is a company that provides IT services and support to other companies on an ongoing basis. MSPs take over the monitoring, management and maintenance of IT infrastructure, including networks, cloud services and security measures.
Network
Media Access Control Address (MAC Address)
A MAC address is a unique identifier that is assigned to each network device, such as a computer or smartphone. This address consists of 12 alphanumeric characters (often in six pairs such as "00:1A:2B:3C:4D:5E") and is used to identify and communicate with devices within a network.
Network
Media Asset Management (MAM)
Media asset management refers to systems for the structured management of digital media content and its metadata. MAM solutions facilitate the search, archiving, versioning and reuse of content.
Media
Media Control Room (MCR)
The MCR is the central control center in broadcast and media production facilities, where the entire broadcast chain is monitored and controlled. All incoming and outgoing signals, such as live broadcasts, recorded content and commercials, are managed in the MCR. The technicians in the MCR ensure that transmissions run smoothly by monitoring signal quality, adhering to the broadcast schedule and intervening immediately in the event of technical problems.
Media
Media Event Network
A media event network is a network infrastructure that is specially designed for media-related event productions. It connects production areas, technical areas, distribution and communication systems at the event location.
Network
Media
Media processing
Media processing includes technical processing steps such as encoding, decoding, transcoding, packaging or quality control of media content. These processes are central to modern production and distribution chains.
Media
Metro Ethernet (Metro E)
A Metro E connection is a direct point-to-point (P2P) connection that connects, for example, a branch office directly to a data center via an underground cable. It is used for the most important locations as it offers high bandwidth and low latency. However, these connections are very expensive and therefore unsuitable for connecting all of a company's locations. The Metro E Connection works on layer 2 of the OSI model, as the connection is established via Ethernet switches.
Network
Metropolitan Area Network (MAN)
A metro network, also known as a metropolitan area network (MAN), is a regional high-performance network that connects several locations within a city or larger metropolitan region. It bridges the distance between local area networks (LANs) and supra-regional wide area networks (WANs). Typically, high-performance fiber optic technology is used to provide high bandwidths, low latency and reliable site connections - for companies, campus structures, carriers or data centers, for example.
Network
MITRE ATTA&CK
MITRE ATT&CK is a comprehensive framework that details the tactics and techniques used by cyber attackers to compromise networks. Developed by the MITRE Corporation, it is a valuable resource for cybersecurity professionals to understand, recognize and respond to threats.
Security
Network
Multi Cloud
A multi-cloud strategy uses multiple public cloud services from different providers to achieve redundancy, flexibility and optimization of cloud resources. In this way, companies remain independent of a single provider and can use different cloud services for different requirements.
Network
Multi-factor authentication (MFA)
MFA is a security measure used to confirm a user's identity by requesting multiple pieces of evidence that are independent of each other. Unlike traditional authentication, which requires only one element such as a password or PIN, MFA requires at least two different factors.
Security
Security feature
Multilateral feeds
A shared feed produced by a host broadcaster and distributed to several broadcasters or media companies. This feed often includes all important moments of the event and is used equally by all participating broadcasters.
Media
Network Based Intrusion Detection System (NIDS)
NIDS is a security system that monitors network activity for signs of suspicious or malicious behavior. It provides notifications or alerts when potential threats are detected on the network.
Security
Network
Security feature
Network Based Intrusion Prevention System (NIPS)
NIPS is a security system that operates at the network level and enables real-time monitoring and prevention of malicious behavior on the network. It helps to protect the network infrastructure by analyzing and blocking potentially harmful traffic.
Security
Network
Security feature
Network Detection & Response (NDR)
NDR is a security technology that focuses on detecting and responding to threats within the network infrastructure. It involves monitoring network traffic, analyzing behavior and identifying potential security incidents or abnormal activity.
Security
Network
Security feature
Next-Generation Firewall (NGFW)
A next-generation firewall (NGFW) is a modern firewall that offers functions such as deep packet inspection, intrusion prevention and application control in addition to classic packet filtering. It detects complex threats much better than conventional firewalls and protects networks more comprehensively against modern cyber attacks.
Security
Security feature
Network Monitoring
Network monitoring is the continuous monitoring of network components, connections and performance values. The aim is to detect faults at an early stage, optimize performance and ensure availability.
Network
Network segmentation
Network segmentation refers to the division of a network into several smaller, separate areas in order to improve security, control and performance. Segmentation makes it easier to monitor data flows, reduce attack surfaces and limit potential security incidents to individual segments. This prevents attackers or malware from spreading unhindered throughout the entire network.
Network
Network redundancy
Network redundancy refers to the targeted multiple design of lines, devices or paths within a network. It increases reliability and reduces the risk of interruptions during operation.
Network
On-Site Production
On-site production refers to the implementation and monitoring of media productions directly at the event location. All production and technical teams are on site to monitor and control the production live.
Media
Outside Broadcast (OB)
Outside Broadcast refers to mobile production outside a fixed studio, typically at sporting events, concerts or events. OB vans, temporary technical areas and specialized network connections are used.
Network
Media
Open Systems Interconnection (OSI)
The Open Systems Interconnection (OSI) model is a conceptual framework that defines how networks communicate with each other and send data from a sender to a receiver.
Network
Operations
The term "operations" refers to the operational procedures and processes required for the production, management and distribution of media content. This includes practical, technical and organizational aspects to ensure that media-related activities run smoothly.
Media
Operational Technology (OT)
Operational Technology (OT) comprises hardware and software systems that control or monitor physical processes, machines and industrial systems. OT is primarily used in areas such as manufacturing, energy supply, transportation, broadcasting and building technology. As OT systemsoften have long life cycles and were originally operated in isolation, their increasing networking places particular demands on security and stability.
Network
Over-the-top (OTT)
OTT refers to the delivery of video, audio and other media content over the internet without the involvement of broadcast, cable or satellite providers. Users access content directly via streaming services using internet-connected devices such as smart TVs, computers, smartphones or tablets.
Media
Over-the-top streaming (OTS)
OTS refers to the delivery of video and audio content over the Internet without the involvement of traditional TV or cable providers.
Media
Packet loss
Packet loss refers to the loss of individual data packets during transmission over a network. This can significantly impair the quality of voice, video and data-intensive applications.
Network
Password cracking
Attackers try to gain unauthorized access to systems by systematically testing passwords.
Security
Attack method
Patch
A patch is a software update or correction that has been developed to eliminate security gaps, correct errors or add new functions.
Security
Password Spraying
Password Spraying is a cyber-attack technique in which attackers attempt to gain access to accounts by trying a series of commonly used passwords or a small number of known passwords against many user accounts. One reason to make the choice of password as complex as possible.
Security
Attack method
Pass the Hash Attack (PtH)
Pass the Hash is a technique used by attackers to log into a computer system without knowing the actual password. Instead, they use the hashed version of the password stored in the system to authenticate themselves as the corresponding user.
Security
Attack method
Peering
Peering refers to the direct connection of two network operators in order to exchange data traffic without detours. This direct coupling reduces the number of intermediate stations, resulting in faster transmission paths, lower latencies and more stable connections. Peering often takes place at Internet hubs and is used to make the flow of data between large Internet services, providers or content networks more efficient.
Network
Penetration test (pentest)
Pentesting is a simulated cyberattack method that is performed to assess the security of a computer system, network or application. The aim of a pentest is to identify vulnerabilities and security gaps that could be exploited by malicious attackers.
Security
Network
Remote Access Trojan (RAT)
A RAT enables attackers to secretly and remotely access an infected computer system. The main purpose is to open a back door into the system so that attackers can gain unrestricted access to files, programs, settings, etc.
Security
Attack method
Passkey
A passkey is a modern, passwordless login procedure based on cryptographic key pairs. This eliminates the use of traditional passwords - and therefore many of their typical security risks such as phishing, credential stuffing or reusing the same passwords. Passkeys are easy to use, often work via smartphone, laptop or biometric features and at the same time offer a higher level of security than conventional password-based logins.
Security
Security feature
Playout
Playout refers to the planned and controlled delivery of media content to broadcasters, platforms or distribution channels. It includes both linear playout processes and automated content transfers.
Media
Phishing
Attackers use fake emails, websites or messages to trick users into revealing confidential information such as usernames, passwords or credit card details.
Security
Attack method
Point of Presence (PoP)
A PoP is a physical location where a network provider provides access to its network. The PoP usually contains network hardware such as routers, switches and servers that enable connections to other networks.
Network
Poisoning attack (on an AI solution)
In a poisoning attack, an attacker deliberately changes the training data of an AI in order to manipulate its behavior - for example, by reducing its accuracy or provoking certain wrong decisions. Even small changes in the data set can have major consequences. A typical example: If traffic sign labels are set incorrectly, the model learns incorrect assignments and later no longer recognizes signs correctly. The prerequisite for a poisoning attack is that the attacker has direct or indirect access to the training data - for example via an insecure transmission channel where the data integrity is not checked.
Security
Attack method
Precise Time Protocol v2 (PTP2)
PTP2 is a network protocol version specifically designed for precise synchronization of clocks in a network. In the media and event industry, accurate time stamping is often critical to ensure that audio and video elements run in sync.
Network
Media
Pretexting
Pretexting is a social engineering technique in which attackers use a fabricated identity or story (the "pretext") to obtain confidential information from their target. The attacker pretends to be someone the victim would trust, such as a colleague, an IT support employee or a representative of a trusted organization.
Security
Attack method
Private Media Cloud
Private Media Cloud refers to a cloud-based infrastructure that is set up exclusively for a company to store, manage and access media content such as videos, audios and other digital assets.
Media
Private IP
A private IP is an IP address that is used within a private network and is not visible on the public Internet. It enables communication between devices within the same network without external access being possible.
Network
Protocol
A protocol in network technology is a defined set of rules and standards that determine how data is exchanged between devices in a network. It defines how data packets are formatted, addressed, transmitted, received and processed to ensure smooth and reliable communication between devices. Examples of network protocols are TCP/IP, HTTP and FTP.
Network
Protocol Independent Multicasting (PIM)
PIM is a routing protocol that is used for the efficient distribution of multicast data in an IP network. PIM ensures that multicast data is only sent to the network nodes that actually need it. "Protocol Independent" means that PIM works independently of the underlying unicast routing protocol so that it can be used with different routing protocols such as OSPF or BGP.
Network
Media
Provider Edge (PE)
For network providers, the PE router refers to the device at the edge of the provider's network that is directly connected to customers' CE devices. This PE router is critical for the provision of services such as VPNs, MPLS.
Network
Purple Team
The Purple Team combines the approaches of the Red and Blue Teams in a joint, cooperative process. While the Red Team simulates attack techniques and uncovers weaknesses, the Blue Team uses these findings to improve defensive measures. The Purple Team ensures that both sides continuously exchange information, attack paths are better understood and defence strategies can be optimized in a targeted manner. This significantly increases the overall effectiveness of the security strategy.
Security
Quality of Service (QoS)
Quality of Service (QoS) refers to procedures and mechanisms in networks that ensure that certain data streams are given preferential treatment. QoS controls and prioritizes network traffic in order to optimize the performance of time-critical applications such as voice,video or mediatransmissions. This can reduce latency, jitter and packet loss, ensuring a stable and reliable connection - particularly important for real-time communication and high-quality media streams.
Network
Quishing
Quishing is a form of phishing in which QR codes are used to lure users to fake websites or trick them into disclosing sensitive data. Instead of clicking on a link, the victim scans a manipulated QR code, often on emails, flyers or fake notices. As the actual link is not visible when scanning, quishing looks particularly credible and is increasingly being used by attackers.
Security
Attack method
Ransomware
Ransomware is a type of malware that aims to block access to a user's system or data by encrypting it. The attacker then demands a ransom from the victim in order to regain access.
Security
Attack method
Real-Time Streaming Protocol (RTSP)
RTSP is a network protocol that is used to control streaming media servers. It enables the setup and management of multimedia sessions between end devices, e.g. starting, stopping and pausing a video or audio stream.
Media
Real-Time Messaging Protocol (RTMP)
RTMP is a protocol that is used to transmit audio, video and data in real time over the Internet. It was originally used for the transmission of Flash content, but is still widely used in the live streaming world today.
Media
Real-TimeTransport Protocol (RTP)
RTP is a protocol for the packet-based transmission of audio and video data in real time. It is used in live streaming, broadcast and contributionworkflows and enables the stable, time-critical transmission of media content via IPnetworks.
Media
Network
Red Team
The Red Team carries out simulated attacks to uncover weaknesses in an organization's security measures. It acts like a real attacker and attempts to overcome the security systems in order to uncover potential vulnerabilities.
Security
Redundancy
To achieve redundancy, additional components or systems are provided to increase the reliability and availability of a network or system. If one part fails, the redundant components automatically take over the function in order to continue operation without interruption.
Network
Media
Remote Production
Remote production is the execution and monitoring of media productions, such as live broadcasts or events, from a remote location. Cameras and other production equipment are installed on location, while directing, editing and other production tasks are controlled via networks from a central, often remote location.
Media
Reverse Path Forwarding (RPF)
Reverse path forwarding is a technique in networks that ensures that multicast packets are only forwarded if they arrive via the interface that would be the best way back to the source. This prevents loops and redundant data traffic in the network.
Network
Media
Rootkit
A rootkit is a type of malware designed to integrate deeply into a computer system and remain undetected. It allows attackers to take control of the system and carry out various malicious activities while attempting to conceal its presence.
Security
Attack method
Router
A router is an intelligent network device that forwards data packets between different networks. It works on the network layer (layer 3) of the OSI model and uses IP addresses to determine the best path for data transmission. Routers connect different networks with each other, e.g. a local area network (LAN) with the Internet, and ensure that data reaches its destination efficiently and securely.
Network
Scam
Scam refers to fraudulent practices in which criminals try to deceive people in order to obtain their money or personal information. Scams can take various forms and often use social engineering to gain the trust of victims.
Security
Attack method
Secure Email Gateway (SEG)
A secure email gateway is a security solution (in the form of software or a device) that monitors and protects an organization's email traffic when sending and receiving. Unwanted emails are blocked and sensitive information is encrypted when sent.
Security
Security feature
Secure Sockets Layer (SSL)
SSL is a cryptographic protocol used to secure communication over a computer network, especially the Internet. It was developed to ensure the confidentiality, integrity and authenticity of transmitted data. SSL is most commonly used to secure websites. If a website uses SSL, this is indicated in the URL by "https://" instead of "http://".
Security
Network
Secure Web Gateway (SWG)
A Secure Web Gateway (SWG) is a security solution that monitors, filters and protects all of a company's web traffic. It prevents users from accessing dangerous websites, blocks malware, enforces company policies and protects sensitive data when using the Internet. SWGs thus ensure secure, controlled and policy-compliant access to the web, regardless of whether employees are working in the office or remotely.
Security
Security feature
Secure Reliable Transport (SRT)
Video transport protocol for the transmission (Secure Reliable Transport) of (encrypted) video streams with audio.
Media
Security Incident & Event Management (SIEM)
SIEM is a comprehensive solution that includes the collection, analysis and correlation of security events and incidents in real time. It helps organizations identify and respond to potential security threats by providing a central platform for monitoring and managing security-related events on the network.
Security
Security feature
Security Orchestration & Automation Response (SOAR)
SOAR refers to a comprehensive approach to cyber security that combines security orchestration, automation and incident response. It integrates various security tools and processes to optimize and automate response measures to security incidents, improving the efficiency and effectiveness of incident handling.
Security
Security feature
Service Level Agreement (SLA)
A Service Level Agreement (SLA) is a contractually defined service agreement between a service provider and a customer. It defines measurable service parameters such as availability, response times, recovery times or support quality. SLAs ensure that customers have transparent expectations of the service and at the same time provide a reliable basis for evaluating the service provided.
Single Point of Failure (SPOF)
Refers to a point in a system or network whose failure can lead to a complete failure of the entire system.
Network
Signal routing
Signal routing describes the targeted forwarding of audio, video or data signals within a technical infrastructure. This involves determining the routes and devices through which a signal is routed so that it arrives reliably at its intended destination. Signal routing ensures that content is correctly distributed, processed or combined and is a central component of modern production, broadcast and network systems.
Media
Single Sign On (SSO)
SSO is an authentication method that allows a user to log in once and then access multiple applications or systems without having to re-authenticate in other applications.
Security
Smishing
Smishing is a form of phishing in which attackers use fraudulent text messages to steal personal data, passwords or payment information. The messages often look official - such as alleged parcel notifications, bank warnings or security codes - and usually contain a malicious link or a request to disclose confidential data.
Security
Attack method
Sniffing
Unauthorized interception of network traffic in order to steal sensitive information such as user names and passwords.
Security
Network
Attack method
Standard Dynamic Range (SDR)
SDR stands for Standard Dynamic Range and refers to a conventional method of displaying video and image content with a limited contrast range and a standardized brightness range. In contrast to more modern technologies such as HDR, which offer a wider contrast range and more brightness levels, SDR shows content with a narrower range between the darkest and brightest areas of the image.
Media
Stealer
A stealer is a form of malware designed to collect information from an infected system. Typically, stealers aim to steal login credentials such as usernames and passwords and then transmit this information to an external server either by email or over the network.
Security
Network
Attack method
Social engineering
Attackers use psychological tricks to persuade employees to disclose confidential information or perform unsafe actions.
Security
Attack method
Software-Defined Networking (SDN)
SDN is an approach to network management in which the control plane is separated from the data transmission plane. This enables centralized control of the network by software-based controllers instead of having the control logic on each individual network device.
Network
Source-Specific Multicast (SSM)
SSM is a variant of the multicast transmission method in which receivers only subscribe to data streams from a specific source. In contrast to conventional multicast, where recipients receive all data from a multicast group, SSM enables more precise control by distributing only the data traffic from the specified source to the recipients.
Network
Media
Spam
Spam refers to unsolicited and often mass-mailed messages, usually sent by email. These messages usually contain alleged advertising, but can also have other content.
Security
SQL injection
By mishandling SQL queries, attackers can inject malicious SQL code into an application to manipulate databases or retrieve sensitive information.
Security
Attack method
Subnet
A subnetwork is a part of a larger network that is divided into smaller, logically separate segments. This division makes it possible to simplify network management, improve network performance and increase security. Each subnet has its own IP address range derived from the main network address and devices within the same subnet can communicate directly with each other, while communication between different subnets takes place via a gateway.
Network
Switch
A switch is a network device that forwards data packets to the specific port to which the target device is connected. In contrast to a hub, a switch works on the data link layer (layer 2) of the OSI model and uses MAC addresses to efficiently control data traffic.
Network
Symmetric encryption
In symmetric encryption, the same key is used for both encryption and decryption.
Security
Temporary Event Network
A temporary event network is a temporary network infrastructure that is set up specifically for events, productions or live events. It is set up quickly, flexibly adapted to the requirements on site and provides stable connections for communication, media transmission, data services or production processes. At the end of the event, the infrastructure is dismantled or dismantled again.
Network
Media
Threat Detection and Response (TDR)
Threat Detection and Response (TDR) is a security approach that uses analysis and behavioral models to quickly detect cyberattacks or suspicious activities and trigger automated or manual countermeasures. This creates a continuous protection mechanism for IT systems, networks, cloud environments and end devices.
Security
Security feature
Threat Hunting
Threat hunting is the proactive process of detecting and identifying cyber threats that may be undetected in a network or system. In contrast to reactive security measures, which react to threats that have already been detected, threat hunting actively searches for threats before they can cause damage.
Security
Network
Security feature
Topology
A (network) topology describes the physical or logical structure of how network devices are connected and communicate with each other. It defines how the devices are arranged, how data flows through the network and which connections exist between the devices. Examples of network topologies are the star topology (where all devices are connected to a central hub), the bus topology (where all devices are connected via a common cable) and the mesh topology (where each device is connected to several other devices). The choice of topology influences the performance, reliability and scalability of a network.
Network
Traffic engineering
Traffic engineering describes methods and measures for the targeted control and optimization of data streams in a network. The aim is to use the available resources efficiently, avoid bottlenecks and improve performance for important applications. Intelligent path selection, load distribution and prioritization ensure that network traffic is transmitted reliably, stably and with the desired quality.
Network
Transmission Control Protocol (TCP)
The TCP is used for data exchange on the Internet and ensures that data is transmitted correctly and in the correct order. It ensures that all data packets arrive at the recipient and are assembled correctly.
Network
Transcoding
Transcoding is the process of converting digital media content (such as video or audio files) from one format or quality to another. This process often involves changing the codec, bit rate, resolution or file format in order to optimize the content for different end devices, networks or use cases.
Media
Transit Network
A transit network connects different networks and forwards their data traffic. It therefore forms the central transport path to the global Internet. A network can reach other networks and autonomous systems worldwide via a transit provider. Transit is crucial in large provider and international infrastructures to ensure reliable data transfer across network boundaries.
Network
Transport Layer Security (TLS)
TLS is a cryptographic protocol used to secure communication over a computer network, especially the Internet. TLS is the successor to Secure Sockets Layer (SSL) and offers improved security mechanisms.
Security
Network
Transport Stream (TS)
A standard format for the transmission of audio, video and data streams, especially for digital television (DVB) and streaming. TS enables the multiplexing of several contents in one stream and is robust against transmission errors.
Media
Trojans
A Trojan is malware that disguises itself as a useful application (e.g. with a useful file name) in order to gain undetected access to a computer system and carry out harmful activities.
Security
Attack method
Ultra High Definition (4k) (UHD 2160p50)
UHD represents a video resolution of 3840 x 2160 pixels with a refresh rate of 50 frames per second (50 Hz) in progressive scan mode.
Media
Unilateral feeds
Special, customized feeds produced by a single broadcaster in addition to the multilateral feed. These feeds can contain exclusive camera angles, specific content or commentary tailored to the needs of the respective broadcaster.
Media
User and Entity Behavior Analytics (UEBA)
UEBA is a security solution that uses advanced analytics methods to monitor and analyze the behavior of users and other entities within a network. The goal of UEBA is to detect unusual and potentially dangerous activity that may indicate insider threats, compromised accounts or malicious actors.
Security
Network
Security feature
User Datagram Protocol (UDP)
UDP is a connectionless protocol that sends data packets over the network quickly and without prior connection or delivery guarantee. It is particularly suitable for applications where speed is more important than reliability, such as real-time streaming or online gaming. UDP offers lower latency than TCP as it does not include connection establishment, error messages or retries of lost packets).
Network
Venue Connectivity
Venue connectivity describes the provision of a reliable network infrastructure at an event venue. It ensures that production teams, organizers, security systems and visitors have stable connections, for example for communication, media transmission, IT services or digital applications on site. Venue connectivity therefore forms the technical basis for smooth processes at events of all kinds.
Network
Media
Video contribution
Video contribution refers to the transmission of video material from the recording location to a central production system, a control room or a cloud platform. The focus here is on reliable, high-quality and low-delay delivery of the signal so that it can be used for live productions or further processing steps.
Media
Video distribution
Video distribution comprises the delivery of finished video content to various recipients such as broadcasters, streaming platforms, partners or end users. Distribution can take place via linear transmission paths, IP-based systems or file-based provision and ensures that content arrives in the right quality and form on the intended devices.
Media
Video encoding
Video encoding is the process of converting raw video data into a compressed, technically efficient format. Encoding allows content to be stored and transmitted in a space-saving manner and optimized for different playout channels. Codecs such as H.264, HEVC or AV1 are typical examples of such formats.
Media
Video transcoding
Video transcoding refers to the re-conversion of an already encoded video into a different format, resolution or bit rate. This enables the same content to be made available on different end devices or under varying network conditions and is an important part of modern streaming and distribution processes.
Media
Virtual Private Network (VPN)
A VPN is a technology that enables a secure and encrypted connection over a less secure network, such as the Internet. It works by routing a user's traffic through a specially configured server that encrypts the connection and hides the user's IP address.
Security
Network
Security feature
Wide Area Network (WAN)
A wide area network (WAN) is a network that extends over a large geographical area and usually connects several local area networks (LANs).
Network
Zero-day exploits
Attacks on security vulnerabilities in software that are not known to the developers because no patches or updates are yet available.
Security
Zero Trust Networks Access (ZTNA)
ZTNA is a technology in which network devices and services are configured and provisioned automatically and without manual intervention. This is made possible by automated processes and central management tools that ensure that devices integrate themselves into the network, configure themselves and are ready for operation, which simplifies setup and minimizes human error.
Network
Zero Trust Architecture (ZTA)
Zero Trust Architecture (ZTA) is a security approach in which no device, user or service in the network is trusted - neither inside nor outside the company. Every access must be continuously checked, authenticated and authorized. ZTA reduces the risk of security incidents by strictly limiting access to what is necessary and immediately detecting and blocking suspicious activity.
Security
Network
Security feature
No results
Do you have any questions?
Our team will be happy to help you. Send us a short message - we will get back to you personally as soon as possible.