Are the security techniques of Closed IPTV proprietary, and hence unfamiliar or unwelcome to many users?
The proprietary systems utilized are firstly targeted at the physical layer, through the Layer 3 Enhanced CCTV Switch employed. This removes much of the burden of achieving in a single user operation, MAC ACL and VLAN restrictions which would otherwise have to be implemented by a specialist installer with significant additional effort. The IP scheme is unique in that it allows a general Private Network Address range, as operated in the clients existing installation, to potentially operate concurrently with an auto configured address scheme. Once configured, it is the users choice to rely upon the DHCP/Static generated addresses, or the automatic configuration addresses, or in fact both. This is implemented using dual MAC / VLAN techniques, transparently supported by the Layer 3 Enhanced CCTV Switch. The further implementations of Trusted Endpoint in Closed IPTV are specifically designed to meet the unusual needs of CCTV, in that the key benefit of TCP/IP on the World Wide Web is specif
Related Questions
- With Closed IPTV does the proprietary nature of the discovery lock you in, and why not just spend a few days writing scripts to achieve the same thing?
- What is the difference between SANS Hacker Techniques, Exploits & Incident Handling and SANS Security Essentials Bootcamp Style?
- How Can We Trust National Security to Proprietary Software Vendors?