Created date

October 9, 2017

Content type (localized)

Blog

Share

Verimatrix Labs is a blog series written by our Security Team that focuses on how threat scenarios are trending, how they are driving new revenue security solutions, and ultimately how next-generation video service providers can create more durable business models through highly secure and frictionless services.

Created date

September 28, 2017

Content type (localized)

Blog

Share

At IBC we debuted Vtegrity, our first solution specifically designed for the IoT space, and we came up with a fun way to demonstrate how it secures connected devices – by remotely dispensing beer from a tap on our booth.

Created date

September 21, 2017

Content type (localized)

Blog

Share

Verimatrix Labs is a blog series written by our Security Team that focuses on how threat scenarios are trending, how they are driving new revenue security solutions, and ultimately how next-generation video service providers can create more durable business models through highly secure and frictionless services.

Created date

September 11, 2017

Content type (localized)

Blog

Share

Verimatrix identified cloudification as one of the major trends for the year at the start of 2017 and has seen ample confirmation of these moves from the market and our customers. Operators are looking for competitive advantage and increased agility so that new features and service options can be brought to market far faster than in the past.

TAGS

Verimatrix Enters Internet of Things Market with Cloud-based Platform to Secure Connected Devices and Services

Amsterdam, IBC 2017 (Booth #5.A59) – Sept. 11, 2017 – Verimatrix, the specialist in securing and enhancing revenue for network-connected devices and services, today announced its approach to the emerging internet of things (IoT) applications space with Vtegrity™. This new Verimatrix solution addresses the critical security gaps that exist with many current IoT services that fail to ensure the integrity of connected devices —both at initial deployment and over the subsequent application lifecycle.

Pages