Guarantee security and flexibility at the boundary of your media network

Regain Security, Control & Predictability – where you connect to foreign media networks

OVERVIEW

Trust Boundary puts critical tools at the interconnection points in your network

The Trust Boundary Appliance simplifies the installation and configuration for Trust Boundary application to manage the edge between different network domains, such as studio and operator, to secure IP media operations. We have gathered all needed IP Media address translation, monitoring, traffic control, and security functions into one product simplifying IP media operation using technologies such as       ST 2022-2 and ST 2022-6

The Net Insight Trust Boundary Appliance is the first solution implementing features from SMPTE RP2129 and delivers several mission-critical features in one single platform, such as real-time Media firewall, IP media monitoring, media protection, traffic control, and flow replication.

It comes pre-loaded with functions removing the complexity of non-media-specific solutions, and can be deployed in combination with any enterprise firewall to deliver carrier-grade media capabilities to media and enterprise industry players. 

The first security and control point in the market that is specifically designed for capacity up to 40 Gbps

Do you have issues with your firewall adding jitter and interruptions to your media flows? have outages due to network overloads? struggle determining the source of quality issues in your IP media network? face challenges adapting between IP media domains e.g. unicast to multicast, IGMP versions or IP addressing?

RTP Media Proxy

What it does

  • The Trust Boundary only treats RTP and UDP traffic
  • The Trust Boundary RTP Media proxy establishes trusted addressing and prevents all types of adress spoofing
  • Packet Delay Variation (PDV) is monitored.  Configurable PDV buffers are available on every flow
  • Maintain RTP headers through the Trust Boundary to enable end-to-end 2022-7 hitless protection

Why it matters

  • The RTP proxy adapts IP management to video flow logic
  • It constrains IP management, simplifying & securing the relevant feauteres for IP media

Flow Replication

What it does

  • IP Flow replication can best be compared to an SDI distribution amplifier
  • Create multiple unicast replication when multicast is not available in one network
  • RTP headers are maintained across replications to enable end-to-end 2022-7 hitless protection

Why it matters

  • Send content easily to many receivers in a non multicast environment
  • Easy hand-off to multiple cloud environments for instance OTT, production and play-outs

Media Traffic Control

What it does

  • Constrain feeds to pre-determined flow sizes
  • Media flood control (predictable and strictly defined)
  • Prevent multicast and broadcast flooding – every admitted packet is part of a rate limited flow.
  • Safety tools for crossing between IGMP networks

Why it matters

  • Adapt IP network overflow behaviour to work for media
  • Prevent propagation of overflows limting media disruption

Media Specific Firewall

What it does

  • In-line monitoring of each media flow for fault detection and quality assurance  
  • Combined network and video monitoring  
  • Network integrity monitoring including packet loss/out of order and jitter
  • Video monitoring including TR 101 290 P1, missing audio detection, black screen
  • Enumerate unconfigured unknown flows

Why it matters

  • Unwanted traffic is prevented from crossing the Trust Boundary
  • Simple, intuitive logic for setting up media services – pre-configuration is made easier
  • Manage clashing IP addressing between entities
  • Mitigates against Denial-of-Service Attacks

REST API

All functions in the Trust Boundary appliance are accessible and controllable by REST API

Why it matters

  • Integrate security features of your Trust Boundary into your orchestration and operation systems – easaily and feature complete
  • Foundation for control of the Trust Boundary application

Media Protection

What it does

  • Add or terminate forward error correction (ST 2022-1, 5)
  • Seamless emit & merge (ST 2022-7)
  • Differential path delay of up to 1 second (+/- of 500ms) (ST 2022-7)
  • Primary and secondary paths could be a mix of long-haul fibre or satellite plus fibre
  • A/B  protection switch based on RTP, ETR 101 290, audio/video parameters

Why it matters

  • Add any protection needed for your media content at the rim downstream network 
  • Receive protected flows from any network securing quality upstream 
  • Support any protection combination of FEC, A/B failover or ST2022-7 hitless. 
  • Protective measures depending of media content interruption (missing audio, black screen, TR101290 thresholds etc.)

Media Monitoring

What it does

  • In-line monitoring of each media flow for fault detection and quality assurance  
  • Combined network and video monitoring  
  • Network integrity monitoring including packet loss/out of order and jitter 
  • Video monitoring including TR 101 290 P1, missing audio detection, black screen.   
  • Enumerate unconfigured unknown flows.
  • Easily diagnose network issues with Wireshark compatible PCAPs 

Why it matters

  • Easily detect network issues and supervise SLA conformance. 
  • Visibility including media content problems 
  • Monitor at the critical connection point between network domains 
  • Monitoring can drive corrective actions in Trust Boundary. 

TRUST BOUNDARY APPLIANCES

This is how our customers are using it

Our trust boundary appliances is solving the merging challenges for IT and Video departments when handling multiple streams in the same IP networks

1
2
3
4
1

Broadcaster needs to protect their network and adapt to their addressing. Also, convert the video specific to their internal operation.
•Band with control per stream with admission control
•Blocking unwanted traffic
•Adapt addresses to the internal structure
•Video format/encapsulation adaption
•Alignment and buffering
•Error processing such as handling speed differences and lost data

2

MSP needs to protect their network and adapt to their addressing.
Video specific adaptation
•Band with control
•Monitor per stream
•Adapt addresses to Service provider network

3

Potentially address adaptation

4

Broadcaster needs to protect their network and adapt to their addressing. Also, convert the video specific to their internal operation.
•Bandwidth control per stream with admission control
•Blocking unwanted traffic
•Adapt addresses to the internal structure
•Video format/encapsulation adaption
•Alignment and buffering
•Error processing such as handling speed differences and lost data

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9

WHY OUR TECHNOLOGY

We take responsibility

Highest performing global leader in media network.

  • Net Insight provides the highest performing, most open video transport and media cloud technology.

  • Net Insight partners with hundreds of customers in over 70 countries to manage media flows across.

  • We combine cutting-edge technology, robust platforms and decades of proven expertise to make it happen.

“We were looking for a provider that understood video over IP. Net Insight was the ideal partner. Net Insight cares about what we put in the pipe not just how the pipe works.

ADDE GRANBERG

Director of technology, CTO, at SVT

Looking to create secure, high-quality, low-latency live video workflows with the right network?

We can help!