Trust Boundary

Puts critical tools at the interconnection points in your network

Why it matters

Manage the edge between different network domains, such as studio and operator, to secure IP media operations. We have gathered all needed IP Media address translation, monitoring, traffic control, and security functions into one product simplifying IP media operation using technologies such as ST 2022-2 and ST 2022-6

Our solution is designed to solve common challenges in IP media networks, such as firewall jitter, network overloads, and quality issues.

RTP Media Proxy: Ensures trusted addressing and prevents address spoofing, while monitoring packet delay variation. Enables end-to-end hitless protection.

Flow Replication: Enables content distribution to many receivers in a non-multicast environment. Facilitates easy hand-off to multiple cloud environments.

Media Traffic Control: Constrains feeds to pre-determined flow sizes, prevents multicast and broadcast flooding, and limits media disruption.

Media Specific Firewall: Provides in-line monitoring of each media flow for fault detection and quality assurance. Mitigates against Denial-of-Service Attacks.

REST API: Allows easy and complete integration of Trust Boundary security features into your orchestration and operation systems.

Media Protection: Provides various protective measures depending on media content interruption. Supports any protection combination of FEC, A/B failover, or ST2022-7 hitless.

Media Monitoring: Offers in-line monitoring of each media flow for fault detection and quality assurance. Allows easy diagnosis of network issues.

TRUST BOUNDARY APPLIANCES

This is how our customers are using it

Our trust boundary appliances is solving the merging challenges for IT and Video departments when handling multiple streams in the same IP networks

1
2
3
4
1

Broadcaster needs to protect their network and adapt to their addressing. Also, convert the video specific to their internal operation.
•Band with control per stream with admission control
•Blocking unwanted traffic
•Adapt addresses to the internal structure
•Video format/encapsulation adaption
•Alignment and buffering
•Error processing such as handling speed differences and lost data

2

MSP needs to protect their network and adapt to their addressing.
Video specific adaptation
•Band with control
•Monitor per stream
•Adapt addresses to Service provider network

3

Potentially address adaptation

4

Broadcaster needs to protect their network and adapt to their addressing. Also, convert the video specific to their internal operation.
•Bandwidth control per stream with admission control
•Blocking unwanted traffic
•Adapt addresses to the internal structure
•Video format/encapsulation adaption
•Alignment and buffering
•Error processing such as handling speed differences and lost data

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9

Which Trust Boundary do you need?

Trust Boundary on ApplianceTrust Boundary on Nimbra IP Gateway
Trust Boundary functionsAll functionsAll functions
Other IP media and data functions (Media Pro App)Core functions (data services)Up to all functions (encoding-decoding, data services, IP conversion)
Video quality
Compressed
Uncompressed
Traffic typeST2022-2/6/7ST 2022-2/6/7, ST 2110
IntegrationPlug-and-playHighly customizable app configuration
VolumeUp to 40GBUp to 6x200GB
PackagingAppliance with pre-loaded software, flexible and easy to useAvailable as highly customizable app configurations, combined with multiple services for adapted and specialized workflows
GET IN TOUCHGET IN TOUCH