This article comprises proprietary and confidential information and copyright material belonging to Adversign
Media GmbH. It must not be reproduced, used, published, or disclosed to third parties without the prior written consent of Adversign Media GmbH. The information in this document is subject to change without notice. All Trademarks acknowledged.
Name: viewneo security
Author: Application Development Department
Creator: André S. Uschmann
Role: Head of software development
Publication Date: 10/21/2016
Purpose of this document
This document describes some of the security related measures of the viewneo digital signage system.
Network communication between viewneo player and viewneo cloud
Viewneo players connect to the viewneo cloud to fetch configuration data and media files using HTTPS as the application communication layer. All network connections between players and the viewneo cloud are encrypted using a secure TLS connection with a key-length of 2048 Bit.
Communication Protocol: HTTPS
TLS Version: 1.2
Key Length: 2048 Bit
Access to account specific resources
All resources like players, playlists, uploaded media files or content which is created using the viewneo template builder are bound to a specific viewneo account. A user needs to authenticate on the viewneo cloud before accessing the resources of his account. Viewneo players need to authenticate on the viewneo cloud server before access to account specific resources like uploaded videos or images is granted. All players can just download resources of the corresponding account.
Real time monitoring
Systems are monitored with predefined rules and will show any breach on the system stability. As a best practice, we do the monitoring from a Remote location (France) to our servers. The monitoring data is generated shared inside the VPN.
All our managed services are checked with our automation system and triggered to install the latest security patches as soon as they release.
The objective of change management in this context is to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes to control IT infrastructure, in order to minimize the number and impact of any related incidents upon service.
Unique User IDs
No root accounts on the servers has direct access, we use unique UID for all our operations on the servers. ITIL strongly advises that all the operations can be tracked with the defined authentication and Identification tokens. We can track all our users operational history for the last 6 months as a standard.
Encryption of data
Any data that is transmitted from the server for backbone purposes (Backup, Automation, Management, Patch Management, Updates) are transferred via encrypted secure lines. None of the information is plaintext and human readable form.