Posted on January 17, 2022
Want to interview Gerry?Contact
Mention the phrase “movie pirating” and most people think of VPNs, proxies, bit torrents and similar workarounds that individuals deploy to get (read: steal) the movies and series they want, without paying for legitimate access. And there is no doubt that this kind of post-release piracy takes a serious toll on revenues of studios and broadcasters. But it’s far from the only – or even most serious – threat to studio profits.
As far back as 2014, Liye Ma, a marketing analytics professor at the University of Maryland Robert H. Smith School of Business, found that pre-release piracy reduces box office revenues by close to 20% more than when piracy occurred following release ¹. According to Ma, pre-release piracy is particularly harmful because the impact “comes disproportionately from individuals most passionate about and most interested in watching the movie.” Those who download a pirated copy before release are exactly the customers who are most enthusiastic, and who would almost definitely pay to view the content upon its release.
A lot has changed since Ma’s study, including huge declines in movie theater attendance due to the Covid pandemic and significant changes in how studio content is produced. Even before the pandemic, the industry was moving to more distributed models, using independent VFX studios to complement work done in-house. Work is increasingly cloud-based. And with connectivity – even to private clouds – comes danger of cyberattacks, breaches and ransomware attacks, as well as concern about accidental or malicious data exposure.
To address these concerns, the Motion Picture Association, along with the Content Delivery & Security Association, established the Trusted Partner Network as a way to certify VFX production houses as compliant with MPAA Best Practice Guidelines for Data Security.
While the TPN aims to provide “a cost-effective way to assess security preparedness […] against industry best practices,” implementing the necessary technologies in-house can challenge the budgets and capabilities of smaller production studios. In the words of one studio head, who posted on Reddit, “It’s a major pain and more expensive than ever” due to requirements such as, “Cameras at every entrance and exit, air-gapped internet, a DMZ for ingestion and delivery of work, significant backups and off-site storage” and more. Others chimed in with tales of how inconvenient, impractical and slow their air-gapped internet solutions are.
While we can’t do much about cameras, Ericom has good news for VFX studios that require TPN certification, and whose users are frustrated by slow internet air-gapping solutions that deliver jagged visuals and a generally poor user experience. Or, even worse, studios that doubly frustrate users by permitting no access at all from production devices.
With Ericom Software’s ZTEdge Web Isolation, users enjoy a completely natural browsing experience using their regular browsers. Rigorous, granular policy-driven controls protect valuable content and IP, while also safeguarding workstations and networks from ransomware and phishing – all in full compliance with MPA Content Protection Best Practices.
Technology-forward VFX production houses have adopted ZTEdge Web Isolation to enable TPN-compliant security, while allowing the internet access their users need to be most productive. To learn more about how ZTEdge Web Isolation can reduce the security burden on your users, download our Guide to Zero Trust Web Isolation for Film, Animation, and Visual Effects Company Trusted Partner Network (TPN) Programs now, or visit our Solutions Page for the film industry.
¹An Empirical Analysis of the Impact or Pre-Release Movie Piracy on Box Office Revenue, in Informations Systems Research
Phishing soared in 2021, building on a record-breaking 2020. Variations leading the growth included “smishing,” “vishing” and malicious social media.
The LAPSUS$ cybercrime gang gained access to T-Mobile’s VPN simply by purchasing initial access from a site that sells access to compromised systems.
RBI stops steganographic attacks, in which malware is concealed within the code of images or other presumably innocent content, in ways that AV/firewalls cannot detect.