The more complex it is and the more people you work with, the more important security is.
Getting started
Have you ever experienced important files being leaked or damaged while working while exchanging emails with multiple people?
When translating large-scale content, we communicate with various workers, reviewers, and managers across nationalities. For content that can only be viewed before opening or for a fee, special attention must be paid to security to prevent piracy.
Let's take a look at content security, which is becoming increasingly important.
Content security technology
Various systems are in place to secure digital media content such as video and text. There are various areas where security technology is applied, such as authentication methods, copyright, networks, and data processing. Typical contents are as follows.
1) Double encryption
It is a technology that manages routes that can be accessed to content by setting double encryption between digital content and users. If the user authentication information identified in the security certificate, such as social accounts, emails, and contacts, does not match, the connection is blocked.
2) SSO login
Single sign-on (SSO) is a solution that allows users to log in to multiple websites and applications through one-time user authentication. In other words, you can automatically access and use various sites with just one login. In this way, when multiple systems use integrated authentication with user information such as a single ID/PW, it is easier to monitor and control user access, and data can be managed more securely.
3) DRM
Digital Rights Management (DRM) controls the use of digital content distributed by copyright owners and helps ensure that it is used only for its intended purpose. In order to protect the rights and interests of copyright holders, encryption technology that can protect content more securely is becoming more advanced.
Learn about security certifications
Are you worried about whether the IT solutions your company will use are safe from hacking and whether the security certification is correct? Before introduction, the safety of the product can be checked through the following certification procedures.
1) ISO certificate
The safety of services can be verified through ISO certification, which is a certification standard and standard established by the International Organization for Standardization. Since it receives an objective evaluation from a third-party certification body called KRM, the examination and certification process is very difficult, so it is a reliable certificate. The types of certificates related to IT solutions are as follows.
ISO/IEC 20000/ IT Service Management Systems
ISO/IEC 27017 Cloud Service Information Protection
ISO/IEC 27018 Cloud Service Information Protection
ISO/IEC 27001 Information Security Management
ISO/IEC 27701 Privacy
For more information on ISO certification Official website (click)Please check it out at!
2) Penetration testing (penetration testing)
It is a simulated cyber attack run by security professionals to find vulnerabilities in web applications, software, or networks. It can be viewed as a security activity to identify system vulnerabilities that can be exploited by hackers or attackers. External contractors or ethical hackers conduct tests from various angles, such as indiscriminate attacks and internal/external penetration, and reflect the results in security upgrades. In this way, it is possible to assess product risk and verify stability through penetration testing.
While finishing
Content translation and localization solution Letterworks has completed ISO 27001 (Information Protection Management System), ISO 27017 (Cloud Information Security Guidelines), ISO 27701 (Personal Information Protection Management System), and ISO 27018 (Cloud Privacy Protection) certifications, and has completed two web vulnerability tests by accredited organizations.
We have adopted the AWS cloud and DRM solutions for content security, and protect users' privacy through Auth0 login authentication. If you're curious about the security solutions Letterworks uses This note (click)Please read 😊
Good content to watch together
🔗 Video translation overview #1 6 steps to complete video translation
🔗 Video translation overview #3 How are SDH, CC, and Subtitle used separately in the industry?
🔗Video translation overview #4 How does Subtitling for the Deaf (SDH) work?
🔗 Video translation preview #5 Improve the quality of subtitle translation by assembling sentences.
🔗Video translation preview #6 Translation that makes use of character speech and speech
Editor l Kim Bomi
bomi.kim@twigfarm.net