Customers

Obor Digital Key Customers


  • A&E Networks
  • AIS Engineering
  • BBC America
  • BellTV
  • Bio. Channel
  • Cooking Channel
  • DataPath
  • Discovery Channel Networks
  • DIY Network
  • DRS/li>
  • E! Entertainment Network
  • Fit TV
  • FLIX
  • Food Network
  • Fox
  • G4 Network
  • GAC (Great American Country)
  • General Dynamics
  • Georgia Public Broadcasting
  • Globecom
  • Golden Living
  • Golf Channel
  • Hilton
  • History Channel
  • Home and Garden Network (HGTV)
  • Houston Livestock Show and Rodeo
  • HSN (Home Shopping Network)
  • KERA
  • Lifetime Networks
  • Madison Square Garden
  • Missouri State University
  • NATO
  • New England Sports Network (NESN)
  • News 12
  • NBC
  • NPR
  • Northern Kentucky University
  • Oregon Public Broadcasting Service
  • PBS
  • QVC US
  • QVC France
  • QVC Germany
  • QVC Italy
  • QVC Japan
  • QVC UK
  • Raytheon
  • Rockwell-Collins
  • Rogers Communications
  • Santa Clara University
  • Science Channel
  • Seagram's
  • Showtime Networks
  • S.I. Newhouse School of Public Communication, Syracuse University
  • Sky Racing
  • Southern Illinois University
  • SNAP
  • SWAN
  • Syracuse University College of Visual and Performing Arts
  • Tampa Microwave
  • TeleCommunication Systems
  • The Learning Channel
  • The Military Channel
  • The Movie Channels
  • Time Warner Sports
  • Tulane University
  • Travel Channel
  • University of Alabama
  • University of Central Florida
  • University of New York, Oswego
  • University of Wyoming
  • Univision Communications Inc.
  • U.S. Army
  • U.S. Marine Corps
  • Vermont Public Broadcasting Service
  • ViaSat
  • World Wrestling Entertainment (WWE)

Did you know?

TV Technology Magazine

We were published in TV Technology Magazine in December 2017 discussing Cyber Security Needs for Broadcasters. See the entire article HERE.

Three Main Threats for Broadcasters

Three serious threats to broadcasters include:

  • Theft of Content
  • Terrorist Media Replacement
  • Social End-User Accidents
Common Vulnerabilities

Vulnerabilities can be from one or more of the following:

  • External Threats – whereby an entity exploits one of the holes to gain entrance.
  • Internal Threats – whereby the breach is on the actual network itself.
  • Malicious Threats – whereby an entity purposely compromises the network to create damage.
  • Accidental Threats – whereby someone, without realizing they are damaging or creating a hole, does so.