Cyber Security Services

Providing the same Cyber Solutions the Military Use


In 2008, Zeus was introduced to the military and provided asset management in support of the troops in Iraq and Afghanistan. This effort paved the way for Obor to provide full-time support personnel in war zones (In-theatre) including logisticians, satellite communications specialists, trainers and a host of high-end IT support personnel (System Admins, Network Engineers, and Cyber Specialists).

Obor Digital recognizes the importance of secure broadcast facilities and is now a Managed Security Service Provider (MSSP). We provide Cyber Security Solutions using the same technologies and personnel for the US government, US military and US allies. Obor Digital provides the best and most secure, safeguarding and protection of non-classified, and classified networks and critical data.

Many broadcasters purposely separate their broadcast networks from the traditional business IT infrastructure for security reasons with the hope of insulating their broadcast network from the dangers of “touching” the internet. However, often there are unseen “holes”, and every broadcast engineer will share at least one story where video was routed to a path that ultimately made it to air in a situation when no one ever thought it was even possible. Those same vulnerable holes exist in the IT network infrastructure.

Cyber Services Provided:

  • Vulnerability Assessment (VA)
  • Penetration Testing
  • Monitoring as a Solution
  • Security Device Management
  • Incident Response

Did you know?

TV Technology Magazine

We were published in TV Technology Magazine in December 2017 discussing Cyber Security Needs for Broadcasters. See the entire article HERE.

Three Main Threats for Broadcasters

Three serious threats to broadcasters include:

  • Theft of Content
  • Terrorist Media Replacement
  • Social End-User Accidents
Common Vulnerabilities

Vulnerabilities can be from one or more of the following:

  • External Threats – whereby an entity exploits one of the holes to gain entrance.
  • Internal Threats – whereby the breach is on the actual network itself.
  • Malicious Threats – whereby an entity purposely compromises the network to create damage.
  • Accidental Threats – whereby someone, without realizing they are damaging or creating a hole, does so.