Product
OverviewVideo​Graphic​Document​
Enterprise
Story
LETR / TECH noteNews / Notice​
Pricing
En
한국어English日本語日本語
User guide
Getting started
한국어English日本語
한국어English日本語
Video translation #2 How much do you know about content security?
2024-07-04

The more complex it is and the more people you work with, the more important security is.

‍

Getting started

Have you ever experienced important files being leaked or damaged while working while exchanging emails with multiple people?

When translating large-scale content, we communicate with various workers, reviewers, and managers across nationalities. For content that can only be viewed before opening or for a fee, special attention must be paid to security to prevent piracy.

Let's take a look at content security, which is becoming increasingly important.

‍

Content security technology

‍

Various systems are in place to secure digital media content such as video and text. There are various areas where security technology is applied, such as authentication methods, copyright, networks, and data processing. Typical contents are as follows.

‍

1) Double encryption

It is a technology that manages routes that can be accessed to content by setting double encryption between digital content and users. If the user authentication information identified in the security certificate, such as social accounts, emails, and contacts, does not match, the connection is blocked.

‍

2) SSO login

Single sign-on (SSO) is a solution that allows users to log in to multiple websites and applications through one-time user authentication. In other words, you can automatically access and use various sites with just one login. In this way, when multiple systems use integrated authentication with user information such as a single ID/PW, it is easier to monitor and control user access, and data can be managed more securely.

‍

3) DRM

Digital Rights Management (DRM) controls the use of digital content distributed by copyright owners and helps ensure that it is used only for its intended purpose. In order to protect the rights and interests of copyright holders, encryption technology that can protect content more securely is becoming more advanced.

‍

Learn about security certifications

‍

Are you worried about whether the IT solutions your company will use are safe from hacking and whether the security certification is correct? Before introduction, the safety of the product can be checked through the following certification procedures.

‍

1) ISO certificate

The safety of services can be verified through ISO certification, which is a certification standard and standard established by the International Organization for Standardization. Since it receives an objective evaluation from a third-party certification body called KRM, the examination and certification process is very difficult, so it is a reliable certificate. The types of certificates related to IT solutions are as follows.

ISO/IEC 20000/ IT Service Management Systems
ISO/IEC 27017 Cloud Service Information Protection
ISO/IEC 27018 Cloud Service Information Protection
ISO/IEC 27001 Information Security Management
ISO/IEC 27701 Privacy

For more information on ISO certification Official website (click)Please check it out at!

‍

2) Penetration testing (penetration testing)

It is a simulated cyber attack run by security professionals to find vulnerabilities in web applications, software, or networks. It can be viewed as a security activity to identify system vulnerabilities that can be exploited by hackers or attackers. External contractors or ethical hackers conduct tests from various angles, such as indiscriminate attacks and internal/external penetration, and reflect the results in security upgrades. In this way, it is possible to assess product risk and verify stability through penetration testing.

‍

While finishing

Content translation and localization solution Letterworks has completed ISO 27001 (Information Protection Management System), ISO 27017 (Cloud Information Security Guidelines), ISO 27701 (Personal Information Protection Management System), and ISO 27018 (Cloud Privacy Protection) certifications, and has completed two web vulnerability tests by accredited organizations.

We have adopted the AWS cloud and DRM solutions for content security, and protect users' privacy through Auth0 login authentication. If you're curious about the security solutions Letterworks uses This note (click)Please read 😊

‍

Good content to watch together

🔗 Video translation overview #1 6 steps to complete video translation

🔗 Video translation overview #3 How are SDH, CC, and Subtitle used separately in the industry?

🔗Video translation overview #4 How does Subtitling for the Deaf (SDH) work?

🔗 Video translation preview #5 Improve the quality of subtitle translation by assembling sentences.

🔗Video translation preview #6 Translation that makes use of character speech and speech

‍

‍

Editor l Kim Bomi
‍
bomi.kim@twigfarm.net

‍

✏️콘텐츠 번역&현지화, 한 곳에서 해결하세요.

• 내 콘텐츠 안전하게 번역하기(클릭)
• 월간 소식지로 더 많은 이야기 읽어보기 💌

‍

View all blogs

View featured notes

LETR note
Introducing the Universe Matching Translator and AI Dubbing Technology
2025-06-30
WORKS note
Leveraging VTT Solutions for Video Re-creation
2025-06-27
LETR note
Comparing Google Gemini and LETR WORKS Persona chatbots
2024-12-19
User Guide
Partnership
Twigfarm Co.,Ltd.
Company registration number : 556-81-00254  |  Mail-order sales number : 2021- Seoul Jongno -1929
CEO : Sunho Baek  |  Personal information manager : Hyuntaek Park
Seoul head office : (03187) 6F, 6,Jong-ro, Jongno-gu,Seoul, Republic of Korea
Gwangju branch : (61472) 203,193-22, Geumnam-ro,Dong-gu,Gwangju, Republic of Korea
Singapore asia office : (048581) 16 RAFFLES QUAY #33-07 HONG LEONG BUILDING SINGAPORE
Family site
TwigfarmLETR LABSheybunny
Terms of use
|
Privacy policy
ⓒ 2024 LETR WORKS. All rights reserved.