Streaming Video Protection & Business Video Hosting Security

We upgrade your video hosting security.

Business Video Hosting Security

Services, Practices, and Protection Policies

Last updated 2015-05-02

We lock down your video hosting data. We protect our client and proactively protect our video network.

Secure large video archives, real time live webcasts, streaming video to mobile applications, large file downloads, and site assets like images and javascript. All your multimedia is written to multiple disks instantly, backed up daily, and stored in key Points of Presence that make up our CDN footprint. Files that our clients upload are stored on clusters of racks in fiber peering datacenters near the Internet Exchange Points. GravLab uses transparent caching in physical data centers and GeoIP to remove bottlenecks and points of failure.


You own your video. You control distribution. We keep it that way.


HTTPS: SSL links to your video hosting services buys you encrypted and authenticated HTTPS access. We can do that.
Authentication: RTMPE, Token authentication, SWF authentication: restrict viewers by IP, TTL, URL, location, or referrer.
We can automatically encrypt secure Apple HLS encoding with https:// delivery. Read more details about encrypted HTTP Live Streaming using HTTPS at


We understand mobile video security

Do you know the top 10 mobile security risks?

» Insecure Data Storage
» Weak Server Side Controls
» Insufficient Transport Protection
» Client Side Injection

Read more about mobile video hosting security from GravLab, including mobile security tips that can help you reduce the risk.

We safeguard your billing, business and personal information

All credit card transactions are processed using SSL : the same level of encryption used by leading banks. Card information is transmitted, stored, and processed securely on a PCI-Compliant network. We do not email you with solicitations, and we do not confirm or deny we work with any clients without their explicit written permission.


That’s not all we do to protect our clients:

When you delete a file from our CDN, you really delete it, forever. Not only do we overwrite your CDN storage allocation using random data, we use 5220.22-ME and U.S. DoD 5220.22-MECE standards from the US Department of Defense. All deletions are logged in details upon request. We respect your business, and we respect your trust enough to earn it.

Video CDN and Hosting Security Services

GravityLab provides managed hosting security, mobile video risk and compliance, streaming video authentication, token identity and access management services. We’ve always been ahead of the curve with video security, and proactive, preventative diligence are now critical to the delivery of enterprise-class streaming and mobile video.


We update and patch our CDN and video apps same-day

Software deployments must be updated regularly with security patches to new exploits. Our products run on a dedicated network which is protected with sophisticated firewalls and carefully monitored. Video security perfection is a moving target, but we work with security researchers to keep up with the state-of-the-art in web security.

We are a good fit for many of our clients because their IT staff is already overburdened, and streaming media video delivery requires learning unique skill sets and troubleshooting knowledge. By working with GravityLab you can know the CDN, the servers, the applications are monitored and secure, and your video assets are highly available worldwide because they are cached at the IXP’s (



Have questions about video hosting security?

Drop us a quick note and we will respond to your security needs or questions as fast as possible. Use our secure contact form here.


Interested in learning more about improving your operational and business video hosting security?

The Electronic Frontier Foundation (EFF) has created this Surveillance Self-Defense site ( to educate the American public about the law and technology of government surveillance in the United States, providing the information and tools necessary to evaluate the threat of surveillance and take appropriate steps to defend against it. Topics include: