
Build Your Audio Fortress 09 Aug 2017 --
Managing Audio-over-IP System Security There have always been security concerns with audio in commercial applications. Back when tape was the go-to medium, for example, keeping a close eye on who had access to the storage facility was important to stop people tampering with, or stealing, a record company's masters. Similar media-management concerns are real in the digital domain. In fact, threats of data theft are multiplied due to the ability to share Gigabytes with the world in seconds. So despite the significant practical benefits of modern audio-over-IP systems, there are completely new security concerns to consider, and best practices to adopt.
This article will help to identify the potential security shortcomings - whether accidental or malicious - of your audio-over-IP system, and suggest ways to limit your system's exposure to user slip-ups and bad actors alike.
Step One: Simple Common Sense
Despite the advanced technological nature of a networked audio system, the first step in maintaining secure and stable operation is a human one, according to Will Hoult, Focusrite's Product Manager for Commercial and Professional Audio. Access to any audio system should be managed using a common-sense approach. In an analogue studio scenario, the connections between rooms and devices are made using physical patch cables. If I was operating in control room #1 and saw that the live room was patched to control room #2, I would first check to see if someone else was using them before pulling the patch cables out of the panel. Only when I was sure that I could re-patch audio without affecting others' workflows would I start unplugging cables. This kind of process should also happen in a digital system, where all operators accessing the system follow the same procedure.
Assuming everyone abides by the rules, the vast majority of audio interruptions can be avoided. But that's easier said than done, especially when you have a large facility and lots of operators accessing the audio network at the same time.
Audio-over-IP systems have the huge advantage of multi-user interoperability, but with that comes several potential security pitfalls. Steps can be taken to control who can access mission-critical audio data.
Controlling Users & Permissions
One of the main benefits of a networked audio system is that it allows multiple users to easily access the same audio, and process it independently of others. So it's not hard to imagine a situation where in-use audio is mistakenly re-routed or accidentally remotely controlled.
There are several failsafes built into Dante - the protocol on which RedNet operates - that allow the user to limit access to mission-critical functions, as Will Hoult explains. With Dante Firmware v3.10 and Dante Controller v3.10 and later, Audinate has implemented a PIN lock feature, where a four-digit code needs to be entered before changes can be made. Lockable functions include routing settings, sample-rate changes, remote controlled reboot of devices, and network settings changes. All these are crucial for uninterrupted audio.
The lock feature in Dante Controller v3.10. A four-digit PIN is required to change the settings of locked devices. (Image: www.audinate.com.)
The lock function itself is not immune to disruption though. For example, if one user has finished their session with their routing setup locked, the proceeding user will see locked units that are not being used. It's here where human intervention and pre-agreed system-access procedures are important, especially on a network spread over a wide geographic area. (On a fibre-optic network, Dante-connected devices can operate kilometers apart.)
The best practice in this case, says Hoult, is to assume that, if a routing is locked, it's in use. If you suspect someone forgot to unlock it, then you follow a simple communication procedure - maybe a phone call or text message - before making changes.
Wall-in Your Audio Network
Locking Dante's routing functions is one way to avoid accidental mis-clicks by authorised network users. But you may want to keep entire sections of your network off-limits, to prevent people with malicious intent accessing your audio. This is especially appropriate in applications where the audio content is sensitive - think confidential commercial and governmental applications, and high-profile music and film projects. The key here is keeping the data out of reach, while maintaining the flexibility of the multi-user system.
You wouldn't install an Ethernet port in the reception area of your high-security data storage center
- Will Hoult, Focusrite
The first, most obvious, step is to keep bad actors away from network ports. The most basic thing is to restrict physical access to your network, says Hoult. You wouldn't install an Ethernet port in the reception area of your high-security data storage center, for example. So the first step is not to allow easy physical access to your network.
This might be easier said than done, especially in places with lots of people supposed' to be there, such as a film set. You might have a legitimate reason to be in a room, but not to be on the network. So the next thing we can do after limiting the number of physical ports is to control who gains access to the network itself. We can implement username and passwords to grant permission to a controlled list of users. We can also ring-fence the audio equipment on a Virtual Network, and control permissions using an Access Control List (ACL). That's a very simple networking implementation; it's part of Internet Protocol (IP), so an IT department would be capable of setting that up. (Check out Audinate's white paper titled Audio-Over-IP from an IT Manager's Perspective'.)
Network s
Most recent headlines
05/01/2027
Worlds first 802.15.4ab-UWB chip verified by Calterah and Rohde & Schwarz to be ...
01/06/2026
January 6 2026, 05:30 (PST) Dolby Sets the New Standard for Premium Entertainment at CES 2026
Throughout the week, Dolby brings to life the latest innovatio...
01/05/2026
January 5 2026, 18:30 (PST) NBCUniversal's Peacock to Be First Streamer to ...
01/04/2026
January 4 2026, 18:00 (PST) DOLBY AND DOUYIN EMPOWER THE NEXT GENERATON OF CREATORS WITH DOLBY VISION
Douyin Users Can Now Create And Share Videos With Stun...
31/01/2026
Spotify's annual Best New Artist celebration returned to Los Angeles last ni...
31/01/2026
The Navy's Air Test and Evaluation Squadron (HX) 21 launch a Long Range Attack Missile from an AH-1Z off coast of Virginia in late 2025. This demonstration ...
31/01/2026
DigitalGlue, creator of the award-winning creative.space Platform, has announced the release of creative.space OS 3.0.5, the latest software update within the ...
31/01/2026
ES Broadcast Hire, the long-established hire arm of ES Media Group, has spent the last few months busily preparing and sending out high-quality equipment for a ...
31/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
31/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
31/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
31/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
30/01/2026
Top L-R: The Friend's House is Here, Josephine, The Lake, Bedford Park, Who Killed Alex Odeh?
Second Row L-R: Take Me Home, American Pachuco: The Legend of...
30/01/2026
Spotify, Haziran ay sonunda kadar stanbul'da yeni bir ofis a aca n ve T rkiye pazar n y netmek zere yeni bir atama ger ekle tirdi ini duyurdu. Bu kaps...
30/01/2026
The Artemis II wet dress rehearsal will simulate the launch countdown, fully loading fuel and verifying systems ahead of the first SLS and Orion crewed flight....
30/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
30/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
30/01/2026
Grass Valley , the leading technology provider for live production solutions, and NETGEAR Inc. (NASDAQ: NTGR), a global leader in network solutions, today anno...
30/01/2026
tvONE, a leading video processor, signal distribution technology and media server developer, announces the expansion of Amit Singh's role to Regional Sales ...
30/01/2026
With a career that spans four decades across television, film and post-production, Freelance Sound Designer and Post-production Sound Mixer Mike Aiton has built...
30/01/2026
DPA Microphones will feature its new, fully integrated wireless microphone ecosystem, designed to let audio professionals work faster, cleaner and with total co...
30/01/2026
As the Middle East continues to accelerate investment in next-generation media, broadcast, and immersive content technologies, Ventum Tech today announced a str...
30/01/2026
Mark Roberts Motion Control (MRMC), a Nikon company and global leader in robotic camera systems, today announced its participation at Integrated Systems Europe ...
30/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
30/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
30/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
30/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
30/01/2026
Boston Conservatory at Berklee Hosts the National Opera Association's 2026 C...
30/01/2026
Student Spotlight: Sriram Narayanan The classical pianist shares his experience growing up with a language disability and finding his voice through music.
Ja...
30/01/2026
Heading into 2026, the pace of change across radio, TV, and digital media is reaching an inflection point. Audience behaviors continue to evolve, measurement mo...
30/01/2026
30 Jan 2026
VEON Partners with MindBridge to Enhance Financial Analytics, Audit...
30/01/2026
Introducing the NEW Techtel.tv! | FEB 5% OFF Offer
30 Jan Written By Suzanne Costello
Our Website & Online Store: Now Unified for a Seamless Experience.We...
30/01/2026
Friday 30 January 2026
Easels at the ready! All new judging line up for series ...
30/01/2026
Friday 30 January 2026
Britain can switch off terrestrial TV in the 2030s, with...
30/01/2026
Back to All News
The Danish Crime Series The Asset' Returns for a Second Season
Entertainment
30 January 2026
GlobalDenmark
Link copied to clipboard
...
30/01/2026
Two key themes came through strongly:
Inconsistent measurement remains a major barrier to comparing performance across Retail Media Networks
Independent cer...
29/01/2026
The National Film and Video Foundation (NFVF), in collaboration with a distribut...
29/01/2026
Michele Fracchiolla Succeeds Andrew Barr as President of EMEA region from April 1, 2026
London, January 29, 2026
Hitachi Europe Ltd. today announces the appoi...
29/01/2026
MELBOURNE, Fla., January 29, 2026 - L3Harris Technologies (NYSE: LHX) reports fu...
29/01/2026
Bluey' Wins Second Consecutive Top Streaming Title of the Year with 45 Billi...
29/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
29/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
29/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
29/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
29/01/2026
Share Share by:
Copy link
Facebook
X
Linkedin
Bluesky
Email...
29/01/2026
Boston Conservatory Orchestra Presents East Coast Premiere of Peter and Leonardo...
29/01/2026
29 Jan 2026
Kyivstar Announces Pricing of Secondary Offering of Common Shares Held by VEON NEW YORK, New York, January 29, 2026 -- VEON Ltd. (Nasdaq: VEON), a ...
29/01/2026
Mercedes-Benz is marking 140 years of automotive innovation with a new S-Class b...
29/01/2026
X-Rite Pantone Appoints Cindy Cooperman as Vice President and General Manager of...
29/01/2026
New two-part true crime documentary, OUTBACK TERROR: THE FALCONIO MURDER, aims to shed new light on a case that continues to intrigue on both sides of the world...