SlideShare a Scribd company logo
1 of 22
Download to read offline
Options And Security
Measures - Personalized
Videos
© 2016 SEZION DIGITAL, S.L. CONFIDENTIAL DOCUMENT.
OBJECTIVES
1. Context.
2. Structure of a personalized
video and its process of
creation.
3. Security measures with Sezion’s
integrations.
4. Security measures with Sezion’s
API.
5. Security credentials.
6. Access and management of
videos.
7. Management of video data.
● Describe the security
measures and options of
videos created by Sezion, as
well as information linked to
them.
Context
This document will help you understand how a personalized video is created, how
the information used for its creation is handled and what happens once it’s been
generated. Remember:
● Our clients decide what happens with the videos.
● We do not have access to the password on the accounts in our platform. We
only access these accounts with the end user’s consent.
● Debugging logs are only accessible by our sysadmins for troubleshooting
purposes.
Structure of a personalized video
and its process of creation.
Anatomy of a personalized video
Each video is created from a template that defines elements and triggers used to
generate the video. Said template contains Dynamic Media where information
will be inserted from a data base. Each video is an independent file plus its
specific metadata.
Security Measures For Our
Integrations With Zapier
Zapier is our integration partner that helps us connect Sezion with more than
500 business tools. It’s a powerful tool used by companies such as Adobe and
Fox, which means they take security very seriously.
Most Important Facts:
● Zapier login credentials are one-way PBKDF2 hashes with a workload of
about 10000 iterations.
● Zapier only executes the required actions to complete the zaps you
configure.
● The requests that Zapier makes to other services on your behalf are stored
for 7 days to then be purged.
Security with integrations through Zapier
● Your task history is stored for some time to help you monitor your activity
and reproduce actions that were not carried out.
● Your credentials to external services (such as Sezion’s API, Salesforce or
Hubspot) are stored by Zapier using AES encryption.
● All debugging registries require account credentials (API keys, tokens, etc)
so they’re not accessible in raw registry requests.
Security with integrations through Zapier
● Low level raw registry requests
are stored for 7 days in the task
history .
● Zapier will use HTTPS or SSL
encrypted connection whenever
possible (via the API and
external services)
Security with integrations through Zapier
Sezion’s API security measures
Sezion’s services are used by companies such as Bosch (BSH), Pandora or
JamesAllen to create personalized videos and integrate them in their marketing
and sales strategies.
Most Important Facts:
● All information going through Sezion’s API is fully encrypted (SSL).
● We can also, at an extra cost, use specific SSL certificates when needed, in
complete independent environments.
Sezion’s API usage
Security credentials
Most Important Facts:
● Sezion doesn’t have access to client’s accounts, unless expressly granted by
our clients for authorized support.
● All Sezion accounts have multiple layers of security depending on the
required access:
○ Web login: User and Password, SHA.
○ API: Tokens.
○ API: Account ID & Account Secret.
○ Template: Template ID & Template Secret.
○ Video: Video ID.
Security credentials
Esquema de acceso
User & password
Account ID & Account Secret
Template ID & Template
Secret
Video ID
Sezion ID
Access and management of videos
Most Important Facts:
● All videos have a unique identifier that can be accessed through the user
account and the API.
● To get access via API the Account Secret, Account ID and Video ID will be
required (when accessing multiple versions of a single video) and Sezion ID
(when dealing with a single file).
● A video can deleted through the API (Video_Delete) or manually through the
Sezion interface.
● The method of distribution of a video to use is up to the client. Each video
has a unique identifier and can have custom metadata, which can be used,
for example, to tie a video with the ID of a person in a CRM.
Access and management of videos
Example of video identification
Video ID:
12345678bhj1244
John
A video can also have custom metadata fields. For example, “email” or “Client ID”
as identifiable fields between a video and a person.
Most Important Facts:
● The videos created with a template can be hosted on any of the following
platforms and under the following security options:
○ Sezion (Microsoft Azure): Links are programmed to be generated each time a video is
requested through the API. These links expire automatically after 10 minutes.
○ Amazon S3: Sezion uploads videos to the specified bucket privately, so the certificates of the
destination bucket must be programmed to be changed or manually changed. Once
uploaded to AWS S3, videos are deleted from Sezion.
○ YouTube: Sezion uploads videos privately to the specified YouTube channel, hidden or
public, depending on the selected configuration. Once uploaded to YouTube, videos are
deleted from Sezion.
○ Any hosting platform: Through Sezion’s API you can create an integration with any platform
and specify what will happen once videos are uploaded to said platform.
Hosting and distribution of a video
Videos access scheme and distribution
Data
Sezion creates a
personalized video
automatically
Azure
AWS S3
YouTube
Programmed root
links
Videos uploaded
privately; client
chooses policy
Videos uploaded
hiddenly; private or
public
Integration Client decides
Root links expire
(use Video_Get)
Videos deleted from
Sezion once
uploaded to the
bucket
Videos deleted from
Sezion once
uploaded to
YouTube
Client decides
Encrypted Data
Video data management
Most Important Facts:
● All Dynamic Media (texts, images, videos and personalized audio in a video)
are stored temporarily during the creation of the video and automatically
deleted once the video has been generated.
● The information of a generated video can be accessed through the API,
through Webhook or a web interface (limited to technical information and
basic metadata).
● The Webhooks support HTTP authentication, Basic or Digest, with
username and password
Video data management
Remember: If you need help, feel
free to contact your account
manager :-)
Or email us at help@sezion.com

More Related Content

Similar to Personalized Video Security and Options

Enhanced Video Experience in SharePoint 2013
Enhanced Video Experience in SharePoint 2013Enhanced Video Experience in SharePoint 2013
Enhanced Video Experience in SharePoint 2013Mai Omar Desouki
 
Microsoft Stream - The Video Evolution
Microsoft Stream - The Video EvolutionMicrosoft Stream - The Video Evolution
Microsoft Stream - The Video EvolutionColin Phillips
 
API Services: Building State-of-the-Art APIs
API Services: Building State-of-the-Art APIsAPI Services: Building State-of-the-Art APIs
API Services: Building State-of-the-Art APIsApigee | Google Cloud
 
Data-Saturday-10-Sofia-2021 Azure Video Indexer- Advanced data extraction fro...
Data-Saturday-10-Sofia-2021 Azure Video Indexer- Advanced data extraction fro...Data-Saturday-10-Sofia-2021 Azure Video Indexer- Advanced data extraction fro...
Data-Saturday-10-Sofia-2021 Azure Video Indexer- Advanced data extraction fro...Luis Beltran
 
Deep Dive - Amazon Kinesis Video Streams - AWS Online Tech Talks
Deep Dive - Amazon Kinesis Video Streams - AWS Online Tech TalksDeep Dive - Amazon Kinesis Video Streams - AWS Online Tech Talks
Deep Dive - Amazon Kinesis Video Streams - AWS Online Tech TalksAmazon Web Services
 
AWS Chicago user group meetup on June 24, 2014
AWS Chicago user group meetup on June 24, 2014AWS Chicago user group meetup on June 24, 2014
AWS Chicago user group meetup on June 24, 2014CloudCamp Chicago
 
Divya Jain at AI Frontiers : Video Summarization
Divya Jain at AI Frontiers : Video SummarizationDivya Jain at AI Frontiers : Video Summarization
Divya Jain at AI Frontiers : Video SummarizationAI Frontiers
 
Kaltura Inspire Webinar: API Driven Video Platform - The Key to Scalability a...
Kaltura Inspire Webinar: API Driven Video Platform - The Key to Scalability a...Kaltura Inspire Webinar: API Driven Video Platform - The Key to Scalability a...
Kaltura Inspire Webinar: API Driven Video Platform - The Key to Scalability a...Zohar Babin
 
Office365 Video - Learn it - Love it - Use it | Collab365
Office365 Video - Learn it - Love it - Use it | Collab365Office365 Video - Learn it - Love it - Use it | Collab365
Office365 Video - Learn it - Love it - Use it | Collab365Drew Madelung
 
Using APIs
Using APIsUsing APIs
Using APIsAkana
 
Deploy, Customize, Start, & Monitor a Channel with Live Streaming on AWS (CTD...
Deploy, Customize, Start, & Monitor a Channel with Live Streaming on AWS (CTD...Deploy, Customize, Start, & Monitor a Channel with Live Streaming on AWS (CTD...
Deploy, Customize, Start, & Monitor a Channel with Live Streaming on AWS (CTD...Amazon Web Services
 
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015Evident.io
 
Build Stuff 2021 Azure Video Indexer Advanced data extraction from video and ...
Build Stuff 2021 Azure Video Indexer Advanced data extraction from video and ...Build Stuff 2021 Azure Video Indexer Advanced data extraction from video and ...
Build Stuff 2021 Azure Video Indexer Advanced data extraction from video and ...icebeam7
 
The Whys and Hows of Deploying a Secure RPA Solution
The Whys and Hows of Deploying a Secure RPA SolutionThe Whys and Hows of Deploying a Secure RPA Solution
The Whys and Hows of Deploying a Secure RPA SolutionOption3
 
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...Beau Bullock
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWSAmazon Web Services
 
Data Lake Patterns for Voice, Vision, Advanced Analytics, & ML Using Serverle...
Data Lake Patterns for Voice, Vision, Advanced Analytics, & ML Using Serverle...Data Lake Patterns for Voice, Vision, Advanced Analytics, & ML Using Serverle...
Data Lake Patterns for Voice, Vision, Advanced Analytics, & ML Using Serverle...Amazon Web Services
 

Similar to Personalized Video Security and Options (20)

Enhanced Video Experience in SharePoint 2013
Enhanced Video Experience in SharePoint 2013Enhanced Video Experience in SharePoint 2013
Enhanced Video Experience in SharePoint 2013
 
Microsoft Stream - The Video Evolution
Microsoft Stream - The Video EvolutionMicrosoft Stream - The Video Evolution
Microsoft Stream - The Video Evolution
 
Apigee Edge: Intro to Microgateway
Apigee Edge: Intro to MicrogatewayApigee Edge: Intro to Microgateway
Apigee Edge: Intro to Microgateway
 
API Services: Building State-of-the-Art APIs
API Services: Building State-of-the-Art APIsAPI Services: Building State-of-the-Art APIs
API Services: Building State-of-the-Art APIs
 
Data-Saturday-10-Sofia-2021 Azure Video Indexer- Advanced data extraction fro...
Data-Saturday-10-Sofia-2021 Azure Video Indexer- Advanced data extraction fro...Data-Saturday-10-Sofia-2021 Azure Video Indexer- Advanced data extraction fro...
Data-Saturday-10-Sofia-2021 Azure Video Indexer- Advanced data extraction fro...
 
Deep Dive - Amazon Kinesis Video Streams - AWS Online Tech Talks
Deep Dive - Amazon Kinesis Video Streams - AWS Online Tech TalksDeep Dive - Amazon Kinesis Video Streams - AWS Online Tech Talks
Deep Dive - Amazon Kinesis Video Streams - AWS Online Tech Talks
 
AWS Chicago user group meetup on June 24, 2014
AWS Chicago user group meetup on June 24, 2014AWS Chicago user group meetup on June 24, 2014
AWS Chicago user group meetup on June 24, 2014
 
Divya Jain at AI Frontiers : Video Summarization
Divya Jain at AI Frontiers : Video SummarizationDivya Jain at AI Frontiers : Video Summarization
Divya Jain at AI Frontiers : Video Summarization
 
Kaltura Inspire Webinar: API Driven Video Platform - The Key to Scalability a...
Kaltura Inspire Webinar: API Driven Video Platform - The Key to Scalability a...Kaltura Inspire Webinar: API Driven Video Platform - The Key to Scalability a...
Kaltura Inspire Webinar: API Driven Video Platform - The Key to Scalability a...
 
Office365 Video - Learn it - Love it - Use it | Collab365
Office365 Video - Learn it - Love it - Use it | Collab365Office365 Video - Learn it - Love it - Use it | Collab365
Office365 Video - Learn it - Love it - Use it | Collab365
 
Video in html 5
Video in html 5Video in html 5
Video in html 5
 
Using APIs
Using APIsUsing APIs
Using APIs
 
Deploy, Customize, Start, & Monitor a Channel with Live Streaming on AWS (CTD...
Deploy, Customize, Start, & Monitor a Channel with Live Streaming on AWS (CTD...Deploy, Customize, Start, & Monitor a Channel with Live Streaming on AWS (CTD...
Deploy, Customize, Start, & Monitor a Channel with Live Streaming on AWS (CTD...
 
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
 
Build Stuff 2021 Azure Video Indexer Advanced data extraction from video and ...
Build Stuff 2021 Azure Video Indexer Advanced data extraction from video and ...Build Stuff 2021 Azure Video Indexer Advanced data extraction from video and ...
Build Stuff 2021 Azure Video Indexer Advanced data extraction from video and ...
 
The Whys and Hows of Deploying a Secure RPA Solution
The Whys and Hows of Deploying a Secure RPA SolutionThe Whys and Hows of Deploying a Secure RPA Solution
The Whys and Hows of Deploying a Secure RPA Solution
 
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “f...
 
WebAuthn & FIDO2
WebAuthn & FIDO2WebAuthn & FIDO2
WebAuthn & FIDO2
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWS
 
Data Lake Patterns for Voice, Vision, Advanced Analytics, & ML Using Serverle...
Data Lake Patterns for Voice, Vision, Advanced Analytics, & ML Using Serverle...Data Lake Patterns for Voice, Vision, Advanced Analytics, & ML Using Serverle...
Data Lake Patterns for Voice, Vision, Advanced Analytics, & ML Using Serverle...
 

Recently uploaded

2024's Top PPC Tactics: Triple Your Google Ads Local Leads
2024's Top PPC Tactics: Triple Your Google Ads Local Leads2024's Top PPC Tactics: Triple Your Google Ads Local Leads
2024's Top PPC Tactics: Triple Your Google Ads Local LeadsSearch Engine Journal
 
Fiverr's Product Marketing Interview Assignment
Fiverr's Product Marketing Interview AssignmentFiverr's Product Marketing Interview Assignment
Fiverr's Product Marketing Interview AssignmentFarrel Brest
 
Codes and Conventions of Film Magazine Websites.pptx
Codes and Conventions of Film Magazine Websites.pptxCodes and Conventions of Film Magazine Websites.pptx
Codes and Conventions of Film Magazine Websites.pptxGeorgeCulica
 
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdfMost Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdfCIO Business World
 
Understand the Key differences between SMO and SMM
Understand the Key differences between SMO and SMMUnderstand the Key differences between SMO and SMM
Understand the Key differences between SMO and SMMsearchextensionin
 
Prezentare Brandfluence 2023 - Social Media Trends
Prezentare Brandfluence 2023 - Social Media TrendsPrezentare Brandfluence 2023 - Social Media Trends
Prezentare Brandfluence 2023 - Social Media TrendsCristian Manafu
 
Digital Marketing Courses In Pune- school Of Internet Marketing
Digital Marketing Courses In Pune- school Of Internet MarketingDigital Marketing Courses In Pune- school Of Internet Marketing
Digital Marketing Courses In Pune- school Of Internet MarketingShauryaBadaya
 
The Evolution of Internet : How consumers use technology and its impact on th...
The Evolution of Internet : How consumers use technology and its impact on th...The Evolution of Internet : How consumers use technology and its impact on th...
The Evolution of Internet : How consumers use technology and its impact on th...sowmyrao14
 
Storyboards for my Final Major Project Video
Storyboards for my Final Major Project VideoStoryboards for my Final Major Project Video
Storyboards for my Final Major Project VideoSineadBidwell
 
When to use Machine Learning Models in SEO and Which ones to use - Lazarina S...
When to use Machine Learning Models in SEO and Which ones to use - Lazarina S...When to use Machine Learning Models in SEO and Which ones to use - Lazarina S...
When to use Machine Learning Models in SEO and Which ones to use - Lazarina S...LazarinaStoyanova
 
Exploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdfExploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdfadult marketing
 
top marketing posters - Fresh Spar Technologies - Manojkumar C
top marketing posters - Fresh Spar Technologies - Manojkumar Ctop marketing posters - Fresh Spar Technologies - Manojkumar C
top marketing posters - Fresh Spar Technologies - Manojkumar CManojkumar C
 
Michael Kors marketing assignment swot analysis
Michael Kors marketing assignment swot analysisMichael Kors marketing assignment swot analysis
Michael Kors marketing assignment swot analysisjunaid794917
 
Best digital marketing e-book form bignners
Best digital marketing e-book form bignnersBest digital marketing e-book form bignners
Best digital marketing e-book form bignnersmuntasibkhan58
 
Exploring Web 3.0 Growth marketing: Navigating the Future of the Internet
Exploring Web 3.0 Growth marketing: Navigating the Future of the InternetExploring Web 3.0 Growth marketing: Navigating the Future of the Internet
Exploring Web 3.0 Growth marketing: Navigating the Future of the Internetnehapardhi711
 
Introduction to marketing Management Notes
Introduction to marketing Management NotesIntroduction to marketing Management Notes
Introduction to marketing Management NotesKiranTiwari42
 
Unlocking Passive Income: The Power of Affiliate Marketing
Unlocking Passive Income: The Power of Affiliate MarketingUnlocking Passive Income: The Power of Affiliate Marketing
Unlocking Passive Income: The Power of Affiliate MarketingDaniel
 
Common Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityCommon Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityMonishka Adhikari
 
Miss Immigrant USA Activity Pageant Program.pdf
Miss Immigrant USA Activity Pageant Program.pdfMiss Immigrant USA Activity Pageant Program.pdf
Miss Immigrant USA Activity Pageant Program.pdfMagdalena Kulisz
 
Infographics about SEO strategies and uses
Infographics about SEO strategies and usesInfographics about SEO strategies and uses
Infographics about SEO strategies and usesbhavanirupeshmoksha
 

Recently uploaded (20)

2024's Top PPC Tactics: Triple Your Google Ads Local Leads
2024's Top PPC Tactics: Triple Your Google Ads Local Leads2024's Top PPC Tactics: Triple Your Google Ads Local Leads
2024's Top PPC Tactics: Triple Your Google Ads Local Leads
 
Fiverr's Product Marketing Interview Assignment
Fiverr's Product Marketing Interview AssignmentFiverr's Product Marketing Interview Assignment
Fiverr's Product Marketing Interview Assignment
 
Codes and Conventions of Film Magazine Websites.pptx
Codes and Conventions of Film Magazine Websites.pptxCodes and Conventions of Film Magazine Websites.pptx
Codes and Conventions of Film Magazine Websites.pptx
 
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdfMost Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
 
Understand the Key differences between SMO and SMM
Understand the Key differences between SMO and SMMUnderstand the Key differences between SMO and SMM
Understand the Key differences between SMO and SMM
 
Prezentare Brandfluence 2023 - Social Media Trends
Prezentare Brandfluence 2023 - Social Media TrendsPrezentare Brandfluence 2023 - Social Media Trends
Prezentare Brandfluence 2023 - Social Media Trends
 
Digital Marketing Courses In Pune- school Of Internet Marketing
Digital Marketing Courses In Pune- school Of Internet MarketingDigital Marketing Courses In Pune- school Of Internet Marketing
Digital Marketing Courses In Pune- school Of Internet Marketing
 
The Evolution of Internet : How consumers use technology and its impact on th...
The Evolution of Internet : How consumers use technology and its impact on th...The Evolution of Internet : How consumers use technology and its impact on th...
The Evolution of Internet : How consumers use technology and its impact on th...
 
Storyboards for my Final Major Project Video
Storyboards for my Final Major Project VideoStoryboards for my Final Major Project Video
Storyboards for my Final Major Project Video
 
When to use Machine Learning Models in SEO and Which ones to use - Lazarina S...
When to use Machine Learning Models in SEO and Which ones to use - Lazarina S...When to use Machine Learning Models in SEO and Which ones to use - Lazarina S...
When to use Machine Learning Models in SEO and Which ones to use - Lazarina S...
 
Exploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdfExploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdf
 
top marketing posters - Fresh Spar Technologies - Manojkumar C
top marketing posters - Fresh Spar Technologies - Manojkumar Ctop marketing posters - Fresh Spar Technologies - Manojkumar C
top marketing posters - Fresh Spar Technologies - Manojkumar C
 
Michael Kors marketing assignment swot analysis
Michael Kors marketing assignment swot analysisMichael Kors marketing assignment swot analysis
Michael Kors marketing assignment swot analysis
 
Best digital marketing e-book form bignners
Best digital marketing e-book form bignnersBest digital marketing e-book form bignners
Best digital marketing e-book form bignners
 
Exploring Web 3.0 Growth marketing: Navigating the Future of the Internet
Exploring Web 3.0 Growth marketing: Navigating the Future of the InternetExploring Web 3.0 Growth marketing: Navigating the Future of the Internet
Exploring Web 3.0 Growth marketing: Navigating the Future of the Internet
 
Introduction to marketing Management Notes
Introduction to marketing Management NotesIntroduction to marketing Management Notes
Introduction to marketing Management Notes
 
Unlocking Passive Income: The Power of Affiliate Marketing
Unlocking Passive Income: The Power of Affiliate MarketingUnlocking Passive Income: The Power of Affiliate Marketing
Unlocking Passive Income: The Power of Affiliate Marketing
 
Common Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityCommon Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic Creativity
 
Miss Immigrant USA Activity Pageant Program.pdf
Miss Immigrant USA Activity Pageant Program.pdfMiss Immigrant USA Activity Pageant Program.pdf
Miss Immigrant USA Activity Pageant Program.pdf
 
Infographics about SEO strategies and uses
Infographics about SEO strategies and usesInfographics about SEO strategies and uses
Infographics about SEO strategies and uses
 

Personalized Video Security and Options

  • 1. Options And Security Measures - Personalized Videos © 2016 SEZION DIGITAL, S.L. CONFIDENTIAL DOCUMENT.
  • 2. OBJECTIVES 1. Context. 2. Structure of a personalized video and its process of creation. 3. Security measures with Sezion’s integrations. 4. Security measures with Sezion’s API. 5. Security credentials. 6. Access and management of videos. 7. Management of video data. ● Describe the security measures and options of videos created by Sezion, as well as information linked to them.
  • 3. Context This document will help you understand how a personalized video is created, how the information used for its creation is handled and what happens once it’s been generated. Remember: ● Our clients decide what happens with the videos. ● We do not have access to the password on the accounts in our platform. We only access these accounts with the end user’s consent. ● Debugging logs are only accessible by our sysadmins for troubleshooting purposes.
  • 4. Structure of a personalized video and its process of creation.
  • 5. Anatomy of a personalized video Each video is created from a template that defines elements and triggers used to generate the video. Said template contains Dynamic Media where information will be inserted from a data base. Each video is an independent file plus its specific metadata.
  • 6. Security Measures For Our Integrations With Zapier
  • 7. Zapier is our integration partner that helps us connect Sezion with more than 500 business tools. It’s a powerful tool used by companies such as Adobe and Fox, which means they take security very seriously. Most Important Facts: ● Zapier login credentials are one-way PBKDF2 hashes with a workload of about 10000 iterations. ● Zapier only executes the required actions to complete the zaps you configure. ● The requests that Zapier makes to other services on your behalf are stored for 7 days to then be purged. Security with integrations through Zapier
  • 8. ● Your task history is stored for some time to help you monitor your activity and reproduce actions that were not carried out. ● Your credentials to external services (such as Sezion’s API, Salesforce or Hubspot) are stored by Zapier using AES encryption. ● All debugging registries require account credentials (API keys, tokens, etc) so they’re not accessible in raw registry requests. Security with integrations through Zapier
  • 9. ● Low level raw registry requests are stored for 7 days in the task history . ● Zapier will use HTTPS or SSL encrypted connection whenever possible (via the API and external services) Security with integrations through Zapier
  • 11. Sezion’s services are used by companies such as Bosch (BSH), Pandora or JamesAllen to create personalized videos and integrate them in their marketing and sales strategies. Most Important Facts: ● All information going through Sezion’s API is fully encrypted (SSL). ● We can also, at an extra cost, use specific SSL certificates when needed, in complete independent environments. Sezion’s API usage
  • 13. Most Important Facts: ● Sezion doesn’t have access to client’s accounts, unless expressly granted by our clients for authorized support. ● All Sezion accounts have multiple layers of security depending on the required access: ○ Web login: User and Password, SHA. ○ API: Tokens. ○ API: Account ID & Account Secret. ○ Template: Template ID & Template Secret. ○ Video: Video ID. Security credentials
  • 14. Esquema de acceso User & password Account ID & Account Secret Template ID & Template Secret Video ID Sezion ID
  • 16. Most Important Facts: ● All videos have a unique identifier that can be accessed through the user account and the API. ● To get access via API the Account Secret, Account ID and Video ID will be required (when accessing multiple versions of a single video) and Sezion ID (when dealing with a single file). ● A video can deleted through the API (Video_Delete) or manually through the Sezion interface. ● The method of distribution of a video to use is up to the client. Each video has a unique identifier and can have custom metadata, which can be used, for example, to tie a video with the ID of a person in a CRM. Access and management of videos
  • 17. Example of video identification Video ID: 12345678bhj1244 John A video can also have custom metadata fields. For example, “email” or “Client ID” as identifiable fields between a video and a person.
  • 18. Most Important Facts: ● The videos created with a template can be hosted on any of the following platforms and under the following security options: ○ Sezion (Microsoft Azure): Links are programmed to be generated each time a video is requested through the API. These links expire automatically after 10 minutes. ○ Amazon S3: Sezion uploads videos to the specified bucket privately, so the certificates of the destination bucket must be programmed to be changed or manually changed. Once uploaded to AWS S3, videos are deleted from Sezion. ○ YouTube: Sezion uploads videos privately to the specified YouTube channel, hidden or public, depending on the selected configuration. Once uploaded to YouTube, videos are deleted from Sezion. ○ Any hosting platform: Through Sezion’s API you can create an integration with any platform and specify what will happen once videos are uploaded to said platform. Hosting and distribution of a video
  • 19. Videos access scheme and distribution Data Sezion creates a personalized video automatically Azure AWS S3 YouTube Programmed root links Videos uploaded privately; client chooses policy Videos uploaded hiddenly; private or public Integration Client decides Root links expire (use Video_Get) Videos deleted from Sezion once uploaded to the bucket Videos deleted from Sezion once uploaded to YouTube Client decides Encrypted Data
  • 21. Most Important Facts: ● All Dynamic Media (texts, images, videos and personalized audio in a video) are stored temporarily during the creation of the video and automatically deleted once the video has been generated. ● The information of a generated video can be accessed through the API, through Webhook or a web interface (limited to technical information and basic metadata). ● The Webhooks support HTTP authentication, Basic or Digest, with username and password Video data management
  • 22. Remember: If you need help, feel free to contact your account manager :-) Or email us at help@sezion.com