Twistage offers various security models to make sure only authorized individuals are viewing content. One security model amenable to an enterprise environment uses authenticated streams, in which each request for a video stream carries with it an authentication token your server generates. Twistage calls the authenticating server with that token before delivering the video, letting organizations authenticate the token using their existing business logic and access control model. This tight integration with the authentication server is valuable not only because it's so granular, but because administrators can continue to apply access restrictions using the same methodology and Twistage will automatically inherit the restrictions. There is no need to learn new software and reconfigure anything in Twistage.