Radar has landed - discover the latest DDoS attack trends. Get ahead, stay protected.Get the report
Under attack?

Products

Solutions

Resources

Partners

Why Gcore

  1. Home
  2. Blog
  3. How to choose a webinar and video conferencing solution

How to choose a webinar and video conferencing solution

  • By Gcore
  • March 26, 2021
  • 7 min read
How to choose a webinar and video conferencing solution

For webinars and video conferencing, it is important that the broadcast is of a technically high quality. No matter how interesting your content may be, if the video comes with long delays and glitches, it will ruin the whole experience.

In this article, we’ll tell you what criteria should be met when choosing a streaming platform for webinars and conferences to perfectly suit your tasks.

1. Minimal delays

Imagine: at a webinar, the speaker finishes the topic and asks if there are any questions. The viewers are silent, and the speaker moves on. But then a few questions pop up in the chat. The speaker is interrupted. He’s put off his stride and doesn’t understand why the viewers didn’t ask their questions at the designated time.

But it’s not the viewers who are to blame, it’s the delay. The speaker has already moved on to the next topic, but for the viewers, he’s only now asked if there are questions.

Or you are conducting a video conference, and you have to wait 10 seconds for a response from each participant. So, a short discussion for which you have allocated 20 minutes ends up lasting an hour.

To avoid such situations, choose a platform that provides the lowest latency. For webinars, the delay should be below 4 seconds, and for conferences, no greater than half a second.

Pay attention not only to the delay times the platform claims to provide but also which technologies are used to minimize them. Find out what communication protocols are used.

Low latency protocols:

  1. Low Latency HLS;
  2. Chunked CMAF;
  3. SRT;
  4. WebRTC.

Make sure to check whether the platform supports at least some of these protocols.

2. Security

Useful and unique content needs good protection. For webinars and video conferencing, it is important that only your users have access to the broadcast and that the video can’t be copied and uploaded to the web.

Protection from illegal viewing

How do you make sure that only those who paid for the webinar can watch it, and only the necessary participants can join your video conference? Be sure to ask how the platform will protect your content in this regard. For example, it could be protected with a PIN code or secure links.

1. Protection with a PIN code. This is pretty straightforward. Users need to enter a code to view or participate in a conference.

In this case, the video itself is transmitted over the network in an encrypted form. Once the video file reaches the recipient, access to the content is provided using a key.

Even if attackers intercept the file, without the key, they will still be unable to decrypt it.

2. Safe links (signed URLs). In this case, your users don’t need to enter anything. Instead, you send everyone a personal secure link. Only the recipient can follow it.

To create a signed URL, the following is added to the regular link:

  • a token (an element for authorization);
  • the “expires” parameter (a period during which the link will work).

The main element of a secure link is a token. It’s a digital key that the server uses to determine who is making the request and whether they are entitled to access.

When someone follows the link:

  1. A request is sent to the server along with a token.
  2. The server receives the data and checks whether the token is valid and whether its owner has the right to gain access.
  3. If everything is in order, the link opens.

With the help of such links, you not only protect the broadcast, but can also differentiate access levels.

For example, there are two plans for watching your webinar: the cheaper one gives the user the right only to watch and ask questions in the chat, and with the more expensive one, they can download a presentation and additional materials.

Your customers will connect to the webinar using different links. The users of the more expensive plan will have the “Download materials” button, while with the cheaper plan, it will be blocked.

This will give everyone access to the content they paid for.

A platform must provide some form of protection. It’s better when it offers multiple options, so you can choose the most convenient one.

Copy protection

It’s important that no one can copy and distribute your unique content from a webinar or conference. It’s even more important to prevent illegal copying in corporate conferences, so that classified information doesn’t reach competitors.

AES encryption and DRM (Digital Rights Management) provide such protection. This is a set of systems with which you can restrict access to content and establish rules for its use. They are designed specifically to protect copyright on the internet.

Be sure to ask whether the platform supports AES or DRM encryption. If not, it’s best to look for another solution.

3. Load resistance

Take note of how many participants the platform is designed for. Is such a limit enough for you?

Not only is the number of participants that the platform promises to handle important, but also how well it performs under maximum loads.

Load balancing

If you’re hosting a massive webinar with thousands of viewers, the platform needs to have a truly global infrastructure with many nodes. If any of the routes are congested, the system must be able to redirect traffic to other nodes and balance the load.

If your viewers live in different cities and countries, it’s better to choose a platform integrated with a CDN.

A CDN is a set of interconnected servers that take data from the source server and transmit it to end users along the shortest route.

CDN servers are usually located as close as possible to the end users, so the content is broadcast anywhere in the world with minimal delays.

The load in such an event is then evenly distributed. And if one CDN server is overloaded, customers receive the video from the next closest server. This way, your broadcast is available anytime, anywhere.

However, a global infrastructure with a CDN is a solution for large projects with viewers around the world. If you need a platform for small, local events, it’s better to choose a more frugal option.

Adaptive bitrate

Broadcast availability is not always up to you. Users sometimes have a poor connection, so they can’t watch a webinar or fully participate in a conference.

To solve this problem, developers came up with an adaptive bitrate. This technology allows you to adjust the video quality to the bandwidth of each user.

If the participants have a good connection, the stream will be available in 8K. If not, the quality can be reduced to the transmission of audio only.

It’s also possible to adjust the transmission quality throughout the video. For example, if one of your viewers is on the road, the quality will be high in sections where there’s 4G, but will decrease in sections with poor connectivity.

A good platform should definitely support adaptive bitrate.

4. Ease of use

If you’ve purchased an IT solution for webinars and video calls, it should save you the hassle of having to deal with technical issues. The system should be as simple and comprehensible as possible and should require a minimum number of actions before starting.

Easy for you

It’s better if the platform works in a browser, without the need to install additional software.

Check whether video can be integrated into your website. It’s much better to broadcast on your own resource than to redirect customers to another application.

Easy for users

Participants shouldn’t have any connection issues. If the system is complex, you’ll have to explain in detail how to connect to a webinar or conference. And this means more time spent.

5. Prompt problem solving

Another factor that must be considered is the availability of quality technical support. After all, if a failure occurs, it’s important to solve the problem as quickly as possible.

Read reviews about the platform. Find out how quickly the tech specialists respond to problems.

Ideally, support will be available 24/7. This way, webinars and conferences can be held at any time, and you’ll know for sure that help will come if problems suddenly arise.

6. Useful features

The main objective of a streaming platform is to provide high-quality video transmission, without delays or failures. But other features can also be useful.

Important features for webinars and video conferencing:

  1. Ability to show presentations and share the screen. It’s better to illustrate the material you’re presenting.
  2. Supported recording and rewinding of live broadcasts. Viewers should be able to rewind the video if they missed an important point. Also, recordings of webinars and conferences can be offered to users for an extra fee.
  3. Customization. The video player shouldn’t look foreign on your website. It’s important that the appearance of the player can be adjusted to your corporate style.
  4. Statistics. Needed to analyze how satisfied your users are and what can be improved. It’s useful if the platform can show how many participants there were, what actions they performed, how long they watched the broadcast, and when they started leaving.

Some platforms provide the ability to rebroadcast to social media. This feature is not so relevant for conferences and paid webinars, but if you’re running free events, the ability to rebroadcast will help broaden your audience.

If this feature is relevant to you, find out how easy it will be to enable broadcasting to social networks. Ideally, it should be enough to press a couple of buttons and everything works.

Conclusions

Different webinars and conferences require different solutions. Study the technical features of different platforms carefully to choose the one that is perfect for you. See what features they offer, whether these features are enough for you, and whether some of them are superfluous.

When choosing a platform, be sure to check the availability of options that you think you need. Read reviews about companies and see what their ratings are according to independent sources.

Gcore Streaming Platform

Take a look at our Streaming Platform too. We offer comprehensive solutions for any project. We support broadcasting at all stages, but if necessary, we can integrate individual modules into your own system.

Solutions for webinars and video conferencing

We offer four different modes.

1. Broadcasts of professional filming. An option for large webinars and online events.

  • The broadcast is designed for 1,000,000+ viewers.
  • The delay is below 4 seconds.
  • Rebroadcast to YouTube, Facebook, Twitch, LinkedIn, VKontakte, Odnoklassniki, or Instagram (beta) in one click.

2. Quickly prepared broadcasts. Suitable for medium to small webinars.

  • Up to 1,000 viewers.
  • The delay is below 1 second.
  • A presentation mode and screen sharing.

3. Video conferencing for small groups. This option is suitable for corporate training, online consulting, business meetings, and interactive training.

  • Up to 20 participants.
  • No viewers. Everyone connected is a participant with a switched-on camera and microphone.
  • The delay is below 1 second.
  • A presentation mode and screen sharing.

4. Collective viewing. An innovative solution that combines a webinar and a conference. The participants watch the broadcast, but they can also join small groups, communicate via video link, and perform practical tasks.

This kind of interactivity in live broadcasts increases audience engagement. It’s perfect for interactive events or online training.

For example, you can host an online lesson using this solution. The teacher conducts the lesson and gives the audience group assignments from time to time. The participants discuss these assignments with each other and complete them in real time. This way, the effect of “being in the classroom” is created.

In many cases, this can improve the effectiveness of training. For example, such a system will be useful for online foreign language lessons, where communication practice is important.

  • This solution is designed for 20 or more people.
  • The delay is below 1 second.
  • A presentation mode and screen sharing.

Advantages of Gcore Streaming Platform

  • Low-latency streaming.
  • Protection against illegal viewing and copying using PIN code, secure links, DRM and AES encryption.
  • Infrastructure resistant to any load, integrated with its own CDN.
  • Adaptive bitrate and support of quality up to 8K.
  • Seamless integration of videos into your website or application.
  • Works in a browser on all devices, without the need to install additional software.
  • Supports 4-hour recording and rewinding of live broadcasts.
  • A customizable HTML5 player.
  • Detailed statistics.
  • Competent 24/7 tech support.

Select the solution that’s right for you. Deliver the best quality video content with no delays or glitches.

Get started with a free consultation from our streaming expert.

Try for free

Get a free consultation

Related articles

How to choose the right CDN provider in a turbulent marketplace

In a CDN marketplace marked by provider shutdowns, price hikes, and shifting priorities, reliability is survival. If your current provider folds, you're not just facing downtime—you're losing revenue and customer trust. For the world’s top 2,000 companies, the total annual downtime cost is $400 billion, eroding 9% of profits. Choosing the right CDN partner isn’t just about performance, it’s about protecting your business from disruption.In this guide, we show you how to identify early warning signs, evaluate providers, and switch before your business takes the hit.Red flags: signs that it’s time to consider a new CDN providerIf you’re experiencing any of the following issues with your current CDN provider, it might be time to reconsider your current setup.Slower load times: If you’ve noticed lagging performance, your CDN provider may be running on outdated infrastructure or not investing in upgrades.Rising costs: Increasing prices without additional value? A higher bill and the same service is a major red flag.Uncertainty about long-term service: Look for clear communication and a demonstrated commitment to infrastructure investment, essential a market where providers frequently consolidate and shift focus.Your CDN should scale with you, not hold you back. Prioritize a partner who can evolve with your needs and support your long-term success.5 must-haves when choosing a CDN partnerNot all CDNs are created equal. Before switching, compare providers across these five key factors.Performance: Check real-world performance benchmarks and global coverage maps to understand how a CDN will serve your audience in key regions. Throughput (the amount of data that can be successfully delivered from a server to an end user over a specific period of time) and low latency are non-negotiable when choosing a CDN provider.Pricing: Before signing up, it’s essential to know what is and isn’t included in the price in case there are hidden fees. Look for predictable billing, volume-based tiers, and transparent overage charges to avoid surprise costs. Avoid vendors who lure you in with low rates, then add hidden overage fees.Security: Choose a CDN that offers built-in protection out of the box: DDoS mitigation, TLS, WAF, and API security. Bonus points for customizable policies that fit your stack. Strong security features should be standard for CDNs to combat advanced cyber threats.Edge computing: When it comes to Edge computing, understanding the power of this strategic CDN add-on can give you a significant advantage. Look for CDN providers that offer flexible edge compute capabilities, so you can process data closer to users, reduce latency, and improve response times.Future-proofing: The CDN market’s volatility makes partnering with providers with long-term stability vital. Pick a provider that’s financially solid, tech-forward, and committed to innovation—not just sticking around to get acquired.Choosing a new provider may feel like a challenge, but the long-term payoff—improved performance, lower risk, and a future-ready infrastructure—makes it well worth it. By picking a CDN partner that meets your needs now and for the future, you’ll receive fast, personalized, and secure experiences that truly stand out.What makes Gcore CDN different?Gcore CDN isn’t just another CDN, we’re your long-term performance partner. Here’s what we offer:Global scale, blazing speed: Our network spans 180+ edge locations across 6 continents, optimized for low-latency delivery no matter where your users are.Transparent, flexible pricing: No hidden fees. No lock-in. Just fair, flexible pricing models designed to scale with your growth.A stable partner in a shaky market: While others pivot or fold, Gcore is doubling down. We’re investing in infrastructure, expanding globally, and building for the next wave of content and edge use cases.If you’re ready to make the switch, we’re here to help. Get in touch for a free consultation to discuss your specific needs and tailor a transition plan that suits your business. For more insights about choosing the right CDN for your business, download our free CDN buyer's guide for a more in-depth look at the CDN landscape.Get your free CDN buyers guide now

How gaming studios can use technology to safeguard players

Online gaming can be an enjoyable and rewarding pastime, providing a sense of community and even improving cognitive skills. During the pandemic, for example, online gaming was proven to boost many players’ mental health and provided a vital social outlet at a time of great isolation. However, despite the overall benefits of gaming, there are two factors that can seriously spoil the gaming experience for players: toxic behavior and cyber attacks.Both toxic behavior and cyberattacks can lead to players abandoning games in order to protect themselves. While it’s impossible to eradicate harmful behaviors completely, robust technology can swiftly detect and ban bullies as well as defend against targeted cyberattacks that can ruin the gaming experience.This article explores how gaming studios can leverage technology to detect toxic behavior, defend against cyber threats, and deliver a safer, more engaging experience for players.Moderating toxic behavior with AI-driven technologyToxic behavior—including harassment, abusive messages, and cheating—has long been a problem in the world of gaming. Toxic behavior not only affects players emotionally but can also damage a studio’s reputation, drive churn, and generate negative reviews.The online disinhibition effect leads some players to behave in ways they may not in real life. But even when it takes place in a virtual world, this negative behavior has real long-term detrimental effects on its targets.While you can’t control how players behave, you can control how quickly you respond.Gaming studios can implement technology that makes dealing with toxic incidents easier and makes gaming a safer environment for everyone. While in the past it may have taken days to verify a complaint about a player’s behavior, today, with AI-driven security and content moderation, toxic behavior can be detected in real time, and automated bans can be enforced. The tool can detect inappropriate images and content and includes speech recognition to detect derogatory or hateful language.In gaming, AI content moderation analyzes player interactions in real time to detect toxic behavior, harmful content, and policy violations. Machine learning models assess chat, voice, and in-game media against predefined rules, flagging or blocking inappropriate content. For example, let’s say a player is struggling with in-game harassment and cheating. With AI-powered moderation tools, chat logs and gameplay behavior are analyzed in real time, identifying toxic players for automated bans. This results in healthier in-game communities, improved player retention, and a more pleasant user experience.Stopping cybercriminals from ruining the gaming experienceAnother factor negatively impacting the gaming experience on a larger scale is cyberattacks. Our recent Radar Report showed that the gaming industry experienced the highest number of DDoS attacks in the last quarter of 2024. The sector is also vulnerable to bot abuse, API attacks, data theft, and account hijacking.Prolonged downtime damages a studio’s reputation—something hackers know all too well. As a result, gaming platforms are prime targets for ransomware, extortion, and data breaches. Cybercriminals target both servers and individual players’ personal information. This naturally leads to a drop in player engagement and widespread frustration.Luckily, security solutions can be put in place to protect gamers from this kind of intrusion:DDoS protection shields game servers from volumetric and targeted attacks, guaranteeing uptime even during high-profile launches. In the event of an attack, malicious traffic is mitigated in real-time, preventing zero downtime and guaranteeing seamless player experiences.WAAP secures game APIs and web services from bot abuse, credential stuffing, and data breaches. It protects against in-game fraud, exploits, and API vulnerabilities.Edge security solutions reduce latency, protecting players without affecting game performance. The Gcore security stack helps ensure fair play, protecting revenue and player retention.Take the first steps to protecting your customersGaming should be a positive and fun experience, not fraught with harassment, bullying, and the threat of cybercrime. Harmful and disruptive behaviors can make it feel unsafe for everyone to play as they wish. That’s why gaming studios should consider how to implement the right technology to help players feel protected.Gcore was founded in 2014 with a focus on the gaming industry. Over the years, we have thwarted many large DDoS attacks and continue to offer robust protection for companies such as Nitrado, Saber, and Wargaming. Our gaming specialization has also led us to develop game-specific countermeasures. If you’d like to learn more about how our cybersecurity solutions for gaming can help you, get in touch.Speak to our gaming solutions experts today

How to choose the right technology tools to combat digital piracy

One of the biggest challenges facing the media and entertainment industry is digital piracy, where stolen content is redistributed without authorization. This issue causes significant revenue and reputational losses for media companies. Consumers who use these unregulated services also face potential threats from malware and other security risks.Governments, regulatory bodies, and private organizations are increasingly taking the ramifications of digital piracy seriously. In the US, new legislation has been proposed that would significantly crack down on this type of activity, while in Europe, cloud providers are being held liable by the courts for enabling piracy. Interpol and authorities in South Korea have also teamed up to stop piracy in its tracks.In the meantime, you can use technology to help stop digital piracy and safeguard your company’s assets. This article explains anti-piracy technology tools that can help content providers, streaming services, and website owners safeguard their proprietary media: geo-blocking, digital rights management (DRM), secure tokens, and referrer validation.Geo-blockingGeo-blocking (or country access policy) restricts access to content based on a user’s geographic location, preventing unauthorized access and limiting content distribution to specific regions. It involves setting rules to allow or deny access based on the user’s IP address and location in order to comply with regional laws or licensing agreements.Pros:Controls access by region so that content is only available in authorized marketsHelps comply with licensing agreementsCons:Can be bypassed with VPNs or proxiesRequires additional security measures to be fully effectiveTypical use cases: Geo-blocking is used by streaming platforms to restrict access to content, such as sports events or film premieres, based on location and licensing agreements. It’s also helpful for blocking services in high-risk areas but should be used alongside other anti-piracy tools for better and more comprehensive protection.Referrer validationReferrer validation is a technique that checks where a content request is coming from and prevents unauthorized websites from directly linking to and using content. It works by checking the “referrer” header sent by the browser to determine the source of the request. If the referrer is from an unauthorized domain, the request is blocked or redirected. This allows only trusted sources to access your content.Pros:Protects bandwidth by preventing unauthorized access and misuse of resourcesGuarantees content is only accessed by trusted sources, preventing piracy or abuseCons:Can accidentally block legitimate requests if referrer headers are not correctly sentMay not work as intended if users access content via privacy-focused methods that strip referrer data, leading to false positivesTypical use cases: Content providers commonly use referrer validation to prevent unauthorized streaming or hotlinking, which involves linking to media from another website or server without the owner’s permission. It’s especially useful for streamers who want to make sure their content is only accessed through their official platforms. However, it should be combined with other security measures for more substantial protection.Secure tokensSecure tokens and protected temporary links provide enhanced security by granting temporary access to specific resources so only authorized users can access sensitive content. Secure tokens are unique identifiers that, when linked to a user’s account, allow them to access protected resources for a limited time. Protected temporary links further restrict access by setting expiration dates, meaning the link becomes invalid after a set time.Pros:Provides a high level of security by allowing only authorized users to access contentTokens are time-sensitive, which prevents unauthorized access after they expireHarder to circumvent compared to traditional password protection methodsCons:Risk of token theft if they’re not managed or stored securelyRequires ongoing management and rotation of tokens, adding complexityCan be challenging to implement properly, especially in high-traffic environmentsTypical use cases: Streaming platforms use secure tokens and protected temporary links so only authenticated users can access premium content, like movies or live streams. They are also useful for secure file downloads or limiting access to exclusive resources, making them effective for protecting digital content and preventing unauthorized sharing or piracy.Digital rights managementDigital rights management (DRM) refers to a set of technologies designed to protect digital content from unauthorized use so that only authorized users can access, copy, or share it, according to licensing agreements. DRM uses encryption, licensing, and authentication mechanisms to control access to digital resources so that only authorized users can view or interact with the content. While DRM offers strong protection against piracy, it comes with higher complexity and setup costs than other security methods.Pros:Robust protection against unauthorized copying, sharing, and piracyHelps safeguard intellectual property and revenue streamsEnforces compliance with licensing agreementsCons:Can be complex and expensive to implementMay cause inconvenience for users, such as limiting playback on unauthorized devices or restricting sharingPotential system vulnerabilities or compatibility issuesTypical use cases: DRM is commonly used by streaming services to protect movies, TV shows, and music from piracy. It can also be used for e-books, software, and video games, ensuring that content is only used by licensed users according to the terms of the agreement. DRM solutions can vary, from software-based solutions for media files to hardware-based or cloud-based DRM for more secure distribution.Protect your content from digital piracy with GcoreDigital piracy remains a significant challenge for the media and entertainment industry as it poses risks in terms of both revenue and security. To combat this, partnering with a cloud provider that can actively monitor and protect your digital assets through advanced multi-layer security measures is essential.At Gcore, our CDN and streaming solutions give rights holders peace of mind that their assets are protected, offering the features mentioned in this article and many more besides. We also offer advanced cybersecurity tools, including WAAP (web application and API protection) and DDoS protection, which further integrate with and enhance these security measures. We provide trial limitations for streamers to curb piracy attempts and respond swiftly to takedown requests from rights holders and authorities, so you can rest assured that your assets are in safe hands.Get in touch to learn more about combatting digital piracy

The latest updates for Gcore Video Streaming: lower latency, smarter AI, and seamless scaling

At Gcore, we’re committed to continuous innovation in video streaming. This month, we’re introducing significant advancements in low-latency streaming, AI-driven enhancements, and infrastructure upgrades, helping you deliver seamless, high-quality content at scale.Game-changing low-latency streamingOur latest low-latency live streaming solutions are now fully available in production, delivering real-time engagement with unmatched precision:WebRTC to HLS/DASH: Now in production, enabling real-time transcoding and delivery for WebRTC streams using HTTP-based LL-HLS and LL-DASH.LL-DASH with two-second latency: Optimized for ultra-fast content delivery via our global CDN, enabling minimal delay for seamless streaming.LL-HLS with three-second latency: Designed to deliver an uninterrupted and near-real-time live streaming experience.Gcore’s live streaming dashboard with OBS Studio integration, enabling real-time transcoding and delivery with low-latency HLS/DASHWhat this means for youWith glass-to-glass latency as low as 2–3 seconds, these advancements unlock new possibilities for real-time engagement. Whether you’re hosting live auctions, powering interactive gaming experiences, or enabling seamless live shopping, Gcore Video Streaming’s low-latency options keep your viewers connected without delay.Our solution integrates effortlessly with hls.js, dash.js, native Safari support, and our HTML web player, guaranteeing smooth playback across devices. Backed by our global CDN infrastructure, you can count on reliable, high-performance streaming at scale, no matter where your audience is.Exciting enhancements: AI and live streaming featuresWe’re making live streaming smarter with cutting-edge AI capabilities:Live stream recording with overlays: Record live streams while adding dynamic overlays such as webcam pop-ups, chat, alerts, advertisement banners, and time or weather widgets. This feature allows you to create professional, branded content without post-production delays. Whether you’re broadcasting events, tutorials, or live commerce streams, overlays help maintain a polished and engaging viewer experience.AI-powered VOD subtitles: Advanced AI automatically generates and translates subtitles into more than 100 languages, helping you expand your content’s reach to global audiences. This ensures accessibility while improving engagement across different regions.Deliver seamless live experiences with GcoreOur commitment to innovation continues, bringing advancements to enhance performance, efficiency, and streaming quality. Stay tuned for even lower latency and more AI-driven enhancements coming soon!Gcore Video Streaming empowers you to deliver seamless live experiences for auctions, gaming, live shopping, and other real-time applications. Get reliable, high-performance content delivery—whether you’re scaling to reach global audiences or delivering unique experiences to niche communities.Try Gcore Video Streaming today

How we optimized our CDN infrastructure for paid and free plans

At Gcore, we’re dedicated to delivering top-tier performance and reliability. To further enhance performance for all our customers, we recently made a significant change: we moved our CDN free-tier customers to a separate, physically isolated infrastructure. By isolating free-tier traffic, customers on paid plans receive uninterrupted, premium-grade service, while free users benefit from an environment tailored to their needs.Why we’ve separated free and paid plan infrastructureThis optimization has been driven by three key factors: performance, stability and scalability, and improved reporting.Providing optimal performanceFree-tier users are essential to our ecosystem, helping to stress-test our systems and extend our reach. However, their traffic can be unpredictable. By isolating free traffic, we provide premium customers with consistently high performance, minimizing disruption risks.Enhancing stability and scalabilityWith separate infrastructures, we can better manage traffic spikes and load balancing without impacting premium services. This improves overall platform stability and scalability, guaranteeing that both customer groups will enjoy a reliable experience.Improving reporting and performance insightsAlongside infrastructure enhancements, we’ve upgraded our reports page to offer clearer visibility into traffic and performance:New 95th percentile bandwidth graph: Helps users analyze traffic patterns more effectively.Improved aggregated bandwidth view: Makes it easier to assess usage trends at a glance.These tools empower you to make more informed decisions with accurate and accessible data.95th percentile bandwidth usage over the last three months, highlighting a significant increase in January 2025Strengthening content delivery with query string forwardingWe’ve also introduced a standardized query string forwarding feature to boost content delivery stability. By replacing our previous custom approach, we achieved the following:Increased stability: Reducing the risk of disruptionsLower maintenance requirements: Freeing up engineering resourcesSmoother content delivery: Enhancing experiences for streaming and content-heavy applicationsQuery string forwarding settings allow seamless parameter transfer for media deliveryWhat this means for our customersFor customers on paid plans: You can expect a more stable, high-performance service without the disruptions caused by fluctuating free-tier activity. Enhanced reporting and streamlined content delivery also empower you to make better, data-driven decisions.For free-tier customers: You will continue to have access to our services on a dedicated infrastructure that has been specifically optimized for your needs. This setup allows us to innovate and improve performance without compromising service quality.Strengthening Gcore CDN for long-term growthAt Gcore, we continuously refine our CDN to enable top-tier performance, reliability, and scalability. The recent separation of free-tier traffic, improved reporting capabilities, and optimized content delivery are key to strengthening our infrastructure. These updates enhance service quality for all users, minimizing disruptions and improving traffic management.We remain committed to pushing the boundaries of CDN efficiency, delivering faster load times, robust security, and seamless scalability. Stay tuned for more enhancements as we continue evolving our platform to meet the growing demands of businesses worldwide.Explore Gcore CDN

Introducing low-latency live streams with LL-HLS and LL-DASH

We are thrilled to introduce low-latency live streams for Gcore Video Streaming using LL-HLS and LL-DASH protocols. With a groundbreaking glass-to-glass delay of just 2.2–3.0 seconds, this improvement brings unparalleled speed to your viewers’ live-streaming experience.Alt: Video illustrating the workflow of low-latency live streaming using LL-HLS and LL-DASH protocolsThis demonstration shows the minimal latency of our live streaming solution—just three seconds between the original broadcast (left) and what viewers see online (right).Key use cases and benefits of low-latency streamingOur low-latency streaming solutions address the specific needs of content providers, broadcasters, and developers, enabling seamless experiences for diverse use cases.Ultra-fast live streamingGet real-time delivery with glass-to-glass latency of ±2.2 seconds for LL-DASH and ±3.0 seconds for LL-HLS.Deliver immediate viewer engagement, ideal for industries such as live sports, e-sports tournaments, and news broadcasting.Meet the expectations of audiences who demand instant access to live events without noticeable delays.Enhanced viewer interactionReduce the delay between live actions and audience reactions, fostering a more immersive viewing experience.Support real-time interaction for use cases like virtual conferences, live auctions, Q&A sessions, and live shopping platforms.Flexible player supportSeamlessly integrate with your existing player setups, including popular options like hls.js, dash.js, and native Safari support.Use our new HTML web player for effortless integration or maintain your current custom player workflows.Global scalability and reliabilityLeverage our robust CDN network with 200+ Tbps capacity and 180+ PoPs to enable low-latency streams worldwide.Deliver a consistent, high-quality experience for global audiences, even during peak traffic events.Cost-efficiencyMinimize operational overhead with a streamlined solution that combines advanced encoding, efficient packaging, and reliable delivery.How it worksOur real-time transcoder and JIT packager generate streaming manifests and chunks optimized for low latency:For LL-HLS: The HLS manifest (.m3u8) and chunks comply with the latest standards. Tags like #EXT-X-PART, #EXT-X-PRELOAD-HINT, and others are dynamically generated with best-in-class parameters. Chunks are loaded instantaneously as they appear at the origin.For LL-DASH: The DASH manifest (.mpd) leverages advanced MPEG-DASH features. Chunks are transmitted to viewers as soon as encoding begins, with caching finalized once the chunk is fully fetched.Combined with our fast and reliable CDN delivery, live streams are accessible globally with minimal delay. Our CDN network has an extensive capacity and 180+ PoPs to deliver exceptional performance, even for high-traffic events.See a live demo in action!Try WebRTC to HLS/DASH todayWe’re also excited to remind you about our WebRTC to HLS/DASH delivery functionality. This innovative feature allows streams created in a standard browser via WebRTC to be:Transcoded on our servers.Delivered with low latency to viewers using HTTP-based LL-HLS and LL-DASH protocols through our CDN.Try it now in the Gcore Customer Portal.Shaping the future of streamingBy nearly halving the glass-to-glass delivery time compared to our previous solution, Gcore Video Streaming enables you to deliver a seamless experience for live events, real-time interactions, and other latency-sensitive applications. Whether you’re broadcasting to a global audience or engaging niche communities, our platform provides the tools you need to thrive in today’s dynamic streaming landscape.Watch our demo to see the difference and explore how this solution fits into your workflows.Visit our demo player

Subscribe to our newsletter

Get the latest industry trends, exclusive insights, and Gcore updates delivered straight to your inbox.