How?
Security Exchanges
End-to-end in control (mostly…)
Identical content, two
source sites.
Source A
Group set A
Source B
Group set B
Dedicated or
Shared Backbone
PIM-SM
Static S,G Joins
SSM

Customer 1
Customer N