Prairie's Edge
CASINO RESORT

Prairie’s Edge Casino and Resort is owned and operated by the Upper Sioux Community. The casino entertainment complex encompasses approximately 63,000 square feet, and features over 1,000 slot machines, and various table games.
Prairie’s Edge Casino Resort’s Immediate Challenge
During penetration testing, Prairie’s Edge Casino & Resort identified security challenges within select end point devices. Prairie’s Edge needed to insert a hybrid hardware/software end point security solution to remediate the security challenge.
The Solution
CSOI was deployed without rearchitecting the existing network infrastructure. A combination of CSOI software and hardware effectively segmented and encrypted all communication between devices, applications and databases. Prairie’s Edge devices are now protected behind policy defined access control ensuring secure network access to only Prairie’s Edge approved personnel. Prairie’s Edge Casino is now standing ready for the next penetration test!
Reduced Network Complexity
The CSOI solution reduced network complexity and rendered the network invisible to remote threats while also creating a centeralized area to manage internal network communications.

Zero Trust Architecture
Deny All Devices
Until Explicitly Allowed

Network Cloaking
Hide Network IPs from
Breach or Misconfiguration

Microsegmentation
Command your Data Access &
Permission to the Device Level

Policy Defined Access
Control Access
to Your Network
Deployed CSOI Solution Components

Conductor:
The team deployed the orchestration engine for provisioning, segmenting, allocation, and revocation of the network in the cloud. The Conductor allows them to visualize their segmentation and do granular whitelisting of the network.

Gateways:
Physical CSOI Gateway’s deployed to protect critical infrastructure that did not have an accessible OS on which the software could run. This introduced policy defined access to those VLAN segments that were previously unprotected, ensuring only PEC approved personnel were allowed access.

Agents:
Agent software deployed on hundreds to thousands of different client devices — such as laptops, smart phones, and tablets — assigning a unique cryptographic identity (CID) for each device. The agents allow every device to follow segmentation and access policy at scale.

Final Key Factor:
CSOI won over other presented ZTA solutions due to the flexibility of having its Conductor (the Command & Control dashboard) hosted either on-premises within the customers environment or in the cloud. The added capability of knowing the CSOI solution does not require constant line-of-sight to Conductor for daily usage ensuring policy defined access was an additional winning factor. Mainstream ZTA solutions utilize the cloud for management and being able to keep the conductor out of the cloud and secure on-premises was a major part of their decision to protect their environment with CSOI.
Let's Start A Conversation!
Contact CSOI today to learn how we can help.

