Cybersecurity Operations Infrastructure | Case Study Prairie's Edge Casino

Prairie's Edge Casino, Cybersecurity Case Study

Prairie's Edge cybersecurity, csoi review, csoi solution, tribal cybersecurity, tribal zero trust security solution, hip replacement protocol, nist sp 1800-53, nist sp 800-207a, government cyber security, public utility cyber security

Prairie's Edge

CASINO RESORT

prairies edge casino

Prairie’s Edge Casino and Resort is owned and operated by the Upper Sioux Community. The casino entertainment complex encompasses approximately 63,000 square feet, and features over 1,000 slot machines, and various table games.

Prairie’s Edge Casino Resort’s Immediate Challenge

During penetration testing, Prairie’s Edge Casino & Resort identified security challenges within select end point devices. Prairie’s Edge needed to insert a hybrid hardware/software end point security solution to remediate the security challenge.

The Solution

CSOI was deployed without rearchitecting the existing network infrastructure. A combination of CSOI software and hardware effectively segmented and encrypted all communication between devices, applications and databases. Prairie’s Edge devices are now protected behind policy defined access control ensuring secure network access to only Prairie’s Edge approved personnel. Prairie’s Edge Casino is now standing ready for the next penetration test!

Reduced Network Complexity

The CSOI solution reduced network complexity and rendered the network invisible to remote threats while also creating a centeralized area to manage internal network communications.

shield

Zero Trust Architecture

Deny All Devices
Until Explicitly Allowed

layers

Network Cloaking

Hide Network IPs from
Breach or Misconfiguration

phones

Microsegmentation

Command your Data Access &
Permission to the Device Level

Lateral Movement

Policy Defined Access

Control Access
to Your Network

Deployed CSOI Solution Components

tower

Conductor:

The team deployed the orchestration engine for provisioning, segmenting, allocation, and revocation of the network in the cloud. The Conductor allows them to visualize their segmentation and do granular whitelisting of the network.

database

Gateways:

Physical CSOI Gateway’s deployed to protect critical infrastructure that did not have an accessible OS on which the software could run. This introduced policy defined access to those VLAN segments that were previously unprotected, ensuring only PEC approved personnel were allowed access.

monitor

Agents:

Agent software deployed on hundreds to thousands of different client devices — such as laptops, smart phones, and tablets — assigning a unique cryptographic identity (CID) for each device. The agents allow every device to follow segmentation and access policy at scale.

cloud

Final Key Factor:

CSOI won over other presented ZTA solutions due to the flexibility of having its Conductor (the Command & Control dashboard) hosted either on-premises within the customers environment or in the cloud. The added capability of knowing the CSOI solution does not require constant line-of-sight to Conductor for daily usage ensuring policy defined access was an additional winning factor. Mainstream ZTA solutions utilize the cloud for management and being able to keep the conductor out of the cloud and secure on-premises was a major part of their decision to protect their environment with CSOI.

Let's Start A Conversation!

Contact CSOI today to learn how we can help.

800-652-9686

csoi@csoi.us