iGaming Firewall

Computrad offer the only eGaming industry firewall whose needs are specific to the eGaming industry.

We are able to take your major platform provider or bespoke software and ensure that only that software runs on your eGaming operator website. This in effect reduces any form of application attack on your website.

Based on patented App-ID technology, our next generation firewalls accurately identify applications – regardless of port, protocol, evasive tactic or SSL encryption – and scan content to stop threats and prevent data leakage.

eGaming Operators can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership.

Next-Generation Firewall for iGaming

  • High Performance Data Center Firewall: Provides multi-Gbps, low-latency data center firewall and threat prevention.
  • Device consolidation: Fix the firewall, regain network visibility and control, and save money.
  • Simplify PCI Compliance: Dramatically reduce the complexity and cost of PCI audits.
  • Data Leak Prevention: Stop credit card numbers at the firewall.
  • Application Visibility and Control: See and control applications on your network – good, bad, and evasive – by user.
  • Threat Prevention: Stop bad applications. Scan allowed applications for all types of threats. Do it fast.

Application Visibility & Control

Applications that are capable of evading traditional port-based firewalls such as Cisco or Checkpoint are pervasive throughout all networks, introducing a wide range of productivity, security and compliance issues for your eGaming business. Attempts to regain control by bolstering the firewall with IPS, URL filtering or proxies as add-ons have achieved little success. The reason is that none of these offerings are capable of seeing all the traffic on your network nor are they designed to act as the firewall, identifying and controlling all manner of applications, irrespective of port, protocol, evasive tactic or SSL encryption.

Threat Prevention

In recent years, threats to networks have evolved rapidly. Threat developers have gotten more sophisticated, both in their motivation and in their techniques. More than ever before, threats target applications – this means your eGaming application. A recent SANS Top 20 Threats list indicated that of the top 20 threats enterprise IT security groups should be concerned about, 80% were application-level threats. Further compounding the issue, threats come in more and more flavors, are multi-vector, and resist traditional definitions (e.g., virus, exploit, or worm). This figure is actually higher within the eGaming industry as operator business run web applications.

Consolidate Security Devices and Lower TCO

For most eGaming organizations, the continued evolution of applications and threats, coupled with the stagnation of traditional network security technology has resulted in a loss of visibility and control. So operators cannot safely enable new eGaming applications effectively, and they are exposed to rising levels of risk due to increasingly evasive applications and threats.

Sprawl Is Not The Answer

Despite efforts to regain visibility and control by adding more security appliances, most operators remain stymied – unacceptably. IT security staffs have added a variety of devices around the firewall to attempt to regain control of their networks, including:

  1. Intrusion detection systems/intrusion prevention systems
  2. Proxies
  3. URL filters
  4. DLP devices
  5. Web antivirus devices
  6. IM security devices

Not only do these devices not solve the problem, they drive up complexity and cost – which, in today’s economic climate, is simply unacceptable.

It’s Time to Fix the Firewall – And Reduce TCO

Many leading operators have found that investing in innovation and reducing network security appliance sprawl can result in the restoration of visibility and control, and substantial reduction in total cost of ownership of security infrastructure.
Next-generation firewalls fix the problem – giving your operator busines visibility and policy control of applications, users, and content in a firewall. By fixing the firewall, operators have been able to reduce the number of security devices in their networks substantially, saving both capital expenditures and operations costs. By fixing the firewall, Palo Alto Networks enterprise customers have reduced costs by:

  1. Up to 80% for capital expenditures
  2. Up to 65% for hard operations costs (support contracts, subscriptions, power/HVAC)
  3. "Soft” operations costs are similarly reduced

High Performance Data Center Firewall

The data center has always been the heart and soul of the enterprise, however times have changed in several respects. Data center applications must now deal with traffic from internal and external sources and the transaction size has shrunk – due to the HTTP-centric nature of most applications. Unlike ever before, the nature of the business today is online and real-time -- latency, performance degradation or unplanned outages are unacceptable.
These traffic characteristics, combined with the need to protect applications against vulnerability exploits, place an unprecedented strain on existing security infrastructure in terms of performance. Simply put, today’s port-centric, cobbled-together solution alternatives cannot keep pace.

Preventing Data Leaks at the Firewall

Numerous examples of data leaks continue to make headlines, and data leak prevention (DLP) technologies are touted as a panacea. Unfortunately, given the scope, size, and distribution of most enterprise datasets, many DLP projects are proving slow to progress. For most organizations, controlling the applications most often used to leak sensitive data and stopping unauthorized transmission of credit card and social security numbers is what they are really worried about.

Using Segmentation to Reduce the Cost and Complexity of PCI Compliance

Achieving compliance with the Payment Card Industry Data Security Standard (PCI DSS) means that a 3rd party has performed an on-site audit of the policies and procedures that are in place to protect the cardholder data. The scope of the audit includes any and all parts of the network that may touch or carry card holder data.

more
 

Copyright © Computrad (Europe) Holdings Limited - All Rights Reserved - Our Privacy Policy