PGRI March/April 2022 Public Gaming Magazine

50 PUBLIC GAMING INTERNATIONAL • MARCH/APRIL 2022 Risk Today, software applications are often accessed through networks known as Virtual Private Networks (VPNs). While VPNs and firewalls are common, using networks exposes systems to exploitation from billions of malicious actors. According to IBM’s Security “X-Force Threat Intelligence Index 2021” network access is now the #1 initial cyber-attack vector; “Scan open networks and exploit”. Log4Shell is a very notable recent example, one of the worst cyber incidents of all time. With more apps, more users, and an increasingly digital operating enterprise, the risks are escalating. A Zero Trust approach changes this risk profile by removing all open ports in your firewalls. Now, access is authorized before a connection can be made. System operators can apply application level microsegmentation, least-privileged access and gain the power of programmable, visible and policy-based security. Not only is the external network attack surface gone, but should a breach occur any risk is dramatically reduced. Agility Embedded Zero Trust benefits from being “Secure by Design”, built in at the start, not bolted on later. This means the software itself contains everything needed for end-to-end secure connections. In an industry demanding faster response to consumer preferences and market opportunities, a software-only, cloud-native solution removes many of the traditional constraints to faster innovation. Replacing the traditional hardwarecentric networking model of proprietary islands with a software-first, APIs model, eliminates infrastructure dependencies and speeds agility. Underlying edges, clouds, and networks no longer present innovation friction. Minimize friction between features and security, we can have both. For example, lottery apps for player claims, gaming websites and business applications like digital licensing platforms, can be secured with embedded “Security as Code”. Business Case Organizations are adopting “Security as Code” not just for the power of Zero Trust, but also because it enables a path toward the replacement of legacy private network solution components with a single, unified, zero trust, scalable, cloud native Network as a Service solution. Areas for realizing savings include both capital and ongoing operational expenses; MPLS, SD-WAN, VPN and data center switches to major cloud providers. Additional savings are often realized in areas such as multi factor authentication and other cyber security tools and resources. What’s Next Now is the time to see how Zero Trust “Security as Code” can work for your organization. The increasing federal and state momentum toward Zero Trust security requirements, and the demand for faster cycles of automation and innovation opens the door for a better way; one that simplifies security, reduces complexity, and augments agility. Best of all, there is no need to replace anything or change the way you do business. You can test Zero Trust, “Security as Code” with no risk. n gaming@netfoundry.io https://info.netfoundry.io/gaming Games of chance are inherently all about trust. Today’s lottery and casino operators are highly focused on ensuring integrity and security of the games because cyber threats continue to mount. But how do operators handle the accelerating digital transformation while ensuring they are not in the news headlines for the wrong reasons? Shifting to a secure-by-design approach using embedded “Zero Trust” will greatly reduce the attack surface of any application based on authorize, before connecting – i.e. the system cannot be subject to external network level attacks. Beyond the major security gains, operators can now ensure security and compliance keep pace with the velocity of automation, and innovation, not slow it. TRUST: WHY “ZERO TRUST” IS THE FUTURE

RkJQdWJsaXNoZXIy NTg4MTM=