Download PDF
AlienVault Secures b Spot’s Network for Innovative Gambling Platform
Technology Category
- Cybersecurity & Privacy - Network Security
- Cybersecurity & Privacy - Intrusion Detection
- Cybersecurity & Privacy - Security Compliance
Applicable Functions
- Business Operation
- Quality Assurance
Use Cases
- Intrusion Detection Systems
Services
- System Integration
- Cybersecurity Services
- Training
The Challenge
b Spot operates in a highly regulated industry and requires robust security practices to protect personal information from unauthorized access. The company needed a trusted security solution that could be quickly implemented and managed by a small team. During their competitive analysis, b Spot included AlienVault among the top contenders. The decision was influenced by a recommendation from a colleague in the aerospace industry who trusted AlienVault for its security capabilities. After evaluating AlienVault, b Spot decided it was the right fit for their security needs.
About The Customer
Founded in Los Angeles, California in 2012, b Spot is a revolutionary mobile-based game network that allows players to bet and win real cash. The company offers free-to-play mobile games, and when players are ready to place a bet, they can make a cash wager. All payouts are determined by live horse races. As part of the registration process, players must provide personal information to verify their identity. With around 50 employees, b Spot operates in the entertainment, gambling, and mobile games industries. The company maintains robust security practices to protect personal information from unauthorized access.
The Solution
b Spot chose AlienVault Unified Security Management (USM) platform for its security needs. AlienVault USM offers multiple security features, including threat intelligence updates, correlation directives, IDS signatures, vulnerability audits, asset discovery signatures, IP reputation data, data source plugins, and report templates. b Spot found significant value in AlienVault Labs, a research team that provides threat intelligence updates. The company used correlation directives from AlienVault Labs to detect and respond to POODLE attacks. Additionally, AlienVault’s Open Threat Exchange (OTX) allows members to share threat information, helping b Spot avoid breaches and minimize damage from attacks. As b Spot continues to grow, they rely on AlienVault USM to ensure their customer’s data is safely guarded.
Operational Impact
Quantitative Benefit
Related Case Studies.
Case Study
Protecting a Stadium from Hazardous Materials Using IoT2cell's Mobility Platform
There was a need for higher security at the AT&T Stadium during the NFL draft. There was a need to ensure that nuclear radiation material was not smuggled inside the stadium. Hazmat materials could often be missed in a standard checkpoint when gaining entry into a stadium.
Case Study
Visual Management on Gas Tankers
Gas tankers are massive ships with a limited crew, making them extremely difficult to monitor. Video surveillance systems, which use a large number of widely distributed devices, and fire prevention systems are both crucial elements of a gas tanker monitoring system.The system used for this application is a legacy analog CCTV surveillance system that is completely independent from the main monitor and control SCADA system. With this system, the administrator responds to an event by first using the SCADA system to locate the event, and then accesses the appropriate surveillance camera from the CCTV system to view the location. The goal is to upgrade the system so that only one step is required. This is done by integrating the CCTV surveillance system into the SCADA system, in which case the surveillance system becomes a SCADA sub-system, making centralized control and monitoring possible.System Requirements- Upgrade to an IP video surveillance system for integration with the existing SCADA system- Live video display (through the SCADA system)- Enable events in the SCADA system to automatically trigger live video display- All the devices need to be of rugged design and have an anti-explosion defense
Case Study
EMC's Transition to SMS for Real-Time IT Alerts
EMC, a global leader in cloud computing, data storage, and data virtualization, was struggling with an inefficient and slow method of alerting its 68,000 employees about IT system updates. The traditional method involved drafting an email, proofing it, getting approval from several stakeholders, and finally sending it. This process was not only labor-intensive but also unreliable as it depended on the user's email being unaffected and the user actually opening and reading the email. After sending 1.2 million alert emails in a single month, EMC decided to find a more efficient and immediate way to alert employees. The challenge was to find a solution that was not only faster and less labor-intensive but also globally available and scalable to EMC's needs.
Case Study
Leveraging Graph Technology for Enhanced Cybersecurity: A Case Study on MITRE's CyGraph
MITRE, a federally-funded, not-for-profit company that manages seven national research and development laboratories in the United States, was grappling with the challenge of managing an influx of cybersecurity data. The constant changes in network environments were impacting the security posture of U.S. government agencies. Intrusion alerts, anti-virus warnings, and seemingly benign events like logins, service connections, and file share access were all potentially associated with adversary activity. The cybersecurity researchers at MITRE needed to go beyond rudimentary assessments of security posture and attack response. This required merging isolated data into higher-level knowledge of network-wide attack vulnerabilities and mission readiness. The challenge was not the lack of information, but the ability to assemble disparate pieces of information into an overall analytic picture for situational awareness, optimal courses of action, and maintaining mission readiness. The team also struggled with fully comprehending a given security environment and mapping all known vulnerabilities.
Case Study
Data and Technology Company Acxiom Enhances Customer Data Protection with Fortinet
Acxiom, a company that designs and delivers customer intelligence solutions, is heavily invested in digital technology. With a business built on the ethical use of data, Acxiom faces the challenge of constantly evolving security threats. The company needed to ensure the protection of its customer data and insights into customer behavior. The challenge was to find a partner that could provide cutting-edge and next-generation technologies to keep up with the ever-changing threat landscape. Acxiom required a solution that could not only defend against attacks but also align with the different changes in the threat landscape.
Case Study
Experity's Security Operations Scaling with Rapid7 Managed Services
Experity, a dynamic Health Information Technology company, was formed from the merger of the two largest urgent care Electronic Medical Records (EMR) companies in the country. The merger led to a rapid expansion of personnel, office locations, software, and services, creating unique challenges for the security team. The team was tasked with protecting the company from loss events of any kind, requiring business continuity and standardization. The small security team was overwhelmed with the task of managing security operations and building resilience in their security program. The company's growth also meant that the security team needed a platform to vet alerts from the increasing number of employees and contractors. The existing Managed Detection and Response (MDR) platform was inadequate as it only monitored network and server activity and not endpoint activity.