Futurex provides scalable, compliant, encryption technology for securing data at the core of the casino gaming industry. Our technology protects the financial security and validity of gaming devices across the casino floor and offers solutions for the secure storage of patron data.
Advantages of Hardware Based Encryption
Whether in storage or while in transit, hardware-based data encryption is one of the most secure and efficient methods for protecting sensitive data. Futurex hardware-based data encryption offers tamper-responsive protection, industry-leading transaction speeds, and support for the most advanced cryptographic algorithms in the most demanding environments. With regulations and privacy requirements for the casino gaming industry varying from state-to-state, the Hardened Enterprise Security Platform is your all in one security solution.
Through player clubs and loyalty programs, casinos collect Personally Identifiable Information (PII) in the form of names, addresses, Social Security numbers, payment card information, spending patterns, and more. Encrypted storage solutions protects this information from dangerous outside entities while meeting all national and international compliance requirements for storing PII.
G2S: Customizable Slot Machines and Video Games
Customizing electronic game machines (EGM) not only makes the casino environment more exciting and interactive for the patron, it improves organization profitability. Object signing and the mutual authentication of devices secures the transfer of gaming software and firmware from back server rooms to the EGM, protecting game algorithms from outside tampering and false positive results. It maintains the integrity of the game’s operating system and the unique keys it contains, all within a FIPS 140-2 Level 3-validated Secure Cryptographic Device.
Game to System (G2S) communication protocols, developed by the Gaming Standards Association (GSA), allow the industry to communicate with back room servers, providing the flexibility to cater environments to individual patrons. Cryptographic object signing by a certificate authority determines that both the sending and receiving devices are authorized to share information and that the information transferred is authentic. Valid signatures allow the devices to mutually authenticate one another, preventing malicious users from tampering with software, firmware, or game parameters such as payout percentage.
Data Encryption at the Source
On the casino floor there is one game that captures a lot of attention: the slot machine. The ESM1000 general purpose hardware security module is a small form factor device which can be embedded directly into individual casino gaming machines. This can be used to encrypt and decrypt traffic sent between the server and the machine. Likewise, it ensures authenticity of gaming software, guarding against modification by outside sources. For gaming machines that directly accept loyalty or player cards, it also encrypts sensitive cardholder data.
Secure Storage of Personally Identifiable Information (PII)
Casinos have the responsibility of securing collected patron information. Futurex solutions protect this data. In the event that storage drives containing these records are compromised or stolen, the data contained on them would be useless to an attacker. The Futurex SAS9000 provides a method for storing vast quantities of data and has the ability to serve as a secure, network-attached storage server, with optional tokenization functionality. Rather than store important data in-the-clear, tokenization utilizes identifying strings, or “tokens”, for storage. To retrieve stored data, the relevant token is sent to a HSM, which returns the requested data in a secure manner.
Hardened Enterprise Security Platform Solutions
Encrypt, manage, and store high volumes of your sensitive data in Futurex’s best-in-class attached storage solution
- Support for multiple separate databases within a single SAS9000 unit
- Adjustable, customizable role-based separation of duties
- Automatic hard drive replication and advanced hardware redundancy features
- Ten hot-swappable storage bays
Hardened, enterprise-class key and certificate lifecycle management solutions
- Full symmetric and asymmetric key and certificate management
- Robust, versatile API for programmatic automation of repetitive tasks
- Easy, convenient generation of certificate trees
- Permission-based user management system with dual control
- Customized monitoring and alerting
Integrate small form-factor encryption devices directly into a variety of environments for on-site data security
- Supports all common key types and protocols
- Optional external self-contained enclosure
- Optimized size, weight, power, and cooling characteristics
- Supports mutual authentication under a trusted root certificate