Prisma Access delivers proven solution for Caesars
Because of the potential risks, Caesars has put tremendous effort into their M&A security vetting process. “We make sure
not to compromise ourselves by being overly eager to connect,” says Wilkins.
The due diligence Caesars performs during an acquisition or merger is multidimensional. First and foremost, Caesars never
fully opens their network to a new company. Instead, it deploys Prisma Access, a cloud-delivered security platform that is
part of the Palo Alto Networks SASE solution. Prisma Access allows Caesars to put up a shield between the organizations,
ensuring security policies reflect exactly which systems and data the merging entity’s users need to access. Prisma Access
consolidates multiple products, including Firewall as a Service (FWaaS), Cloud Secure Web Gateway (SWG), Zero Trust
Network Access (ZTNA) and Cloud Access Security Broker (CASB) capabilities, all in a single platform. “It delivers what we
need,” says Wilkins.
Caesars’ cybersecurity team recently made a decision to transition to a Zero Trust network. As a result, Caesars has updated
their cybersecurity reference architecture to reflect the move to Zero Trust and is moving to implement an always-on
firewall-based approach as part of this process.
“In pre-zero-trust days, we would have reached the point where we thought we’d done enough, and would put the new
firm on the network,” says Wilkins. “But in today’s zero-trust world, we’ll keep that firewall segmentation intact, because
there’s really no reason that Property A should ever talk directly to Property B.” When users of Property B need to access
Property A corporate assets, Prisma Access allows Caesars to codify the right policies to ensure that they get what they need.
After establishing appropriate security and access policies with Prisma Access, Caesars then performs what it calls a “dual
risk assessment.” It engages an external third-party cybersecurity firm to check out both organizations— Caesars and the
new company—in a full vulnerability and risk assessment. “This way, both sides feel sufficiently comfortable to connect
their networks,” Wilkins says.