New Mexico's Isleta Casino and Resort Expects to Win Big with Converged Network

The Isleta Casino and Resort, near Albuquerque, N.M., selects Extreme Networks to provide its facilities with a new converged network and a full complement of professional services for network assessment, design and deployment. The result is a complete solution for the organization, meeting all of the casino and resort's performance, voice, video and data convergence, security and wireless LAN requirements.

From the start of the decision to replace an outdated network, Extreme Networks worked with Isleta to build a new converged network from the ground up, conducting various network and IT assessments to help ensure that Isleta Casino and Resort could implement the necessary security, deliver IPTV video services and provide mobility for guests and staff throughout via wired and wireless LANs.

Extreme Networks deployed its BlackDiamond 8810 modular switches to provide data aggregation, Summit X450 fixed switches with Power over Ethernet (PoE) at the edge, and its Summit WM system with Altitude 350 wireless LAN Access Points for fast wireless connectivity.

"Extreme Networks network assessment services were tremendous because they pinpointed vulnerabilities and potential shortcomings, and then provided us with a clear and concise report that we could evaluate and then work from to harden our security and help to ensure availability," says Larry Loff, MIS manager for Isleta Casino and Resort. "The Gaming Regulatory commission has approved the network and we feel confident that we are one of the most secure gaming properties in the state."

The entire network for Isleta Casino and Resort, including wired and wireless, data, voice and video, is managed with Extreme Networks EPICenter software suite, providing comprehensive network management tools and a unified view to simplify device configuration and status monitoring. Additionally, the Extreme Networks Sentriant threat mitigation solution constantly monitors the network for abnormal traffic behavior and virus threats that lack signatures, helping to ensure integrity of data and communications.
X
This ad will auto-close in 10 seconds