Trial lock

This content requires an active subscription.

Contact one of our representatives for assistance.

Speak With A Representative
or Call: 1-888-670-8889 (US) or 1-844-618-3192 (CAN)

Benchmarking Reports

Industry-specific benchmarking reports built on years of in-depth industry data, collected using our innovative diagnostic programs. We aggregate the data across hundreds of IT departments in your industry to give you tailored vertical insights, all packaged in professional boardroom-ready reports.

Benchmarking report example
Reference Architecture Sample Slide

Gaming & Hospitality Reference Architecture

Reference architectures built on years of industry expertise, honed by analysts working with real IT professionals in your industry. Leverage industry best practices so you don’t waste time and money reinventing the wheel.

Gaming & Hospitality Notes

Short, tailored research notes aimed at providing you with timely insights, relevant to your industry. Hot off the press, these notes will be published regularly and pair great with your morning coffee.

Filter by Category:
Clear Filters
Filter by Type:
Clear Filters
Premium white logo

Anti-Money Laundering: Lessons Learned From BCLC and Its Transactional Monitoring System

Filters:
Date published:

May 10, 2019

Author:
  • Mark Maby

Casinos employ substantial resources monitoring and processing suspicious activities in order to satisfy anti-money-laundering (AML) requirements. IT solutions can help and, in coming years, they may be necessary. However, the solutions have limitations, and pushing beyond those limitations can have negative consequences.

When a Breach Occurs, How Do You Inform Your Guests of What Has Occurred?

Filters:
Date published:

March 7, 2019

Author:
  • Filipe De Souza

The Starwood-Marriott breach is only one of a long history of data breaches going all the way back to 2010. When one happens to your organization, are you prepared to deal with all the privacy concerns?

Hotels Need to Lock Down Their Point-of-Sale Systems Now, Before It’s Too Late

Filters:
Date published:

January 10, 2019

Author:
  • Ian Mulholland

True or False? POS systems are secure upon set-up. FALSE: weak passwords, improper system set-up, insecure remote access, unpatched software, untrained employees, missing remediation plans, and malware infection are all potential ways in which a POS system can become vulnerable over time. Consider each of these elements when auditing the POS system. Improve passwords, patch software, secure remote access, train employees, develop policies and remediation plans, and install up-to-date antivirus software to combat these dangerous attacks.

Be Aware of Betting on AI-Enabled Bots and Voice Assistants in Gambling

Filters:
Date published:

December 21, 2018

Author:
  • Rajesh Parab

Artificial Intelligence (AI) enabled bots and voice assistants are starting to become mainstream and Gaming is no exception. AI in Gaming has its own implication due to its superior ability to predict outcomes. This has a potential to cause more harm than benefit to game-of-chance products such as sports betting and online casinos. The gaming industry must carefully evaluate the benefits and dangers of AI when it comes to venturing into AI-enabled bots and voice assistance technologies.

Author:
  • George Goodall

Info-Tech’s IT Management & Governance Diagnostic provides industry-level insights on the challenges of IT departments. We use a concept known as “service gap” to compare the rated importance of a particular IT process with its effectiveness. Use this data to review the existing IT strategy. Ensure that it includes initiatives that adequately address these shortcomings.