DETECT & PROTECT
Managed Detection & Response
Included with all our services comes one of the top reasons you want us on your side. This is where we shine!
Monitoring, Detection & Remediation
Incident Response & Breach Support
24x7x365
Cyber Monitoring & Alerts
FCI’s systems identify the occurrence of cybersecurity events and alert our team so they can evaluate their severity. Based on the NIST Detect & Protect functions.
Endpoint & Network Monitoring
- Cyber threats, insider threats, and compliance
- Performance and availability
- Dark Web scans for breached credentials
- Intrusion Detection System (IDS)
Real-Time Alerts & Notifications
- All system alerts and notifications handled by FCI
- High risk alerts shared with Security Officers
- User requests sent to Security Officer for authorization
SIEM for Persistent Audit Trails
- Log aggregation from systems provided by FCI managed services
- Log retention at FCI Data Centers
- On-demand reporting during incident or breach
ALWAYS ON
Seamless Remediation
Most cyber threats are automatically remediated by our systems. Some threats may be identified while there are no current available solutions to protect against them. In this case, FCI develops and implements a workaround solution until a patch is available. Based on NIST Detect & NIST Protect functions.
Proactive Automated Response
Mass Vulnerability Response
- For imminent risk (Zero-Day, etc.)
- Rapid development and deployment of out-of-band (OOB) workarounds or alternate solutions until patch is available
- Forced reboot for security patch backlog
Insights for CISO/Security Officers & IT Resources
PROVEN TRACK RECORD
Security Incident Response
Over the years, FCI has gone through thousands of security incidents and hundreds of breaches, often with firms that became dedicated clients after.
Response Types
- Active automated systems
- Cybersecurity experts
Threat Case Management
- Pre-breach forensics
- Evidence gathering, preservation and presentation
Security Incident Response Team
- FCI representative as a team member
- Post-incident analysis and recommendations
- Breach determination support
AFTER THE STORM
Event Recovery & Breach Support
When the authorities, regulators, or cyber insurers get involved, they lead and we are your cyber expert representation
Breach Support to your Firm
- Event recovery services
- Advisory to senior management
- Notification content recommendations
Breach Support with Authorities, Regulators and Cyber Insurers
- Pre-breach evidence presentation
- Cybersecurity expert representation for your firm