PROTECT
Managed Endpoint Protection
For desktops, laptops, servers, smartphones and tablets at the office, at home, on the road... and even in space!
Protectit
If the endpoint is not secure, nothing is secure
Endpoints used to access, store or control private data must be known and protected
SOFTWARE | USERS | ENDPOINTS | NETWORKS
Zero Trust
Complete
FCI new offering to meet cybersecurity regulations and stay safe
PREPARATION
Configuration & Deployment
It all starts with your cyber program or information security policy from which we get the cybersecurity minimum standards to enforce to all endpoints.
An installation link is configured and sent to users who will have nothing more to do than to click the link.
Cyber Program / WISP (Written Information Security Policy)
- From your documentation and applicable regulatory requirements
- Cybersecurity minimum standards are agreed upon
Software Agent Customization
- Configuration of FCI software agent according to minimum standards
- Installation link is provided for manual deployment
Communication to Users
- Email template is reviewed with CISO
- CISO sends email to all users to announce the project and timeframe
Software Agent Deployment
- CISO sends FCI installation link to all users
- Users click on the installation link
- Option for automated deployment with FCI Security Policy Enforcement System
ENFORCEMENT
Automated Enforcement of Cyber Settings & Tools
As soon as the Software Agent is installed, our automated platform takes over. Without user intervention or disruption, cyber settings will be automatically configured and cyber tools installed.
Seamless & Secure Deployment
- Enforcement of settings and tools without user involvement or disruption
- Managed enforcement cannot be altered by users or hackers
Endpoint Cyber Settings
- Complex password, firewall, logs, inactivity timeout, OS patches, etc.
- Full-Disk Encryption with key management services
Managed Endpoint Protection Software
- For Windows and Apple computers
- Antivirus, Web and peripheral protection, etc.
- Malware detection and blocking
- Ransomware and behavioral analysis
- Includes MXDR
Multi-Factor Authentication (MFA)
- For Android and iOS smartphones
- MFA installation on smartphone
- Minimum standards settings configured by users
- To authenticate access to computers
- Option to configure MFA for Web apps
COMPLIANCE
Cyber Support
With our wide range of technical capabilities and expertise, we streamline your deployments and minimize end-user and business disruptions with a human touch.
Our Support Team
- Trained cybersecurity technicians
- No call center agents, no call scripts, no robot!
End-User Cyber Support Services
- Email and phone support
- Embedded ticketing system
- Project management
CISO & Security Officer Compliance Support
ECONOMICS
Endpoint Protection Pricing
Model
- Implementation fees
- Monthly billing on actuals for current number of protected endpoints
- Per hour billing for additional services and advanced configuration
Pricing Models
Enterprise
Pilot Project
Enterprise
Visibility
- Option
- Option
- Option
- Option
- Option
All Firms
Zero Trust Core
- Basic
- Option
All Firms
Zero Trust Complete
- Advanced