Network Security

Always-on network security with no gaps — because advisors won’t turn on a VPN, so FCI does it for them.

Always-on VPN with cloud-based firewall, on-premise firewall management, IP-based access control, DNS filtering, and centralized network logging — applied to every user, every device, every location.

Thousands+
endpoints on always-on VPN
Hundreds+
managed firewalls
0
frustrated users
The Problem

Most firms have no idea what their network actually looks like.

85% Don’t Connect
Users won’t turn on a VPN. No consequence for leaving it off, no benefit they can see. Network logs are not being captured.
Commercial VPN Falls Short
Encrypts the tunnel — that’s all. No DDoS, no intrusion prevention, no content filtering, no DNS control, no regulatory logging.
Firewalls Neglected
Stale firmware, default rules, ports opened and never closed. Set up once by a provider who may not be managing it anymore.
Open RDP Ports
Among the most exploited attack vectors. Every open port is a door — and bad actors scan for them continuously.
No Home Office Firewall
Consumer routers with no intrusion prevention, no gateway, no logging. The firm’s perimeter stops at the office door.
Missing Network Logs
On-premise firewalls produce local logs no one collects. Remote users produce no logs at all. Regulators expect both.
What FCI Delivers

Seven capabilities — enforced without asking.

Always-on VPN with cloud-based firewall gives every user firewall-grade protection regardless of location. On-premise firewalls protect every office.

Always-On VPN + Cloud Firewall
Computer on = VPN on. Every connection routes through a cloud-based firewall with DDoS protection, intrusion prevention, content filtering, DNS control, and centralized logging. Thousands deployed with zero disruption.
IP-Based Access Control
Known IP from VPN locks down critical systems. Bad actors can’t reach the login page. Systems without MFA are secured by IP restriction. Users stay on VPN to keep access.
DNS Filtering & Control
Malicious domains blocked before they resolve. Web filtering enforced. Every DNS query logged. Through cloud firewall for remote, on-premise firewall for office.
Centralized Network Logging
VPN connections, DNS queries, firewall events, intrusion alerts — all centralized, searchable, and available through the FCI Portal. No local logs lost or uncollected.
On-Premise & Assessment

Every office firewall managed. Every network tested.

On-Premise Firewall
Assessed, hardened, firmware current, configs logged, rules audited, open ports closed — including RDP
Penetration Testing
Internal and external. Simulates real attacks. NYDFS requires both. SEC, FINRA, and NAIC expect it
Vulnerability Scanning
Missing patches, misconfigured services, open ports — prioritized findings with remediation tracking
Firewall Inventory
Complete inventory of all network infrastructure — on-premise, cloud-based, VPN config per device
Intrusion Prevention
Active monitoring at both cloud-based and on-premise firewalls with centralized alerting
Content Filtering
Web filtering policies enforced for all users — cloud firewall for remote, on-premise for office
Comparison

Why a commercial VPN is not network security.

DDoS Protection
Commercial VPN: No. On-premise: office only. FCI: every user, every location
Intrusion Prevention
Commercial VPN: No. On-premise: office only. FCI: every user, every location
Content Filtering
Commercial VPN: No. On-premise: office only. FCI: every user, every location
DNS Control
Commercial VPN: provider controls DNS. FCI: corporate controlled, every query logged
Always On
Commercial VPN: user must turn it on (they won’t). FCI: automatic from power-on
Regulatory Evidence
Commercial VPN: none. On-premise: partial, local. FCI: complete, centralized
How FCI Is Different

Same technology, different results — four reasons why.

Expert Mastery
Hundreds of financial services environments. FCI knows which firewall configs create gaps, which VPN settings cause disruption, and how to deploy at scale with zero frustrated users.
Automated Procedures
VPN engages at power-on. Cloud-based firewall routes all traffic. On-premise firewall hardening detects drift and corrects. No tickets, no reminders, no user reliance.
Consistent Controls
Every user gets cloud-based firewall protection. Every office gets managed on-premise firewall. No gap between corporate and field. No “we’ll get to it later.”
Persistent Proof
VPN logs, firewall events, DNS queries, intrusion alerts, pen test results, vuln scan reports. Evidence produced every day — not just on audit day.
Interconnection

Network security strengthens every other domain.

A secured network is an access enforcement layer, a logging foundation, and a control point that connects all six domains.

The Principle
No single domain failure defeats the system — every layer reinforces every other layer
Endpoint Security
VPN-connected endpoints route traffic through the cloud firewall, creating defense in depth
User Security
IP-based access control makes stolen credentials useless from unknown IPs
Cloud App Security
Restrict M365 and cloud apps to known VPN-assigned IPs only
Data Security
DNS filtering blocks exfiltration. Content filtering prevents unauthorized access. VPN encrypts transit
Firm Security
Every network event feeds the FCI Portal with continuous evidence
What You Can Prove

Evidence that builds itself — every day, not just on audit day.

VPN + Cloud Firewall
Proof every connection routes through a managed firewall — not just an encrypted tunnel
On-Premise Compliance
All firewalls inventoried, hardened, patched, and monitored with full config history
Pen Tests & Vuln Scans
Annual internal and external testing with findings, risk ratings, and remediation tracking
FCI Portal
Network logs, IP access records, DNS filtering, firewall events — all searchable at any point in time
FINRA SEC NYDFS NAIC State Regulators Cyber Insurance Home Office

Ready to see what network security looks like when every user has a firewall — not just the ones in the office?

FCI works with broker-dealers and branch offices, insurance carriers and agencies, and RIAs. Start with a gap analysis — it is free, takes 30 minutes, and commits you to nothing.

Phone 973-227-8878
Web fcicyber.com