Menu
FCI SOAR
Platform
An integrated, modernized cybersecurity platform built for compliance alignment from years of experience in the Financial Services Industry with all the modules needed to effectively service large Enterprises, their Field Offices, Independent Advisors, and Vendors
Automation

Automation for Scalability
Cyber consistency cannot be achieved through a manual process
MANAGED
Endpoint & Network Protection
“Managed” means you have nothing to do. Without user disruption or interruption, FCI protects your endpoints and networks while you focus on your core business.
Thanks to temper protection, no program or individual can disable, uninstall or change what we manage. This ensures your cyber settings and tools adhere to your policies and procedures.
Compliance Requirements
- According to the Written Information Security Policy (WISP) from your firm or your Home Office
- Enforce the specific cybersecurity regulations applicable to your firm
- Protect your data, your users and your firm
- Automated enforcement of security settings and tools
- Protect networks with managed firewall services
- Work securely from anywhere with Gateway VPN

Office, BYOD, Home, Remote, Travel... and Space!
CYBER POSTURE
Evidence of Compliance
Attestations are no longer enough. In the event of an audit, an exam, or a breach, you will have to demonstrate evidence (proof) that you are compliant. No worry, we have you covered.
The best way to prepare for this, and a cybersecurity regulation requirement, is to let us perform a security assessment of your systems, devices, and networks.
The best way to prepare for this, and a cybersecurity regulation requirement, is to let us perform a security assessment of your systems, devices, and networks.
NIST-Based Asset Inventory Report
- Security Information & Event Management (SIEM)
- Endpoint and network cybersecurity event logs
- Retention at FCI Data Centers
SIEM for Persistent Audit Trails
- Log aggregation from systems provided by FCI managed services
- Log retention at FCI Data Centers
- On-demand reporting during incident or breach
Security Assessment
- Technical Controls assessment
- Network penetration testing
- Vulnerability scans
- Evidence compliance of environment and systems
- Recommendations and report
Verify First, Then Trust
A Zero Trust approach considers users, devices, and systems as potential threats until proven otherwise
Holistic Cybersecurity Ecosystem
Zero-Trust
Users
Identify Users with Identity Provider (IDP) & MFA Solutions
Endpoints
Validate Endpoint compliance at the time of login to Systems of Private Data
Networks
Ensure Network protection with Firewall and Gateway VPN Solutions
Protection Against Unknown Devices
Advanced solutions for Home Offices and Enterprises
ZERO TRUST
Cybersecurity Policy Enforcement System
One of your biggest risks is having users login to a system of private data with unknown devices. FCI’s solution validates the cyber posture of a device before letting it access the system.
Systems of Private Data Gateway
Validation of compliance at the time of login
Integration with Web App Identification Gateway
- Automated deployment of cybersecurity software agents
- Evidencing compliance of technical controls at the time of access to Systems of Private Data
Device Identification
- Blocking unknown devices from accessing private data
- Matching usernames and devices
Enforcement
- Enforcing all devices (BYOD and firm-owned) connected to Workgroup, Domain, Azure, Live, or iCloud
- Evidencing compliance of technical controls with Asset Inventory Report and Dashboards
- Mass vulnerability Response
Validation of Compliance at the Time of Login
To stop unknown devices from accessing systems of private data


Cybersecurity Examination Initiative
SEC Risk Alert Volume IV, Issue 8
"... monitoring exfiltration and unauthorized distribution of sensitive information outside of the Firm through various distribution channels (e.g., email, physical media, hard copy, or web-based file transfer programs) and any documentation evidencing this monitoring."
Protection Against Data Exfiltration
Advanced solutions for Home Offices and Enterprises
ZERO EXFILTRATION
Cybersecurity Policy Violation System
Most of the efforts in cybersecurity are invested to protect you against external threats. What about internal threats when users, on purpose or by mistake, send private data to an external location or access Websites that are not allowed?
Data Exfiltration Protection
Data Leakage Protection (DLP)
Management Tools
- Alerts, reports, and dashboards
Web Controls
- Monitoring and blocking restricted Websites
- Third party Web apps allowed and not allowed
- Monitoring for unknows Web apps
Removable Storage (USB, Drive, etc.)
- Monitoring and blocking removable storage, local and Web storage apps
File Content
- Monitoring and blocking file content from being exfiltrated

Menu