FCI_Logo_white_font

Keeping Your Information Safe

Protectit

Cybersecurity Policy
Enforcement System

For Financial Services Firms

3 Seamless Steps

to Cybersecurity Compliance

Our Passion?

Your Protection

MSSP

We are a Managed Security Service Provider (MSSP)

We Deliver Cybersecurity Tools & Compliance
It simply means you have nothing to do. 24/7, we take care of everything.

From our Security Operation Center (SOC), and according to your Written Information Security Policy (WISP), we install, configure, and monitor all the cybersecurity tools you need to be safe and compliant.

Clients We Protect

For Whom Attestations Are No Longer Enough

E n t e r p r i s e s

Financial Services Firms With Independent Sales Offices
Insurance Carriers, Broker Dealers, & Corporate RIAs

A d v i s o r s

Independent Advisors Managing Their Own Cybersecurity
RIAs, Advisors, Registered Reps, & Insurance Agents

Branch & Agency Cybersecurity Protection

For Some Of The Largest Broker Dealers & Insurance Carriers

 
 

We Keep Cyber Incidents From Becoming Breaches

Struggling To Comply With Cybersecurity Regulations?

OCIE, NYDFS, DOL, SEC, Reg SP, State, FINRA, NIST, HIPPA, GLB, etc.
Cybersecurity Regulations
Insurance Requirements
Cybersecurity Policies
Cybersecurity Examination Initiative

Office of Compliance Inspections and Examinations (OCIE)

Cyber Regulation 23 NYCRR Part 500

Department of Financial
Services (DFS)

Insurance Security Data Model Law

National Association of Insurance Commissioners (NAIC)

One Solution
To Comply
With Them All

C Y B E R S E C U R I T Y
Protect your private data from cyber threats & liabilities
C O M P L I A N C E
Delivery and enforcement of the required Technical Controls

What We Protect

Industry

  • Cyber regulatory watch
  • Managed services for the financial services industry
  • Education through speaking and advising
  • Expert commentary

Enterprises

  • Redundancy of compliance evidence for non-enterprise managed devices
  • Evidence of minimum technical controls at the time of login to enterprise applications
  • Enterprise application penetation testing

Firms

  • On-demand Scalable Cybersecurity Assessment with Vulnerability Scanning
  • Identified Vulnerability Remediation
  • Dark Web Monitoring
  • Website Whitelist / Blacklist

Sites

  • Firewall Management
  • Network Discovery

Endpoints

  • Automated WISP Enforcement
  • Managed Cyber Tools
  • Continual Vulnerability Reporting
  • 24x7 Cyber Monitoring

What Differentiates Us

Automated Asset Inventory Report

WISP Compliance Enforcement

24×7 Cyber Monitoring

Cyber Incident Response

And for the regulators? We are the

Benefits

No Implementation Project Required!

Low Impact On Resources
  • No implementation effort required from internal resources and IT staff
  • No ongoing support or dedicated team needed
  • Roll-out completely supported by FCI
Fast & Easy Installation
  • Users receive an email with a one-click install link
  • Protectit is installed on the computer and takes over from there
  • No other user involvement!​
Full Scalability & Flexibility
  • Split charges between Enterprise and Sales Offices
  • Per Sales Office and consolidated reporting
  • Add users simply by asking them to install Protectit
FCI_Logo_white_font

In The News

 
 

Protectit is the result of more than 20 years of Integration & Development from a team led by

Brian Edelman

Cybersecurity Expert & CEO of FCI

Brian founded FCI in 1995. He speaks frequently and joins panels at major conferences in the industry wherever there are critical discussions about Cybersecurity.

#Cyber_Godfather

"Brian is one of the few real cybersecurity experts in the field of advisor technology. he's a true thought leader."

Joel Bruckenstein

Journalist, Financial Technology Expert, T3 Producer, and a really great guy!

We Protect

Android & iOS Smartphones & Tablets
Windows, Apple & Linux Computers
Networks
FCI_DEVICES