Detectit

Intranet Gateway

The Intranet Challenge

Cybersecurity is only effective when it is applied consistently throughout an enterprise. This presents a significant challenge to independent distribution models where the broker-dealer, marketing group, BGA, or other such distribution affiliate have limited control over the infrastructure and operations of affiliated producers and their practices.
In the event of a breach, this lack of control will likely provide very limited protection from liability to a distribution firm with deep pockets. The add to this challenge, the message of many distribution firms is that they will not impose operational burdens on the producer and will allow the firm to remain “independent”. 
This creates by definition a very heterogeneous environment with respect to hardware, software, infrastructure, and procedures—all of which must be managed effectively to deliver Cybersecurity.

Detectit

Cybersecurity is only effective when it is applied consistently throughout an enterprise. This presents a significant challenge to independent distribution models where the broker-dealer, marketing group, BGA, or other such distribution affiliate have limited control over the infrastructure and operations of affiliated producers and their practices.
In the event of a breach, this lack of control will likely provide very limited protection from liability to a distribution firm with deep pockets. The add to this challenge, the message of many distribution firms is that they will not impose operational burdens on the producer and will allow the firm to remain “independent”. This creates by definition a very heterogeneous environment with respect to hardware, software, infrastructure, and procedures—all of which must be managed effectively to deliver Cybersecurity.
The Detectit solution is a unique approach to addressing this challenge within the financial services distribution enterprise. Detectit is a cloud-based platform which is initiated by the sign-on and validation process for a sponsoring financial services distribution firm. The firm defines the security protocol, requirements, and base-level of protection for affiliates logging into the firm’s websites and tools.
Detectit then evaluates the “health” of the device—whether PC, tablet, or phone—prior to allowing the login to continue. If the user’s device is not healthy and consistent with the minimum Cybersecurity requirements of the enterprise, it then allows the user to sign-up for a service which will clean up and update the device so that it is consistent with the standards.
The criteria for the Detectit evaluation are set by the enterprise and aligned with the Cybersecurity requirements of the enterprise. However, the execution of the scan and the updates to the device are conducted by FCI, allowing an independent third-party to make the changes to the advisor’s devices and removing any concerns about access to client data or other potential concerns that an independent affiliate may have.

To Find Out More About Detectit