Endpoint Security

For Desktops, Laptops, Servers, Virtual Servers, Smartphones & Tablets

FCI Managed Cyber Services per Function

NIST Function 1


Manage cybersecurity risk to systems, people, assets, and data

FCI Managed Endpoint Identification Services

  • NIST-Based Asset Management Report & Cyber Posture of Devices
  • Network-Attached Device Discovery Report
  • Unknown Device Categorization
  • Device Cyber Lifecycle Management (Onboarding, Ongoing, and Offboarding)
  • FCI NIST-Based Technical Control Standard Enforcement
  • Threat & Vulnerability Identification

Automated Tools to Set & Capture Proper Configuration/Controls

  • On Desktops, Laptops, Servers, Virtual Servers, Smartphones & Tablets
  • Enforced Without User Involvement
  • Device Settings: Complex Password, Firewall, Logs, Screen Saver, OS Patches, etc. (Extensive list available)
  • Cyber Tools: Full-Disk Encryption, Antivirus, Antimalware, MFA


  • User Credential Management
  • Web Application with Private Data Discovery
  • Correlation of Users, Devices & Web Applications with Private Data
  • Validation of Identify results (Checks & Balances)

NIST Function 2


Implement safeguards to ensure delivery of critical services

FCI Managed Endpoint Protection Services

  • Security Awareness Training for Leadership (CEO, CISO, ISO, Train-the-Trainer, etc.)

Data Loss Prevention through Managed Endpoint Protection

  • Antivirus, Web Protection, Network Protection, Peripheral Protection, etc.
  • Full-Disk Encryption with Key Management Services
  • Malware Detection & Blocking
  • Data Leakage Protection
  • Email Encryption Guidance & Recommendations
  • Mobile Device Management
  • Multi-Factor Authentication to Access Endpoints


  • Multi-Factor Authentication to Access Web Applications with Private Data
  • Access Controls Including Privileged Users
  • Cyber Recovery Image Backup

NIST Function 3


Identify the occurrence of a cybersecurity event

FCI Managed Endpoint Detection Services

  • 24x7 Performance & Availability Monitoring
  • 24x7 Cyber Threat Monitoring
  • 24x7 Cyber Compliance Monitoring
  • Endpoint Intrusion Detection & Prevention
  • Security Incident Event Monitoring & Management
  • Log/Data Aggregation
  • User Behavioral Analytics (UBA)
  • Real-Time Security Alerts & Reporting
  • Insider Threat

NIST Function 4


Take action regarding a detected cybersecurity incident

FCI Managed Endpoint Response Services

  • Active Automated Incident Response
  • Cyber Expert Incident Response
  • Mass Vulnerability Response for Imminent Risk (Zero-Day, etc.)

Incident Response Support

  • Documentation
  • Evidence Gathering, Preservation & Presentation
  • Cyber Incident Handling & Forensic Analysis During an Incident
  • Breach Determination

NIST Function 5


Restore services that were impaired due to a cybersecurity incident

FCI Managed Endpoint Recovery Services

  • Automated Recovery Services
  • Cyber Expert Recovery Services


  • Restoration Recovery Services (included with Backup services)


FCI Endpoint Support Services

  • Embedded Ticketing System for End-User Cyber Support
  • Project Management

For Any Device

Windows 10 Pro, Apple Mojave & Linux
Desktops, Laptops, Servers & Virtual Servers
Android & iOS
Smartphones & Tablets



Endpoint Security
$ 30 Per Device, Per Month
  • Identification Services
  • Protection Services
  • Detection Services
  • Response Services
  • Recovery Services
  • End-User Cyber Support
* One-Time Setup Fees Not Included


  • User Management​
  • Application Discovery​
  • Correlation of Users, Devices & Applications​
  • Access Controls Including Privileged Users
  • Cyber Recovery Image Backup

Volume Pricing

Available for more than 50 devices