Network Security

For Firewall, Gateway SLL VPN & WiFi

FCI Managed Cyber Services per Function

NIST Function 1

Identify

Manage cybersecurity risk to systems, people, assets, and data

FCI Managed Network Identification Services

  • Unknown Device Categorization
  • FCI NIST-Based Technical Control Standard Enforcement
  • Automated Tools to Ensure Proper Configuration/Controls:
  • Firewall: No Opened Ports, No Remote Desktop Access, Logging Retention Period
  • WiFi: Visible for Guest WiFi, Hidden for Staff & Advisors, Wired-Only Management
  • Threat Identification

NIST Function 2

Protect

Implement safeguards to ensure delivery of critical services

FCI Managed Network Protection Services

  • Security Awareness Training for Leadership (CEO, CISO, ISO, Train-the-Trainer, etc.)
  • Data Loss Prevention through Managed Network Protection:
  • Firewall Patching & Updates
  • Network Content Filtering
  • Data Leakage Protection
  • Gateway SSL VPN

NIST Function 3

Detect

Identify the occurrence of a cybersecurity event

FCI Managed Network Detection Services

  • 24x7 Cyber Threat Monitoring
  • 24x7 Cyber Compliance Monitoring
  • Network Intrusion Detection & Prevention
  • Security Incident Event Monitoring & Management
  • Log/Data Aggregation Securely Transmitted & Stored, Eliminating Overwrite Risk
  • User Behavioral Analytics (UBA)
  • Real-Time Security Alerts & Reporting
  • Insider Threat

NIST Function 4

Respond

Take action regarding a detected cybersecurity incident

FCI Managed Network Response Services

  • Active Automated Incident Response
  • Cyber Expert Incident Response
  • Mass Vulnerability Response for Imminent Risk (Zero-Day, etc.)
  • Incident Response Support:
  • Documentation
  • Evidence Gathering, Preservation & Presentation
  • Cyber Incident Handling & Forensic Analysis During an Incident
  • Breach Determination

NIST Function 5

Recover

Restore services that were impaired due to a cybersecurity incident

FCI Managed Network Recovery Services

  • Automated Recovery Services
  • Cyber Expert Recovery Services

Support

FCI Network Support Services

  • Phone & Email Cyber Support
  • Ticketing System
  • Project Management

Pricing

Requirements

  • Endpoints must be secured by FCI
  • Firewalls must be supported by FCI

Pricing based on:

  • Maximum number of simultaneous connected local devices
  • Maximum number of simultaneous connected VPN users
  • Internet connection speed
  • Plan to increase number of devices

Contact us for an estimate!