FCI Cyber Services

Aligned With The

Cybersecurity Framework

FCI provides the first and only Cybersecurity solution of the National Institute of Science & Technology (NIST) Cybersecurity Framework from the U.S. Department of Justice‚Äč

FCI Managed Cyber Services per Function

NIST Function 1

Identify

Manage cybersecurity risk to systems, people, assets, and data

FCI Identification Services

  • NIST Asset Inventory & Cyber Posture of Devices
  • Unknown Device Categorization
  • Device Cyber Lifecycle Management (Onboarding, Ongoing, and Offboarding)
  • User Management
  • Application Discovery
  • Correlation of Users, Devices & Applications
  • FCI NIST-Based Technical Control Standard Enforcement
  • Automated Tools to Ensure Proper Configuration/Controls:
  • On Desktops, Laptops, Servers, Virtual Servers, Smartphones & Tablets
  • Enforced Without User Involvement
  • Device Settings: Complex Password, Firewall, Logs, Screen Saver, OS Patches, etc. (Extensive list available)
  • Cyber Tools: Full-Disk Encryption, Antivirus, Antimalware, MFA
  • Threat Identification
  • Risk Assessment Including Testing & Scanning of Technical Controls and Review of Policies & Procedures

NIST Function 2

Protect

Implement safeguards to ensure delivery of critical services

FCI Protection Services

  • Security Awareness Training for Leadership (CEO, CISO, ISO, Train-the-Trainer, etc.)
  • Data Loss Prevention through Managed Endpoint Protection:
  • Antivirus, Web Protection, Network Protection, Peripheral Protection, etc.
  • Full-Disk Encryption with Key Management Services
  • Malware Detection & Blocking
  • Data Leakage Protection
  • Managed Network Protection
  • Gateway SSL VPN
  • Email Encryption Guidance
  • Mobile Device Management
  • Multi-Factor Authentication
  • Access Controls Including Privileged Users
  • Disaster Recovery Image Backup

NIST Function 3

Detect

Identify the occurrence of a cybersecurity event

FCI Detection Services

  • 24x7 Cyber Threat Monitoring
  • 24x7 Cyber Compliance Monitoring
  • Endpoint Intrusion Detection & Prevention
  • Network Intrusion Detection & Prevention
  • Security Incident Event Monitoring & Management
  • Log/Data Aggregation
  • User Behavioral Analytics (UBA)
  • Real-Time Security Alerts & Reporting
  • Insider Threat

NIST Function 4

Respond

Take action regarding a detected cybersecurity incident

FCI Response Services

  • Active Automated Incident Response
  • Cyber Expert Incident Response
  • Mass Vulnerability Response for Imminent Risk (Zero-Day, etc.)
  • Incident Response Support:
  • Documentation
  • Evidence Gathering, Preservation & Presentation
  • Cyber Incident Handling & Forensic Analysis During an Incident
  • Breach Determination

NIST Function 5

Recovery

Restore services that were impaired due to a cybersecurity incident

FCI Recovery Services

  • Automated Recovery Services
  • Cyber Expert Recovery Services
  • Restoration Recovery Services

FCI Cyber Services

Managed, Automated, & Scalable

E N D P O I N T

Security

Desktops, Laptops, Servers, Virtual Servers, Smartphones, Tablets

N E T W O R K

Security

Firewall, Gateway SSL VPN, WiFi

Risk Assessment

Technical Controls Scans, Policies & Procedures Review

iPaaS

Integration Platform As A Service for CRM Sync