Protectit

Cybersecurity Policy Enforcement System For Independent Sales Offices

3 Seamless Steps

To Cybersecurity Compliance

For Independent Sales Offices

1. Asset Audit

Cybersecurity Asset Inventory, Report, Review & Recommendations
  • Enterprise provides FCI with the list of Sales Offices.
  • FCI configures the Protectit installer.
  • Different configurations can be enforced to different group of users.
  • An email with a one-click install link is sent to Sales Office staff and advisors.
  • Users click on the link and Protectit is automatically installed in Audit mode on their device, without any other involvement from their part (no selection to make, no text to read, nothing!)
  • An inventory of all the assets and cybersecurity tools is provided with their configuration, version, etc.
  • The report is sent monthly, on-demand, or at any frequency, to each Sales Office and a consolidated version is sent to the Enterprise.
  • Different report packages can be sent to different groups of executives.
  • A list of all the devices connected to each Sales Office network is provided.
  • All devices are identified to allow future detection of new unknown devices.
  • FCI reviews the Inventory Report with the Enterprise.
  • Gaps are identified and discussed.
  • FCI gives recommendation regarding:
    • Device settings
    • OS & software patching

2. Policy Enforcement

Enforcement of Policy For Software, OS Patches & Device Settings
  • Enterprise and FCI jointly review the Written Information Security Policy (WISP) for these Software, OS and device settings:
    • Screen Saver Enable & Timeout
    • Password Complexity
    • OS & Software Patches
  • FCI configures Protectit according to the WISP for the OS and device settings.
  • All OS and device settings are automatically enforced according to the WISP.
  • The updated Inventory Report now shows all devices being in compliance for the OS and device settings.
  • FCI reviews the Inventory Report with the Enterprise.
  • Gaps are identified and discussed.
  • FCI gives recommendation regarding the cybersecurity tools.

3. Cyber Protection

Installation, Configuration, & Monitoring of Cybersecurity Tools
  • Enterprise and FCI jointly review the Written Information Security Policy (WISP) for these cybersecurity tools:
    • Antivirus / Anti-Malware
    • Full-Disk Encryption
    • Encrypted DR Image Backup
    • Secure Mobile Devices
    • Secure Encrypted Email
  • FCI configures Protectit according to the WISP for the cybersecurity tools.
  • All cybersecurity tools are automatically installed, configured, monitored and updated according to the WISP.
  • The updated Inventory Report nows shows all devices being in compliance for the cybersecurity tools.
  • Active monitoring is made
  • The WISP is automatically enforced if settings change.

Meet Regulatory Compliance Requirements

& Offer Decentralized Cybersecurity Solutions To The Field

Integration & Development (I&D)

FCI integrates best-of-breed cybersecurity software and augment them by developing intelligence layers through scripts, automations, proprietary methodologies and best practices

Best-Of-Breed Software

Cybersecurity Monitoring

Detects compliance and risk issues by actively monitoring the security impacts on an information system resulting from planned and unplanned changes to the hardware, software, firmware and environment of operation

Endpoint Protection

Prevents, searches for, detects, and removes software viruses, and other malicious software like worms, Trojans, adware and more

Full Disk Encryption

Protects information on your hard disk by converting it into unreadable code that cannot be deciphered easily by unauthorized people

Encrypted DR Backups

Backs up all your critical information: Software, OS, setting, data, etc. Also encrypts backups to prevent the information from being seen by unintended entities

Multi-Factor Authentication

2-step verification technology is an extra layer of security that requires not only a username and a password but also something that only the user has access to before allowing her into a system or program

CYBER SUPPORT services