Case Study
FTI Consulting (United Kingdom)

FTI Consulting is an independent global business advisory firm dedicated to helping organizations manage change, mitigate risk, and resolve disputes: financial, legal, operational, political and regulatory, reputational, and transactional. Individually, each practice is a leader in its specific field, staffed with experts recognized for the depth of their knowledge and a track record of making an impact. Collectively, FTI Consulting offers a comprehensive suite of services designed to assist clients across the business cycle – from proactive risk management to the ability to respond rapidly to unexpected events and dynamic environments.

The Challenge

The primary challenge for FTI Consulting was to ensure data security in the new working conditions and requirements resulting from the pandemic. The company was looking to adopt a new DLP solution that helps to monitor employee activity related to data transfers and mitigates insider threats while working remotely.

The tool they were looking for would help to ensure compliance with data security standards, such as ISO27001 and ISO27017.

The company was also looking for an additional layer of security to prevent data loss and data leaks.

The Solution

FTI Consulting uses Endpoint Protector’s Device Control module for USB and peripheral port control and the Content Aware Protection module for monitoring data in motion.

“FTI Consulting has been ISO27001 & 27017 certified for almost 10 years and therefore has very specific compliance requirements. The way we work has rapidly transformed since the pandemic, and WFH has become the norm with the inevitable introduction of remote collaboration & conferencing tools that also introduce new risks to any business. FTI Consulting had to ensure data-centric security/compliance across different platforms, particularly app-specific granular DLP control.” - Z.A. said.

The Device Control module allows granular control of the USB ports and connected storage devices. It prevents accidental or intentional data loss and data leaks while also protects the endpoints against the spread of USB malware, BadUSB attacks, and viruses. The Content Aware Protection module helps companies scan and protect data in motion with content inspection and contextual scanning of data. This module prevents data leakage and data loss through various exit points, including web browsers, email clients, and applications such as Microsoft Outlook, Skype, or Dropbox.

For FTI Consulting, it was important to choose a DLP solution that is easy to deploy and use.

“From our first engagement with Endpoint Protector, we were immediately allocated a dedicated point of contact who has helped us through the Trial and assisted in addressing FTI's requirements. Although the Trial and Proof of Concept were highly involving, our designated Endpoint Protector contact has been very proactive in connecting us with the right people and ultimately getting our contract with Endpoint Protector in place,” -.Z.A. added.

FTI Consulting rated Endpoint Protector’s features as very good. The solution’s granularity, ease of installation and ease of use, staff availability when calling or asking for assistance, support, and updates were rated as excellent.

Why Endpoint Protector?

FTI Consulting chose Endpoint Protector because it helps address multiple DLP challenges, such as remote data protection, insider threat management, data-centric security, and compliance.

Let’s talk about your use case

Fill in the form below to get in touch with one of our DLP experts
Check your email to download .
If you don't see it please check your spam or junk folders.



Please use a valid email address!
Data Loss Prevention (DLP) for Finance & Banking Institutions
Download our free ebook on
Data Loss Prevention (DLP) for Finance & Banking Institutions

The importance and sensitivity of the information that finance and banking institutions collect have been acknowledged even before the advent of digital records. With the growing amount of digital data, privacy and security concerns are also increasing, while preventing a data breach is becoming a more complex challenge.

The case study is also available for download