Skip to contentAbout Fig Group

20+ integrated GRC solutions across five lifecycle phases.

Fig maps those solutions to 65+ compliance frameworks across Discover, Protect, Respond, Prove, and Insure. From asset discovery to insurance-ready reporting, the platform helps teams work from the same current picture.

The lifecycle

From discovery through to insurance

Five connected phases. Evidence captured in one feeds the next, so teams work from a single current picture rather than five disconnected tools.

Phase 01

Discover

Identify your assets, data, and configurations.

Phase 02

Protect

Manage vulnerabilities and threats.

Phase 03

Respond

Handle incidents with structure and confidence.

Phase 04

Prove

Demonstrate compliance and control effectiveness.

Phase 05

Insure

Turn data into better insurance outcomes.

Catalogue

The complete solutions catalogue

Every Fig solution, grouped by lifecycle phase. Each one is part of the same governance-first platform - evidence and workflows connect across phases.

Built for both

Solutions for every organisation

Fig scales with MSPs, corporates, and teams of every size - same operating model, audience-tuned packaging.

For MSPs

Compliance as a managed service

Add resilience reviews, evidence collection, vulnerability management, and client reporting to your managed services. Deliver more value to SMB clients without replacing the tools your engineers already use.

  • White-label dashboard
  • Multi-tenant architecture
  • Reseller pricing
Explore MSP programme

For corporates

Direct governance and oversight

Get a clearer view of security posture, supplier risk, resilience work, and assurance evidence. Reduce tool sprawl, improve visibility, and show auditors, customers, and boards what has actually been done.

  • Enterprise SSO & RBAC
  • Advanced API integrations
  • Dedicated support
Request enterprise demo

Common questions

Frequently asked questions

What does a security and resilience platform replace?

Fig replaces fragmented combinations of evidence folders, spreadsheet trackers, point compliance tools, vulnerability scanners, policy libraries, risk registers, and board reporting packs. It connects those workflows in one operating model rather than forcing teams to stitch outputs together manually.

How are the solutions connected to each other?

Asset discovery feeds risk scoring, security telemetry feeds resilience work, policy controls drive remediation workflows, and the same operational data supports insurance and board reporting. That means evidence collected once can support multiple use cases.

Do we need to replace our existing tooling to use Fig?

No. Fig connects to the systems you already use across cloud, security, IT operations, identity, and service management so you can keep your current stack while adding clearer workflows and consolidated evidence.

Which teams benefit from the solutions catalogue?

MSPs use Fig to deliver security, resilience, and assurance services across client portfolios, while corporate teams use it for direct governance, third-party oversight, and audit readiness. The platform supports both independent and shared-control operating models.

How quickly can the platform start producing useful evidence?

Most customers are operational within 48 hours. Once integrations are connected, Fig begins collecting evidence, evaluating controls, and surfacing governance tasks immediately, so the platform becomes useful long before a traditional GRC rollout would finish.

Next step

Ready to take control of your security and compliance?

MSPs and corporate risk teams are consolidating their tools with Fig.