Skip to content
WHY FIG IS DIFFERENT

Compliance tools observe.
Fig enforces.

Most compliance platforms sit beside your tools and watch. Fig sits across them and acts. It is a fully operational ITSM that enforces governance based on your selected frameworks and your internal policies - not just the minimum bar, but the actual standards your organisation has committed to, keeping corporates and MSPs aligned from event to closure.

In short: Fig is a governance-first compliance platform that enforces your policies operationally - not a monitoring tool that observes and reports. It connects corporate and MSP data in one platform, maps to 65+ frameworks, integrates with 300+ tools, deploys in 48 hours, and includes embedded insurance for better cyber, PI, and D&O terms. The Control Evaluation Engine runs 100+ domain evaluators every 5 minutes per organisation - flagging consequences in real time.

300+
Integrations
65+
Frameworks
48hr
Go-Live
15-25%
Premium Reduction
RISK INTELLIGENCE

See where attacks are most likely to land

Fig analyses your environment to map attack probability density, highlighting the entry points and pathways that carry the highest risk.

Fig attack probability density heatmap showing threat entry points and risk analysis
THE PROBLEM

Compliance automation has a blind spot

The industry built tools that watch. Fig built a platform that acts.

Signal observers, not operational platforms

Existing tools connect to your stack with read-only access. They observe signals and report on status. But they do not sit in the operational flow. When something drifts, they flag it - they do not prevent it. You find out at audit time, not when it happens.

Framework minimums, not your actual commitments

Your clients do not care whether you meet the minimum bar for ISO 27001. They care whether you meet the commitments in their DDQ - your internal policies that often go well beyond framework requirements. Compliance tools enforce the framework floor. Nobody enforces the policy ceiling.

MSP and corporate misalignment

The corporate sets internal policy standards. The MSP enforces framework minimums using an observation tool. The gap between the two is invisible until a client audit surfaces it - and by then, trust is damaged.

Data lives in silos

Corporate data and MSP data have always lived in separate systems, requiring manual reports to bridge the gap. But these datasets are not independent - they are dependent. A vulnerability on a corporate endpoint is the MSP action item. An MSP remediation is the corporate evidence. Silos make both parties blind.

HOW IT WORKS

Frameworks + policies in. Enforced governance out.

Fig takes your selected compliance frameworks and your internal policies, connects across your entire tool stack, and turns them into enforceable operational governance - automatically.

01

Select your frameworks. Build your policies.

Start with the compliance frameworks you need - ISO 27001, Cyber Essentials, SOC 2, or any other standard. Then layer on your internal policies: the commitments from your DDQs, your board-approved standards, the controls that go beyond the framework minimum. Fig structures all of this as enforceable, operational rules.

02

Fig connects across your entire toolset

Fig integrates with your endpoint management, identity provider, vulnerability scanner, SIEM, cloud platforms, and more. But unlike observation tools that pull signals from these systems, Fig sits in the operational flow. Events do not just get reported - they get routed, assigned and actioned through the platform.

03

Frameworks and policies drive the ITSM

Fig is a fully operational ITSM - not a dashboard bolted onto someone else's. Every ticket, workflow, escalation and SLA is governed by both the framework requirements and the corporate's internal policies. The platform does not just tell you what is wrong. It creates the work, assigns the owner, and tracks it to resolution.

04

MSP and corporate operate from one platform

Both parties see the same policy-driven requirements. The MSP knows exactly what the corporate expects because it is encoded in the system - not interpreted from a framework document. The corporate knows exactly what the MSP is doing. Responsibilities are defined. There is no ambiguity.

05

Every event tracked from trigger to closure

When something fires in the corporate's integrated stack, Fig triggers a workflow aligned to the relevant policy - not a generic checklist. Every event has an owner, a policy-driven SLA, and a full audit trail. Nothing slips through because the platform enforces the governance. Compliance is not checked after the fact. It is enforced in real time.

CONNECTED DATA

One digital estate. One view. For the first time.

Corporate data and MSP data have always lived in silos - separate systems, separate reports, separate versions of the truth. But these datasets are not independent. They are dependent.

Before Fig
Corporate systems
Asset registers, policy documents, risk assessments, board reports, internal audit findings
Manual reports bridge the gap
MSP systems
Endpoint telemetry, vulnerability scans, patching status, incident tickets, remediation logs
Neither party has the full picture. A corporate's vulnerability is the MSP's action item. An MSP's remediation is the corporate's evidence. In silos, both are blind.
With Fig
Fig - One Operational Platform
Corporate and MSP data connected through one policy-driven platform
Corporate sees
Real-time enforcement status, MSP actions against their policies, full evidence chain
MSP sees
Exact policy requirements per corporate, assigned actions, tracked SLAs, closure evidence
For the first time, both parties have a comprehensive, connected view of the entire digital estate - governed by the corporate's own policies, visible in real time.

Fig vs. compliance monitoring tools

A direct comparison against platforms like Vanta, Drata, and other compliance automation tools.

CapabilityFigOthers
What it is
A fully operational ITSM that sits across your entire toolset and enforces governance
A signal observer that monitors tools and reports on compliance status
Compliance approach
Enforces both framework requirements and your internal policies that go beyond them
Monitors against minimum framework thresholds only
Integration model
Operational layer across your entire GRC stack - events flow through Fig, not past it
Read-only connectors that observe your tools and surface alerts
Policy management
Corporates build their own policies in the app; these drive all operational governance
Pre-built templates mapped to framework minimums
MSP-Corporate alignment
Both parties governed by the same policy-driven rules in a shared operational platform
MSPs interpret frameworks independently; corporates hope for the best
Event handling
Events from integrated tools trigger policy-aligned workflows and assigned actions
Events flagged for manual review against framework checklists
Responsibility tracking
Every task has a clear owner, tracked from event to closure with enforced SLAs
Shared dashboards with ambiguous ownership
Data model
Corporate and MSP data connected in one platform, providing a single view of the digital estate
Corporate and MSP data in separate silos, bridged by manual reports
Gap prevention
Policy enforcement means gaps cannot form - the platform will not allow it
Gaps discovered at audit time, months after they appeared

I spent years dealing with client DDQs that outlined what their internal policies actually required. Then I would look at what the MSPs were delivering - minimum framework thresholds from off-the-shelf compliance tools. The two never matched. Corporates had their data. MSPs had theirs. But those datasets are not independent - they are completely dependent on each other. A vulnerability on the corporate side is the MSP's action item. An MSP's remediation is the corporate's evidence. But because the data lived in silos, nobody had the full picture.

Fig exists to connect those datasets for the first time. Not as a reporting layer, but as the operational platform that both parties work through - enforcing the standards your organisation has actually committed to, and making sure everyone responsible can see it, own it, and prove it.

JH
Jay Hopkins
Founder, The Fig Group

Built for both sides

Fig aligns corporates and their MSPs on a single platform, governed by the corporate's own policies.

For corporates

Your policies. Enforced. Visible. Proven.

1

Build your actual policies into the platform

Not framework templates. Your board-approved, DDQ-committed, client-facing standards - structured as enforceable operational rules.

2

See exactly what your MSP is doing

Every event, every response, every resolution - tracked against your policy requirements, not their interpretation of a framework.

3

Events trigger your policy, not a generic checklist

When your GRC stack flags something, Fig routes it through your policy logic. The response matches what you committed to, every time.

4

Audit-ready by default

Full traceability from event to closure. When a client or regulator asks for evidence, it is already there - structured around your policies.

Comprehensive
audit trail from trigger to closure
Continuous
gap prevention through policy enforcement
One view
corporate + MSP data connected for the first time
Your policies
and selected frameworks, enforced as operational governance
CONSOLIDATION

One platform. Eight tools replaced.

Fig is not another tool to add to your stack. It replaces standalone products you are already paying for.

OneTrust

Privacy management

ServiceNow Change

Change governance

HackerOne

Vulnerability disclosure

PagerDuty

Incident workflows

MasterControl

Quality management

PowerDMS

Policy management

KnowBe4

Training and awareness

Broker portals

Insurance placement

Common questions

Ready to see the difference?

See how Fig turns your internal policies into operational governance that keeps corporates and MSPs aligned at all times.