- January 31, 2024: Client Engagement split into Access Invitations & Questionnaires.
- February 27, 2023: Published.
The Cyber Insurance application is optimized for Cyber Insurance workflows.
- The Context Switcher dropdown, located in the top actions bar, allows you to select from one of your clients. The data on the functional pages is synced to the selected client.
|The Portfolio Dashboard surfaces the most important information regarding your portfolio and serves as the launching pad for cyber insurance workflows and to other parts of the Bitsight platform.
|Provides views specific to the overall portfolio of clients that you are monitoring.
|Provides an overview of your subscribed companies.
|Your Peer Analytics dashboard, which provides an objective, data-driven comparison between companies and peer groups.
|Provides views specific to an individual client that you are monitoring.
|The selected client’s security rating overview and information.
|A breakdown of the selected client’s risk, drilling into the individual risk vectors, remediation, and assessments.
|The culmination of observed internet traffic and configurations, providing a single place to sort, filter, analyze, comment on, track remediation efforts, and export findings.
|Hostnames/domains and IP addresses that are attributed to the selected client.
|A depiction of the selected organization’s company hierarchy within the Bitsight platform.
|Quickly identify red flags for cyber risk with objective data aligned to standard and custom questionnaires.
|Rapid Underwriting Assessments
Quickly get rating details for any client within 1 minute.
|Service Provider Risk
|Manage your client’s fourth parties.
Get an overview of your client’s fourth party ecosystem.
|View products provided by service providers across your client’s fourth party ecosystem.
|Determine which fourth party to subscribe to or view the clients that are dependent on a particular service provider or product.
|Access and manage vulnerabilities and exposures - including major security events - to find and remediate threats more quickly within their vendor portfolio.
|Track your or your colleagues’ client outreach and see where they are in the collaboration and questionnaire processes.
|Track requests made by you or your colleagues, see where your clients are in the collaboration process, and approve/deny registrations submitted by clients.
|View and manage questionnaires sent to your clients.
|Alerts allow you to take immediate action on ratings changes, infections, or vulnerabilities impacting your clients.
|Set up alerts for your portfolio.
|4th Party Alerts
|Set up alerts for your clients’ fourth parties.
|Reporting on your clients’ data, which can be used to discuss critical risk. Reports ease the burden of having to manually gather aggregate cyber security risk data and it translates complex security topics into actionable business metrics.
|Set up Bitsight to create a clear picture of cyber risk aligned to your organization’s risk tolerance.
|Ease your workload with automated and customized notifications. Set up and manage alert settings to best meet the needs of your risk tolerance for when to be notified on changes in risk.
|Folders can be used to organize your portfolio to better understand the security performance of certain groups of companies, such as IT vendors and companies in your organization. Folder Management is where you set up and manage your folders.