The Cyber Insurance application is optimized for Cyber Insurance workflows.
- The Context Switcher dropdown, located in the top actions bar, allows you to select from one of your clients. The data on the functional pages is synced to the selected client.
Navigation Menu
Menu Section | Description | |
---|---|---|
Dashboard | The Portfolio Dashboard surfaces the most important information regarding your portfolio and serves as the launching pad for cyber insurance workflows and to other parts of the Bitsight platform. | |
Portfolio Risk | Provides views specific to the overall portfolio of clients that you are monitoring. | |
Companies List | Provides an overview of your subscribed companies. | |
Peer Analytics | Your Peer Analytics dashboard, which provides an objective, data-driven comparison between companies and peer groups. | |
Client Risk | Provides views specific to an individual client that you are monitoring. | |
Overview | The selected client’s security rating overview and information. | |
Rating Details | A breakdown of the selected client’s risk, drilling into the individual risk vectors, remediation, and assessments. | |
Findings | The culmination of observed internet traffic and configurations, providing a single place to sort, filter, analyze, comment on, track remediation efforts, and export findings. | |
Assets | Hostnames/domains and IP addresses that are attributed to the selected client. | |
Ratings Tree | A depiction of the selected organization’s company hierarchy within the Bitsight platform. | |
Assessments | Quickly identify red flags for cyber risk with objective data aligned to standard and custom questionnaires. | |
Rapid Underwriting Assessments |
Quickly get rating details for any client within 1 minute.
|
|
Service Provider Risk | Manage your client’s fourth parties. | |
Overview |
Get an overview of your client’s fourth party ecosystem.
|
|
Service Providers | View products provided by service providers across your client’s fourth party ecosystem. | |
Products | Determine which fourth party to subscribe to or view the clients that are dependent on a particular service provider or product. | |
Vulnerability Detection | Access and manage vulnerabilities and exposures - including major security events - to find and remediate threats more quickly within their vendor portfolio. | |
Client Engagement | Track your or your colleagues’ client outreach and see where they are in the collaboration and questionnaire processes. | |
Access Invitations | Track requests made by you or your colleagues, see where your clients are in the collaboration process, and approve/deny registrations submitted by clients. | |
Questionnaires | View and manage questionnaires sent to your clients. | |
Alerts | Alerts allow you to take immediate action on ratings changes, infections, or vulnerabilities impacting your clients. | |
Portfolio Alerts | Set up alerts for your portfolio. | |
4th Party Alerts | Set up alerts for your clients’ fourth parties. | |
Reports | Reporting on your clients’ data, which can be used to discuss critical risk. Reports ease the burden of having to manually gather aggregate cyber security risk data and it translates complex security topics into actionable business metrics. | |
Program Setup | Set up Bitsight to create a clear picture of cyber risk aligned to your organization’s risk tolerance. | |
Alert Settings | Ease your workload with automated and customized notifications. Set up and manage alert settings to best meet the needs of your risk tolerance for when to be notified on changes in risk. | |
Folder Management | Folders can be used to organize your portfolio to better understand the security performance of certain groups of companies, such as IT vendors and companies in your organization. Folder Management is where you set up and manage your folders. |
- January 31, 2024: Client Engagement split into Access Invitations & Questionnaires.
- February 27, 2023: Published.
Feedback
0 comments
Please sign in to leave a comment.