The Cyber Insurance application is optimized for Cyber Insurance workflows.
- The Context Switcher dropdown, located in the top actions bar, allows you to select from one of your clients. The data on the functional pages is synced to the selected client.
Navigation Menu
Dashboard
The Portfolio Dashboard surfaces the most important information regarding your portfolio and serves as the launching pad for cyber insurance workflows and to other parts of the Bitsight platform.
Portfolio Risk
Provides views specific to the overall portfolio of clients that you are monitoring.
Companies List
The Companies List page provides an overview of your subscribed companies.
Peer Analytics
Your Peer Analytics dashboard, which provides an objective, data-driven comparison between companies and peer groups.
Client Risk
Provides views specific to an individual client that you are monitoring.
[Client Risk] Overview
The selected client’s security rating overview and information.
Rating Details
Rating Details is a breakdown of the selected client’s risk, drilling into the individual risk vectors, remediation, and assessments.
Findings
Findings are the culmination of observed internet traffic and configurations, providing a single place to sort, filter, analyze, comment on, track remediation efforts, and export findings.
Assets
Hostnames/domains and IP addresses that are attributed to the selected client.
Ratings Tree
The Ratings Tree depicts the selected organization’s company hierarchy within the Bitsight platform.
Assessments
Use the Assessments page to quickly identify red flags for cyber risk with objective data aligned to standard and custom questionnaires.
Rapid Underwriting Assessments
Use Rapid Underwriting Assessments to quickly get rating details for any client within 1 minute.
- Compare risk against your underwriting guidelines.
- Determine if a potential client fits your risk appetite.
Service Provider Risk
Manage your client’s fourth parties.
[Service Provider Risk] Overview
Get an overview of your client’s fourth party ecosystem.
- See the most common service providers and what risks they might introduce.
- Determine which products are the most important based on the number and importance of the domains that they support.
Service Providers
View products provided by service providers across your client’s fourth party ecosystem.
Products
Determine which fourth party to subscribe to or view the clients that are dependent on a particular service provider or product.
Vulnerability Detection
Access and manage vulnerabilities and exposures - including major security events - to find and remediate threats more quickly within their vendor portfolio.
Client Engagement
Track your or your colleagues’ client outreach and see where they are in the collaboration and questionnaire processes.
Access Invitations
Use Access Invitations to track requests made by you or your colleagues, see where your clients are in the collaboration process, and approve/deny registrations submitted by clients.
Questionnaires
Use Questionnaires to view and manage questionnaires sent to your clients.
Alerts
Alerts allow you to take immediate action on ratings changes, infections, or vulnerabilities impacting your clients.
Portfolio Alerts
Set up alerts for your portfolio.
4th Party Alerts
Set up alerts for your clients’ fourth parties.
Reports
Reporting on your clients’ data, which can be used to discuss critical risk. Reports ease the burden of having to manually gather aggregate cyber security risk data and it translates complex security topics into actionable business metrics.
Program Setup
Set up Bitsight to create a clear picture of cyber risk aligned to your organization’s risk tolerance.
Alert Settings
With Alert Settings, ease your workload with automated and customized notifications. Set up and manage alert settings to best meet the needs of your risk tolerance for when to be notified on changes in risk.
Folder Management
Folders can be used to organize your portfolio to better understand the security performance of certain groups of companies, such as IT vendors and companies in your organization. Folder Management is where you set up and manage your folders.
Client Access Links
Use Client Access Links to generate access links to distribute to clients.
- January 27, 2025: Added Client Access Link page.
- January 31, 2024: Client Engagement split into Access Invitations & Questionnaires.
- February 27, 2023: Published.
Feedback
0 comments
Please sign in to leave a comment.