Cyber Insurance Application Ingrid The Cyber Insurance application is optimized for Cyber Insurance workflows. Use the App Switcher, located at the top of the left navigation menu, to toggle between applications. The Context Switcher dropdown, located in the top actions bar, allows you to select from one of your clients. The data on the functional pages is synced to the selected client. Navigation Menu Use the toggle, on the bottom left, to expand or collapse the menu at any time to get a wider view of the data. Dashboard Menu Icon: Dashboard The Portfolio Dashboard surfaces the most important information regarding your portfolio and serves as the launching pad for cyber insurance workflows and to other parts of the Bitsight platform. Portfolio Risk Menu Icon: Portfolio Risk Provides views specific to the overall portfolio of clients that you are monitoring. Companies List The Companies List page provides an overview of your subscribed companies. Peer Analytics Your Peer Analytics dashboard, which provides an objective, data-driven comparison between companies and peer groups. Client Risk Menu Icon: Client Risk Provides views specific to an individual client that you are monitoring. [Client Risk] Overview The selected client’s security rating overview and information. Rating Details Rating Details is a breakdown of the selected client’s risk, drilling into the individual risk vectors, remediation, and assessments. Findings Findings are the culmination of observed internet traffic and configurations, providing a single place to sort, filter, analyze, comment on, track remediation efforts, and export findings. Assets Hostnames/domains and IP addresses that are attributed to the selected client. Ratings Tree The Ratings Tree depicts the selected organization’s company hierarchy within the Bitsight platform. Assessments Use the Assessments page to quickly identify red flags for cyber risk with objective data aligned to standard and custom questionnaires. Rapid Underwriting Assessments Use Rapid Underwriting Assessments to quickly get rating details for any client within 1 minute. Compare risk against your underwriting guidelines. Determine if a potential client fits your risk appetite. Service Provider Risk Menu Icon: Service Provider Risk Manage your client’s fourth parties. [Service Provider Risk] Overview Get an overview of your client’s fourth party ecosystem. See the most common service providers and what risks they might introduce. Determine which products are the most important based on the number and importance of the domains that they support. Service Providers View products provided by service providers across your client’s fourth party ecosystem. Products Determine which fourth party to subscribe to or view the clients that are dependent on a particular service provider or product. Vulnerability Detection Menu Icon: Vulnerability Detection Access and manage vulnerabilities and exposures - including major security events - to find and remediate threats more quickly within their vendor portfolio. Client Engagement Menu Icon: Client Engagement Track your or your colleagues’ client outreach and see where they are in the collaboration and questionnaire processes. Access Invitations Use Access Invitations to track requests made by you or your colleagues, see where your clients are in the collaboration process, and approve/deny registrations submitted by clients. Questionnaires Use Questionnaires to view and manage questionnaires sent to your clients. Alerts Menu Icon: Alerts Alerts allow you to take immediate action on ratings changes, infections, or vulnerabilities impacting your clients. Portfolio Alerts Set up alerts for your portfolio. 4th Party Alerts Set up alerts for your clients’ fourth parties. Reports Menu Icon: Reports Reporting on your clients’ data, which can be used to discuss critical risk. Reports ease the burden of having to manually gather aggregate cyber security risk data and it translates complex security topics into actionable business metrics. Program Setup Menu Icon: Program Setup Set up Bitsight to create a clear picture of cyber risk aligned to your organization’s risk tolerance. Alert Settings With Alert Settings, ease your workload with automated and customized notifications. Set up and manage alert settings to best meet the needs of your risk tolerance for when to be notified on changes in risk. Folder Management Folders can be used to organize your portfolio to better understand the security performance of certain groups of companies, such as IT vendors and companies in your organization. Folder Management is where you set up and manage your folders. Client Access Links Use Client Access Links to generate access links to distribute to clients. January 27, 2025: Added Client Access Link page. January 31, 2024: Client Engagement split into Access Invitations & Questionnaires. February 27, 2023: Published. Related articles Bitsight Security Ratings for Cyber Insurance Insurance App: Rapid Underwriting Insurance App: Portfolio Dashboard Vendor Risk: Assessments Alert Sets Feedback 0 comments Please sign in to leave a comment.