Alternatives to Hiscox
Compare Hiscox alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Hiscox in 2026. Compare features, ratings, user reviews, pricing, and more from Hiscox competitors and alternatives in order to make an informed decision for your business.
-
1
WebTitan
TitanHQ
WebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan DNS filtering filters over 2 billion DNS requests every day and identifies 300,000 malware iterations a day. Our intelligent AI driven real time content categorization engine combines industry leading anti-virus and cloud based architecture. This makes the WebTitan Cloud DNS filter an ideal solution for organizations needing maximum protection and minimal maintenance. This cloud based web filtering solution provides complete protection from online threats such as viruses, malware, ransomware, phishing and comprehensive content filtering. WebTitan Cloud is a low maintenance solution that can be set up in five minutes to stop your users from accessing inappropriate content online. Start your free Trial of WebTitan today, with full support included. -
2
Zurich Cyber Insurance
Zurich
Cyber risk insurance helps protect your company against computer-related crimes and the financial impacts of threats like ransomware; malware; data breaches and thefts; malicious acts of employees and other events that can damage your network, corrupt your data and impact your company’s reputation and customer confidence. Today, all business is digital, which means all companies are vulnerable to cyber events, from email phishing and social engineering to ransomware and other perils. If you operate a business that depends on any kind of digital tools and resources to serve customers, connect with vendors, manage payrolls, administer employee benefit programs, and collect sensitive user and customer data, you need cyber insurance. Types of cybercrime can include ransomware and other malware, data thefts, email phishing attacks, social engineering scams, breaches via the Internet of Things, and more. -
3
Embroker
Embroker
Embroker helps you get cyber liability insurance to cover both first and third-party financial losses resulting from data breaches and other cybercrimes that may compromise sensitive company and customer information. A cyber insurance policy, also referred to as “cyber risk insurance” or “cyber liability insurance” coverage, is a financial product that enables businesses to transfer the costs involved with recovery from a cyber-related security breach or similar events. Typically, the most important aspect of cyber insurance will be network security coverage. This coverage will respond in the event of a network security failure – such as data breaches, malware, ransomware attacks and business account, and email compromises. However, the policy will also respond to liability claims and ancillary expenses of an attack or breach. -
4
Coalition
Coalition
Every business is a target, no matter what industry or size. Percent of cyber loss victims that are small to midsize businesses. SMBs report attacks evaded their antivirus and intrusion detection software. Average claim size for Coalition’s SMB policyholders. Coalition protects your business by preventing incidents before they occur. Our proactive cybersecurity platform saves your business time, money, and headaches. We provide our security tools at no additional cost to our insurance customers. We alert you when your employees’ credentials, passwords, and data have been compromised in 3rd party data breaches. Over 90% of security incidents are caused by human error. Train your employees to avoid mishaps with our engaging, story-based employee training platform and simulated phishing emails. Ransomware literally holds your computers and data hostage. Our comprehensive threat detection software provides protection from dangerous malware attacks that escape detection. -
5
Liberty Mutual
Liberty Mutual Global Risk Solutions
Businesses of all types depend on computers and other online systems daily, whether to service customers, market products, or accept payments. But this digital world also comes with cyber-related risk — including system failures, privacy breaches, and ransomware attacks, to name a few. Without the right insurance protection, responding to an event could be devastating to a company’s finances and reputation. Our cyber liability solution, Data Insure, from Ironshore helps protect companies against a variety of network security and privacy exposures resulting from data breaches and other cyber events. The fallout from a cyber incident can be significant, costing businesses time, money, and valued customer relationships. -
6
Insureon
Insureon
Cyber liability insurance protects small businesses from the high costs of a data breach or malicious software attack. It covers expenses such as customer notification, credit monitoring, legal fees, and fines. Cyberattacks and data breaches are expensive and increasingly common. Small businesses often have weak cybersecurity, which makes them an attractive target. A cyberattack isn't just an inconvenience – it can put you out of business. In fact, 60% of small businesses go under within six months of a cyberattack. Cyber insurance coverage helps your business recover from financial losses caused by cyberattacks and data breaches. It can pay for credit monitoring, attorney's fees, fines, and other costly expenses. If a hacker steals your private information about your company or its employees and holds them for ransom, cyber liability insurance will help with payments to meet cyber extortion demands. -
7
AXIS Cyber Insurance
AXIS
All industries whose business activities call for them to collect, process or store information of value. This can include personal data, business critical information and any other data that could lead to financial loss, reputational damage or business interruption. Today, the threat of a cyber incident is real regardless of industry sector, size or geographic location. Cyber insurance and risk mitigation are critical to help protect businesses from financial loss and provide them with cyber security services that help them manage and recover from the effects of cyber attacks and cyber data incidents. We offer brokers and clients deep expertise in managing data security, guidance on preparing for an incident and guidance on preparing for a cyber incident response. AXIS Cyber insurance for large global and large middle-market businesses. -
8
AXA XL
AXA XL
Any organization using technology to run its business is at risk of a cyber attack or data breach. Cyber liability insurance can provide protection for your business’ digital assets. At AXA XL, we help clients better understand and address cyber risk through proactive services, dedicated support and flexible coverages designed to protect a wide range of businesses before, during and after a cybersecurity incident. We’re a leading cyber and technology insurer and have the industry experience that makes a difference. We’ve been handling data breach incidents and underwriting cyber exposures for clients for over 20 years. Our cyber and technology insurance policy – CyberRiskConnect – can be tailored to the needs of your industry sector and comes with expanded coverage and even broader terms to protect against today’s cyber emerging risks. Retail, financial institutions, healthcare, professional services firms, manufacturers, higher education institutions, power and utility companies. -
9
Elpha Secure
Elpha Secure
Work confidently with a complete cyber defense strategy that reduces risk in real-time and helps keep your business solvent. Yesterday’s security measures are no match for today’s sophisticated cyber-attacks. And business owners can’t afford to ignore the problem any longer. Without cyber insurance, a single breach can bankrupt your business. The solution is tailored cyber coverage that’s accessible and affordable. Piecemeal cyber software is expensive, complicated, and difficult to adopt. The solution is all-in-one software that’s easy to implement and to use. Finally, advanced security software embedded in a cyber insurance policy for critical coverage that actually helps manage your cyber risk. Elpha Secure is one elephant you need in your room. Full coverage plus first-rate software offers more robust protection for less. Streamlined AI-powered underwriting process to deliver a quote on the spot. -
10
AmTrustCyber
AmTrust Financial Services
Any business using computers to complete day-to-day tasks should consider cyber insurance a necessary coverage. In the last decade, cyber threat to business has changed. While the loss or disclosure of sensitive data used to be a company’s primary concern in assessing their cyber risk, businesses are increasingly facing cyber risk that can threaten their operations and even their existence. Adding cyber insurance is a small cost, but the risk of not doing so can be devastating. Smaller organizations are targeted as frequently as major corporations with cyber threats but often lack access to the expertise and resources that large businesses can draw upon. Cyber Liability insurance from AmTrustCyber gives your business comprehensive financial protection and expert assistance to navigate a broad range of cyber threats to your company's data, operations and reputation. -
11
Travelers
Travelers
Every type of organization, from global companies to mom and pop shops that use technology to do business, face cyber risk. As technology becomes more complex and sophisticated, so do the threats that businesses face. This is why every business and organization needs to be prepared with both cyber liability insurance and an effective cyber security plan to manage and mitigate cyber risk. At Travelers, we understand the complexity of cyber threats. We have solutions to help insure and protect your business assets. Cyber liability insurance is an insurance policy that provides businesses with a combination of coverage options to help protect the company from data breaches and other cyber security issues. It's not a question of if your organization will suffer a breach, but when. Travelers cyber insurance policyholders can also access tools and resources to manage and mitigate cyber risk — pre-breach and post-breach. -
12
Cincinnati Insurance
The Cincinnati Insurance Companies
Focus on your business, knowing you have the necessary cyber risk coverage to keep your organization protected. Tailor your coverage through our three options: Cincinnati Data Defender™, Cincinnati Network Defender™ and Cincinnati Cyber Defense™. Coverage for responding to a data breach, including expenses for assisting all those affected. Financial protection for legal action following a data breach. Reimbursement and personal services to help owners or key employees with recovery following identity theft. Coverage to recover from a cyberattack, such as ransomware, including cyber extortion expenses, data and system restoration, lost income and public relations expenses. Financial protection for legal action following a computer attack or allegations of injuries arising from your electronic communications. -
13
Vouch
Vouch
While not every one of those led to identity theft, they could each have theoretically triggered a lawsuit by the person affected. Cyber insurance is designed to pay the costs associated with such lawsuits when they’re targeted at your startup, as well as the costs of helping breach victims recover. Cyber insurance was developed to help companies manage the risks associated with storing and processing customer data. In the event of a cyber incident or data breach, it can cover services that reduce the likelihood of a lawsuit. Because so many startups are fueled by data, Cyber insurance is often essential. Even if you aren’t fueled by data, Vouch’s Cyber policy may offer protection. That’s because our coverage includes protection for social engineering and electronic funds transfer scams – both of which can happen to anyone at any time. As soon as you get the first form filled on your website, you’ve got customer data. -
14
The Hartford
The Hartford
When you run a small business, you face many physical risks, like property damage and injuries. But your business also faces risks that come from using technology. These include everything from data breaches to hacking. To protect against those risks, many businesses add cyber insurance to their business insurance policies. Cyber insurance can offer broad coverages to help protect businesses from various technology-related risks. At The Hartford, we offer two different cyber insurance policies: cyber liability insurance and data breach insurance. Data breach insurance helps your business respond to breaches and can offer enough protection for small business owners. Cyber liability insurance is typically meant for larger businesses and offers more coverage to help prepare for, respond to and recover from cyberattacks. -
15
CyberPolicy
CyberPolicy
CyberPolicy is the only place where you can compare business insurance quotes and buy multiple insurance policies online. You get fast, accurate, and actionable quotes based on your specific needs with competitive rates and coverages. Malware, cyberattacks, and data loss are very real threats to every business. CyberPolicy gives you protection where it’s needed most - online. Tell us a little about your business, and we’ll show you the policies that cover your needs! Buy online or speak with a licensed advisor and quickly get the coverage you need! Continued legal support to handle any lawsuits. Financial support to cover regulatory fee. Credit monitoring for your impacted customers. Lost income support if your operations are interrupted. -
16
CNA
CNA Insurance
Cybercriminals continue to wreak havoc on businesses of every size – and the results are staggering. The average cost of a ransomware attack is $5 million, and it takes an average of 191 days for an organization to discover it has been breached. As cyberattacks continue to escalate, every business is at risk. CNA offers a market-leading suite of cyber insurance products and risk control resources for businesses of all sizes, built on nearly two decades of cyber insurance expertise. Our Underwriting and Risk Control professionals offer tailored, industry-specific coverages and provide the tools and resources needed to understand exposures and address potential losses. And if there is ever a data breach, our skilled Claim professionals are dedicated to working with policyholders, so everyone can remain focused on their business. -
17
HSB Cyber Suite
Hartford Steam Boiler
HSB Cyber Suite is a comprehensive cyber insurance program designed to provide protection from a wide range of cyber risks for small to mid-sized enterprises. HSB has extensive experience and expertise in cyber risk and HSB Cyber Suite coverages are designed to keep pace with the evolving cyber risk landscape. HSB Cyber Suite offers a bundle of coverages that provide multiple layers of protection against complex cyber risks. Pays insureds for forensic IT, breach notification, credit monitoring and case management services, legal counsel, PR services, reputational harm, reward payments, regulatory fines and penalties, and PCI assessments, fines and penalties. Third party coverage for suits brought by affected individuals or for judgments brought by states or regulatory agencies. -
18
Allianz Cyber Protect
Allianz Global Corporate & Specialty
Allianz Cyber Protect* provides flexible, simple, and broad cover to ensure a company is fully protected in the event of a data breach or a cyber-security incident. It encompasses coverage for the costs typically associated with a cyber-incident and provides access to AGCS expert partners. A broad cyber insurance plan, Allianz Cyber Protect, gives you clear policy wording covering a broad range of risks. The Allianz Cyber Product Suite gives you a high level of cover, subject to a risk review by our risk consultants and cyber underwriters. We work closely with you to carry out a full assessment of your business systems and requirements and to build your bespoke policy. The Allianz Cyber Center of Competence is embedded into AGCS and focuses on Group-wide coordination and alignment of cyber exposures and underwriting in the corporate and commercial insurance segment. -
19
AP Lens
AP Lens
AP Lens is a Sandbox Browser that isolates networks using DNS Whitelisting. We stop the attack before it reaches the network. What does AP Lens provide? - Web Filtering: Flexible and user-friendly content blocking. - Anti-Phishing: Stop look-alike domains with 100% accuracy. - Ransomware Protection: Isolate the network without affecting business applications. - Secure Remote Work: Enforce internet usage policies without VPN slowness. - No More 0-Day Attacks: Escape the limits of blacklisting with AP Lens Augmented Whitelist. - Compliant: AP Lens meets regulatory requirements requested by cybersecurity insurance policies. - One-Click Installation: No need for a lengthy setup process or updating from the user's side. - No Maintenance: Stop malware and phishing without continuous monitoring. Our team builds on over 20 years of experience in cyber security, cloud security, and information protection in industries such as private banking and the public sector.Starting Price: $5 -
20
At-Bay
At-Bay
At-Bay’s cyber insurance policies provide robust first and third-party coverage on both primary and excess lines. Our policies are enhanced with active risk monitoring services at no additional cost and supported by our in-house claims team. Quickly determine your client's financial exposure to cyber-attacks with our cyber risk calculators. Insights and learnings to empower brokers to be an expert on cyber. At-Bay offers both direct and contingent system failure coverage to the full limit of insurance by default, regardless of whether you send submissions online or through email. Direct and contingent coverage for business interruption and system failure. Social engineering & invoice manipulation coverage is available for all classes of business, Full limits are offered for cryptojacking and bricking coverage. Broad cyber extortion coverage including payment of cryptocurrencies. Reputational harm coverage including PR costs as a result of adverse publications. -
21
BCS Insurance Company
BCS Financial Corporation
A flexible follow-form excess policy with the capability to be written on a stand-alone basis, or in combination with cyber security/privacy and technology – admitted in all states except AK, HI, SD, and WA. An admitted cyber liability policy designed for small to mid-size businesses, and the ONLY admitted quote/bind/issue system that can be completed in under two minutes. A cyber liability insurance program for insurance agents and other self-employed individuals to protect their business for incidents that involve preach of private data and communications. -
22
Guardian Digital
Guardian Digital
Guardian Digital secures against email threats like phishing, zero-day exploits and ransomware attacks that define the modern threat landscape email users face every day. We believe email security is business security, as greater than 90% of all cyber attacks originate from an email. The most effective email protection is delivered through a purpose-driven solution designed to close critical security gaps in Microsoft 365 and Workspace, coupled with the expert setup, ongoing remote system management and accessible support required to improve IT security. With real-time cybersecurity business insights, we help you understand what your risk profile is today, and protect you from the dangers that all businesses face. EnGarde Cloud Email Security - Key Features: • Phishing, spoofing & impersonation protection • Link & file analysis • Zero-day attack protection • Malware & Ransomware protection • SPF/DKIM/DMARC checking • Encryption • Comprehensive management & support serviceStarting Price: Monthly & Annual Subscriptions -
23
Flow
Flow
Flow Specialty offers tailored cyber liability insurance solutions designed to protect businesses across various industries from emerging cyber threats. Their comprehensive coverage includes data breach response, business interruption, ransomware/extortion, network security liability, social engineering fraud, and regulatory and privacy fines. Flow Specialty provides specialized coverage for sectors such as technology and IT services, financial services, healthcare, retail and e-commerce, manufacturing and supply chain, public entities, and critical infrastructure. Their capabilities encompass the implementation of cybersecurity services packaged with insurance solutions, regulatory coverage for evolving privacy laws, availability on admitted and non-admitted paper, expertise in handling SME business and building large limit towers for complex risks, and diverse market access through multiple channels. -
24
Simply Business
Simply Business
Just the fact that you’re reading this online means you’re connected to a cyber network of some sort. And simply by being online, you’re likely at some risk of a cyberattack. According to the Federal Communications Commission (FCC), digital information, such as your customers’ personal and payment information, is being reported as stolen more commonly than physical property theft. That’s why it’s more important than ever to protect your business with cyber insurance. With our online quote form, there’s an excellent chance we can provide you with cyber insurance that’s right for your small business. Cyber insurance — which is also known as cyber liability insurance — covers the costs of claims associated with stolen customer data, cyberattacks, breaches, and fraud. -
25
FYEO
FYEO
FYEO secures enterprises and individuals from cyber attacks with security audits, real-time threat monitoring and intelligence, anti-phishing solutions and decentralized identity management. End-to-end blockchain security services and auditing for Web3. Protect your organization and employees from cyberattacks with FYEO Domain Intelligence. Decentralized password management and identity monitoring services made simple. End user breach and phishing alert system. Uncover vulnerabilities and protect both your application and your users. Identify and address cyber risks across a company before you take on the liability. Protect your company from ransomware, malware, insider threats, and more. Our team works collaboratively with your development team to identify potentially critical vulnerabilities before they can be exploited by a malicious actor. FYEO Domain Intelligence delivers real-time cyber threat monitoring and intelligence to help secure your organization. -
26
Cork
Cork
Cyber attacks and insurance rates are skyrocketing while coverage declines. Underwriting forms and claims are as vintage as 8-bit. No one has bothered to ask: how could MSPs help? Integrate your existing tech stack with Cork’s attack surface analytics engine to find and close gaps in real time. Convert risk signals into actionable remediation insights for your team in the tools they already use to do their work. Provide instant coverage and a digitized claims process powered by your own security telemetry and live support from the Cork claims team. At Cork, we’re partnering with you on the cybersecurity path. We are focused on our mission to provide you with best-in-class technology keeping your clients secure while giving you the tools and support you need to continue to grow. Joining forces with Cork means you can count on us to have your back. Cork was founded after realizing the cyber insurance industry is broken. -
27
Datto SaaS Defense
Datto, a Kaseya company
With Datto SaaS Defense, MSPs can proactively defend against malware, business email compromise (BEC), and phishing attacks that target Microsoft Exchange, OneDrive, SharePoint, and Teams. Defend your clients from ransomware, malware, phishing attempts, and BEC with a data-independent Microsoft 365 security solution. Datto SaaS Defense is an advanced threat protection solution that detects zero-day threats at the first encounter instead of days later. Proactively protect your clients’ Microsoft 365 data in OneDrive, SharePoint, and Teams. Our comprehensive security solution helps you attract new clients and expand market share without increasing headcount or investing in security training. Traditional email security solutions depend on data from previously detected cyber threats and successful penetration tactics. This creates protection gaps for new, unknown threats to exploit. Datto SaaS Defense is different. -
28
Chubb
Chubb
With DigiTech® ERM and Chubb’s approach to Widespread Events coverage, businesses can tailor coverage to their unique exposures and needs, providing for greater coverage certainty and also providing long-term stability in the cyber insurance marketplace. Market-leading, highly customizable solutions to address clients’ unique needs, regardless of size, industry or type of risk. Broadened definition of protected Information includes biometrics, internet browsing history and personally identifiable photos and videos. Coverage territory applicable to anywhere in the universe to address continued evolution of hosting and data storage. Ransomware encounter endorsement addresses the increasing risk of ransomware by allowing for a tailored set of coverage, limit, retention, and coinsurance to apply uniformly across all cyber coverages. -
29
BOXX Insurance
BOXX Insurance
We’re a digital age insurer built to help businesses and families stay ahead of cyber insurance threats and provide the best, simplest and most reassuring insurance experience we can. We are aiming for zero paperwork and instant everything. We offer hassle-free business, and cyber insurance products in Canada and around the world. BOXX is a fully licensed Managing General Agent and Lloyd’s of London coverholder which means that we underwrite, price, and sell policies, as well as manage renewals and partnerships. -
30
USI Affinity
USI Affinity
If your law firm relies on the Internet, wireless connections, mobile devices, laptop computers, and/or other technology, it is increasingly vulnerable to potentially costly cyber exposures. Furthermore, your law firm’s exposure to a data security breach could be worse than you ever imagined. Learn more about Cyber coverage built for law firms! As an attorney, you have an obligation to protect client information and therefore need to secure your computers and computer systems. USI Affinity is excited to bring to law firms coverage designed just for you with Crum & Forster. Crum & Forster offers comprehensive cyber insurance coverage with three core components to assist entities in managing their computers, privacy, and other related risks. Program provides special endorsements designed for firms of all sizes—solo practitioners, small firms or large firms; coverage is tailored and focused on you. -
31
Bitdefender Small Office Security
Bitdefender
Get complete protection for your SOHO network to keep your small business safe from data breaches, phishing attempts, and malware attacks. Next-gen digital security designed for your small office/home office. You get the most innovative technologies that predict, prevent, detect and remediate even the latest cyber-threats, anywhere in the world. Bitdefender Small Office Security keeps your business safe against viruses, malware, ransomware, and all new and existing cyber threats. Regardless of the size, experience, or volume of your business, you need the best defense against fraud. Bitdefender Small Office Security prevents data breaches and secures your clients' personal and financial data. Webcam and microphone protection notifies you when apps try to access your webcam or microphone and lets you block unauthorized access. Keep your business private. Protect your bank info, passwords, and downloads from hackers, especially while using Wi-Fi on public networks.Starting Price: $54.59 per year -
32
AIG
AIG
Data and analytics to understand your cyber risk. Proactive services to address vulnerabilities. Coverage when its needed. Cyber liability insurance covers the financial costs associated with a breach, as well as first party costs including event management, data restoration, financial costs to third parties, network interruption, and cyber extortion. Covers losses in the physical world caused by a cyber event, including primary coverage for business interruption, first and third party property damage, physical injury to third parties, and products/completed operations coverage. Insureds receive detailed scoring, analysis, and benchmarking reporting that will help them better understand their cyber maturity and coverages. Basic reports are also available for applicants, even if they do not bind coverage. -
33
WhiteHaX
WhiteHaX
WhiteHaX cyber readiness verification is trusted by some of the largest cyber insurance carriers with tens of thousands of licenses deployed, WhiteHaX is a cloud-hosted, automated, cyber-readiness verification (pen-testing) platform. The WhiteHaX cyber-insurance version provides a no-install, no-impact, quick (under 15-min) verification of a business' cyber-readiness by simulating several threat scenarios against the business' deployed security infrastructure, including network perimeter defenses and endpoint security & controls. A few examples of these simulated threat scenarios include firewall attacks, user-attacks from internet such as drive-by downloads, email phishing/spoofing/spamming, ransomware, data-exfiltration attempts and others. WhiteHaX Hunter is a purpose-built platform, specifically designed to remotely hunt for server-side indicators of compromises (SIoCs) on applications and other servers deployed on-premise or in the cloud. -
34
Tokio Marine HCC
Tokio Marine HCC
With a broad range of innovative specialty insurance products and services, we are excited to introduce you to our new business unit and our combined strengths. We know you will find our creativity and flexibility helpful in building strong relationships with your clients. And with the financial strength, history and global leadership of Tokio Marine, your customers will continue to have confidence in the innovative insurance solutions we provide. Our state-of-the-art tech & cyber solutions are specially designed to provide more than just insurance. While we cover a broad range of cyber and privacy exposures, our innovative risk management services like CyberNet® and our expert cyber claims team provide excellent resources to help businesses stay ahead of ever-changing cyber risks. -
35
Beazley
Beazley
We support our clients with well designed insurance coverage; valuable risk management advice; and swift and reliable response services activated in the event of a claim. Beazley is well known for our market-leading cyber breach and network security products. Our Beazley Breach Response product for small and mid sized firms is unique in the market in being backed by a dedicated business unit, BBR Services, which coordinates all the response services clients need in the event of a breach. BBR Services has to date helped clients handle thousands of cyber breaches successfully. In the professional liability arena we provide state-of-the-art coverage for cyber & tech risks, and for a wide array of professions and businesses. -
36
DynaRisk Breach Defence
DynaRisk
As your technology footprint evolves, so does your risk profile; make sure you are protected, with DynaRisk's Breach Defence. Alongside our protection capabilities, teach your staff the cyber security basics with our expert training guides and simulated phishing scams so they don’t fall victim to attacks that could expose your business. Our Dark Web Monitor alerts you to leaked data records like credentials, personal information, credit cards and more. We monitor over 350 cyber criminal communities to find data that can be used to break into your accounts and systems. Our Hack Monitor scours the Internet to find indications that cyber criminals are targeting your company or that you’ve been hacked and don’t know it yet. Vulnerability Monitor scans your external infrastructure to look for weaknesses that hackers can exploit. Cyber security doesn't have to be complicated! Protect your business today with Breach Defence.Starting Price: $99 -
37
Resilience Insurance
Resilience
At Resilience, we offer a fresh approach to the middle market in cyber insurance backed by a top-rated carrier and an in-house claims team. With services ranging from holistic insurance coverage at bind to loss mitigation services post-bind, to custom, ongoing security services throughout the lifecycle of the policy, your cyber resilience is our business. We bring together a full ecosystem of security, insurance, and claims—all supported by superior data gathering and analytics—to provide highly tailored defense, coverage, and support for mid-market companies. As organizations everywhere shift to remote work, we help manage your increasing reliance on cloud systems and new risks, from misconfigured services to perilous home network security. -
38
Upfort
Upfort
Upfort shield delivers turnkey layers of cyber protection proven to significantly lower the likelihood of ransomware, breaches, and other cybersecurity incidents. Insurers powered by Upfort deliver market-leading value and robust coverage with hassle-free underwriting. Catch dangerous links that are used to steal information, automatically download malicious software, and compromise security. Warn users about suspicious financial requests and scams before funds are transferred. Highlight impersonation attempts that often trick users into taking unauthorized action. Whether you’re early in your security journey or have extensive controls in place, Upfort’s proprietary AI-powered solutions add an effective layer of protection. -
39
Everest Elevation
Everest Insurance
Cyber exposures pose a great threat to businesses across the globe. Everest’s Cyber Liability team offers modern and custom solutions to address Cyber Liability through the Everest Elevation® Insurance Policy. Everest’s experienced underwriters and specialized claims professionals have in-depth knowledge and industry experience to help our clients navigate the evolving cyber landscape. Everest Elevation® offers pre-breach services and comprehensive coverage for businesses across industries. Our full range of resources include custom, on-going security services through the lifecycle of the policy, highly tailored defense, robust coverage, and incident response support in the event of a cyber event to help get your business back on track. Business Interruption includes full limit for 3rd party forensic accountant expenses. -
40
WEBGAP
WEBGAP
WEBGAP is a remote browser isolation (RBI) platform that delivers a native browser user experience in a scalable and cost-effective way. It works by isolating web browsing activity in a remote cloud environment so that malicious code and other threats cannot reach user devices. This makes it an effective way to protect against a wide range of cyber attacks, including phishing, malware, and ransomware. WEBGAP is easy to use and deploy, and it can be integrated with existing security systems. It is also scalable to meet the needs of businesses of all sizes. -
41
Cowbell Cyber
Cowbell
Combining outside-in and inside-out continuous risk assessment, Cowbell delivers coverages tailored to identified risk exposures in minutes and empowers policyholders to improve their cyber risk posture. Coverage is specifically designed for cyber risk exposure—not entwined with other lines of coverage. Ongoing observation capabilities allow you to adjust your cyber insurance coverage as your business evolves. No hardware or software installation. Artificial intelligence techniques determine your insurable threat rating. Cowbell Factors provide decisive insight into the likelihood and severity of an insurable threat that enables you to select appropriate coverage, implement remediation guidance, and optimize premiums. Fast, automated, continuous exposure assessment puts all the pieces in place to determine the correct policy for your needs. It also means coverage and premiums can be adjusted on an ongoing basis. -
42
Vade
Vade Secure
Vade is a global leader in predictive email defense, protecting 1 billion mailboxes in 76 countries. We help MSPs and SMBs protect their Microsoft 365 users from advanced email security threats, including phishing, spear phishing, and malware. ISPs, MSPs, and SMBs choose Vade's email security solutions to protect their users and their businesses from advanced cybersecurity threats, including phishing, spear phishing, and malware. Whether we’re protecting consumers through leading ISPs, or business through our MSP partners, our AI-based email security solutions are designed to detect the undetectable. Block dynamic phishing attacks that bypass traditional solutions. Block targeted spear phishing & business email compromise attacks. Block evasive polymorphic and zero-day malware attacks. -
43
Trustwave Secure Email Gateway
Trustwave
Delivers advanced protection against today’s sophisticated email-based threats, extensive policy controls, and in-depth data security and compliance management. Protecting your email environment against spam, malware, phishing attacks, business email compromise, account takeover, ransomware and more is one of your top priorities. Trustwave Secure Email Gateway (SEG) multi-layered intelligence and detection engine performs deep analysis of your inbound email traffic, in real-time, to protect your users from cyber threats, enables you to integrate the workflow of your email content into business processes, while scrutinizing outbound email traffic to prevent the loss of your proprietary data, intellectual property, confidential documents and financial records. These security modules, used in conjunction with Secure Email Gateway, provide additional layers of protection and compliance capabilities for your business. -
44
Phish Alerts
Phish Alerts
Phish Alerts is a company that offers a Chrome extension that protects users from phishing attacks by identifying and blocking malicious websites that try to steal their personal or financial information. Phishing attacks are one of the most common and dangerous cyber threats today and can lead to identity theft, fraud, or malware infection. Phish Alerts aims to help users avoid falling into the trap of phishing websites by using the latest technology and databases to detect and alert them in real-time. Phish Alerts also educates users on what to look for in phishing emails and websites and provides an extra layer of assurance when browsing the web. -
45
Corvus Insurance
Corvus Insurance
Smart Cyber Insurance policies begin with information gathered through the proprietary Corvus Scan which helps to quantify cyber risk. This intelligence enables our team to deliver optimal pricing and coverage options within minutes. Each policy includes a Dynamic Loss Prevention™ report with detailed IT security recommendations, access to our Risk & Response Services for proactive risk management, and ongoing vulnerability alerting. Our proprietary underwriting process leverages new sources of data analyzed with machine learning to quote cyber insurance coverage for most accounts within minutes, while also providing our experienced underwriting team with tools and insights to work on complex risks. Corvus's broker platform, the CrowBar, optimizes quoting with the shortest application in the industry, enabling brokers to request and receive quotes within minutes for most accounts. -
46
SlashNext
SlashNext
SlashNext anti-phishing and IR solutions stop threats across mobile, email, and web—dramatically reducing the risk of data theft, cyber extortion, and breaches. Protect iOS and Android users from mobile-centric phishing threats with a lightweight, cloud-powered agent. Shield employees from live phishing sites with cloud-powered browser extensions for all major desktop browsers. Use live threat intelligence to turn existing network security controls into a real-time, multi-vector phishing defense. Automate phishing incident response and threat hunting with accurate, run-time analysis of suspicious URLs on-demand. Targeted attack to gain access to an individual’s account or impersonate a specific individual. Using deception to manipulate users into divulging confidential information for fraudulent use. HTML, PDF and Microsoft Office attachments used to harvest credentials or download malware. -
47
Prisma Access Browser
Palo Alto Networks
Prisma Access Browser is a secure enterprise browser developed by Palo Alto Networks, designed to protect both managed and unmanaged devices by integrating security directly into the browsing experience. Built on the Chromium platform, it combines the familiar interface and core features of Google Chrome with enhanced security measures to safeguard against cyber threats such as phishing, malware, eavesdropping, and data exfiltration. This browser extends Secure Access Service Edge (SASE) protection seamlessly to every device, offering agility, security, and control to businesses. Key features include creating a secure workspace on any device, protecting against advanced phishing attacks, identifying and blocking advanced malware, supporting forensics and threat hunting, and reducing the risk of tampering. Additionally, it enhances visibility and control with last-mile data protection, and blocks the transfer of data from business to personal accounts. -
48
Berkley Cyber Risk Protect
Berkley Cyber Risk Solutions
Berkley Cyber Risk ProtectSM provides expansive first and third party cyber coverage that provides options for separate limits and retentions, subject to an annual policy aggregate, allowing flexibility to choose only coverages meeting policyholders’ needs. Reimbursement for costs to replace, remediate and improve computer systems and establish and improve data security practices and policies. -
49
TruKno
TruKno
Keep up with how adversaries are bypassing enterprise security controls based on the latest cyber attack sequences in the wild. Understand cyber attack sequences associated with malicious IP addresses, file hashes, domains, malware, actors, etc. Keep up with the latest cyber threats attacking your networks, your industry/peers/vendors, etc. Understand MITRE TTPs (at a ‘procedure’ level) used by adversaries in the latest cyber attack campaigns so you can enhance your threat detection capabilities. A real-time snapshot of how top malware campaigns are evolving in terms of attack sequences (MITRE TTPs), vulnerability exploitation (CVEs), IOCs, etc. -
50
The Hanover
The Hanover Insurance Group
Whether you're a main street business or a technology company with 100 employees, The Hanover has a cyber solution to meet your needs. We offer an all-inclusive cyber solution with limits up to $10 million for small and mid-sized businesses through our financial strength, preferred service provider network and tailored coverage. Coverage is offered as an add-on to a business owner's policy or commercial package policy as part of a total account insurance solution. Coverage is offered as a stand-alone coverage part or as part of a convenient suite of management liability coverages. Because tech companies face increasingly complex cyber risk, including errors and omissions, coverage is included as part of our Hanover Technology Advantage.