Add Our Expertise to Yours
In a rapidly changing landscape, CyberEdge® provides clients with an end-to-end risk management solution to stay ahead of the curve of cybersecurity risk. CyberEdge helps clients prevent and safeguard against sensitive data breaches, computer hacking, employee error, and more.
From our innovative loss prevention tools to educate and potentially prevent a cyber security breach, to the services of our CyberEdge Breach Resolution Team if a breach does occur, insureds receive responsive guidance every step of the way.
Features & Benefits
CyberEdge includes the following coverages provided through PortfolioSelectSM or Specialty Risk Protector policy form:
CyberEdge Mobile App - AVAILABLE on the iPhone®, iPad®, and Android™!
AIG developed the CyberEdge Mobile App in response to the clear demand for information about cyber risk and how to help mitigate and respond to it. And now we've refined it. With a sleek, new look and many features now globalized, our app remains the first-of-its-kind to put the cyber information users want at their fingertips.
More User Friendly
The app is available as a free download from the App StoreSM or Google Play.
Apple, the Apple logo, iPhone and iPad are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc.
Android and Google Play are trademarks of Google Inc.
CyberEdge PCSM is a first-of-its kind, excess, difference-in-conditions cyber insurance solution that helps organizations stay ahead of the curve of cyber risk. No longer do organizations need to answer the question: Do we have coverage for a security breach in our traditional insurance policies?
Additional Layer of Protection
Rapid and Responsive Guidance When Needed Most
Constantly monitoring the cyber landscape, we keep insureds at the forefront of the industry as cyber risks continue to evolve. Our preventative tools provide our clients with the knowledge, training, security, and consultative solutions to help them stay ahead of the curve.
Click here to learn more about the added value we bring to our clients.
K2 Intelligence mines the dark net for data using web crawlers and sophisticated human intelligence gathering. This type of customized intelligence is extremely valuable as the ease and profitability of carrying out cyber crimes continues to increase particularly as organizations are operating in an increased digital, interconnected world.
Click here to learn more about K2 Intelligence’s value add services
IBM Security conducts remote scanning for clients’ web-facing external infrastructures which helps to identify potential vulnerabilities that could be exploited by a remote hacker via the internet. Infrastructure vulnerability scanning detects and prioritizes hidden risks and includes unique reporting capabilities to help quicken the remediation process.
Click here to learn more about IBM Security’s value add services
RiskAnalytics provides leading global edge threat intelligence and technology that isolates and shuns IP addresses currently being used by criminals. Shunning can also guard against attacks from within, it occurs in real time at line speed, and is scalable to protect a single location or global enterprise.
Click here to learn more about RiskAnalytics’ value add servic
RSA’s Governance, Risk, and Compliance (GRC) solution helps organizations assess their cybersecurity risk. The assessment is built on the industry-leading RSA Archer GRC solution and leverages the NIST Cybersecurity Framework.
Click here to learn more about RSA’s value add services
BitSight generates security ratings for organizations to measure and monitor their own network and those of their third-party vendors. The ratings are generated unobtrusively through BitSight’s continuous measuring of externally observable data.
Click here to learn more about BitSight’s value add services
Axio Global provides clients with a holistic picture of their cyber exposure by addressing the full range of potential cyber losses, including data theft, liability, property and environmental damage, bodily injuries, and operational disruption.
Click here to learn more about Axio Global’s value add services