Get the cyber risk data you're missing.
Manage Cedant Disclosure
When there’s no single source of data on a portfolio’s risks buying reinsurance becomes complex and time consuming.
ThreatInformer gives reinsurers granular data on each insured in a cedant’s portfolio to show what was insured, the business context, and each insured’s protection.
ThreatInformer’s data helps reinsurers work with ceding companies to get the right product, protection, and pricing for risk transfer.
The traditional attributes of Geography, Industry, and Turnover give reinsurers limited insight for managing and modelling risk accumulation.
ThreatInformer shows you data on factors that are relevant to Cyber risk accumulation including system location, software usage, cloud vendors, DNS, SSL certificates, domain registrars and email providers.
Stop guessing and making assumptions, use data that’s a concrete foundation for models, track accumulation, and get a preferred spread of risk.
Vendor and third party risk models are a black box with no indication of how the data is collected and processed, the assumptions used, and no control for the end user.
ThreatInformer puts reinsurers in control of cyber risk data, customising it to your sources. We put you back in control and restore trust in risk models.
The level of data we provide also makes it possible run Realistic Disaster Scenarios when combined with your financial data.
How It Works
See how ThreatInformer's data can help Abdul, a reinsurance broker.
Abdul uses ThreatInformer to get cyber risk data on his ceding client’s portfolio. Abdul helps his client get the right limits and protections.
Abdul uses ThreatInformer’s data to track key aggregation factors and place those risks in the reinsurance market.
Abdul replaces assumptions in his catastrophe scenarios with ThreatInformer’s data. Abdul now has more control over, and trust in, his risk models.