Vendor List

The following is a list of different service providers for our retail brokers and their clients.
Ankura

Ankura

Ankura partners with clients “to solve their most complex problems, deal with events and special situations, shift paradigms, and develop game-changing ideas that achieve real results and positive outcomes.”

Visit Site
Arctic Wolf Incident Response

Arctic Wolf Incident Response

A preferred partner of cyber insurance carriers, Arctic Wolf Incident Response (formerly Tetra Defense) secures environments and collects forensic evidence in parallel to support faster recovery. It also offers round-the-clock monitoring for cyber threats.

Visit Site
Arete Incident Response

Arete Incident Response

With a particular focus on ransomware, Arete determines what options beyond paying ransom may exist for recovering data; leads ransom negotiations if necessary; and advises business about, helps deploy, and manages endpoint detection solutions to guard against future threats.

Visit Site
BitSight

BitSight

BitSight continuously monitors clients’ own attack surfaces from a threat actor’s point of view, as well as third parties for emerging cyber threats. This approach measures cyber security in statistically significant ways, correlated with incidents’ actual likelihood.

Visit Site
Blackpoint Cyber

Blackpoint Cyber

Blackpoint uses an integrated ecosystem of services centered on 24/7 managed threat detection and response. Its special focus is cloud security, and will act against malicious threats in real time on clients’ behalf.

Visit Site
Calamu

Calamu

Calamu protects at-rest and in-motion data by automatically fragmenting and scattering it across multiple separate storage locations, accessible to authorized users and valueless to others. In the event of a breach, data “self-heals” as though nothing happened.

Visit Site
Charles River Associates (CRA)

Charles River Associates (CRA)

CRA consultants focus on six aspects of cybersecurity: due diligence (pre- and post-acquisition threat assessments), IR (from initial forensics to post-incident reviews), Cyber Insurance claims (including settlements and expert testimony), strategic advisory services, software licensing compliance, and eDiscovery.

Visit Site
Concierge Cyber

Concierge Cyber

For an annual fee, Concierge provides 24/7/365 access to as-needed, pay-as-you-go services—including emergency response, risk assessment, and employee training—from third-party specialists at discounted rates. Membership sometimes covers Cyber Insurance policy exclusions.

Visit Site
Crowdstrike

Crowdstrike

Crowdstrike is a unified, cloud-native platform using proprietary AI to secure endpoints, workloads, data, and identity. Crowdstrike also offers simulations to train employees how to respond to sophisticated threat actors.

Visit Site
CyberCube

CyberCube

CyberCube uses analytics to advise brokers, insurers, and reinsurers on security trends before they lead to claims. Its cloud-based data sets and human expertise help with insurance placement, underwriting selection and portfolio management optimization.

Visit Site
CyNet

CyNet

CyNet’s streamlined, natively automated end-to-end platform makes cyber security more affordable to more organizations. Its IR services use automated investigation, with dedicated project managers keeping in close contact. CyNet offers white label options for technology partners.

Visit Site
Cypfer

Cypfer

Cypfer supports technical, legal, social and HR breach responses for global insurance carriers, prominent law firms, and Fortune 1000 organizations. Their services include cyber attack and ransomware first response and recovery, advisory services, and digital executive protection.

Visit Site
CyRisk

CyRisk

CyRisk helps identify and fix vulnerable systems using continuous monitoring and zero-day exposure intelligence, before these gaps lead to losses. CyRisk’s rapid IR team conducts forensic analysis and implements risk mitigation going forward.

Visit Site
Dauntless Discovery

Dauntless Discovery

Dauntless Discovery has managed more than 10,000 eDiscovery projects for Fortune 500 companies. It uses established best practices and advanced technology to defensibly eliminate non-relevant documents and prioritize potentially relevant ones for review.

Visit Site
Digital Mint

Digital Mint

Digital Mint offers secure solutions for purchasing cryptocurrencies (Bitcoin, Litecoin) with cash at ATMs and physical teller windows. It has prevented more than $10 million in fraud and, unlike its competitors, adheres to BSA/AML compliance.

Visit Site
Gray Analytics

Gray Analytics

Gray Analytics continuously monitors not only for external threats but also for organizations’ own legal cyber security compliance. It has special expertise in providing government contractors with CMMC 2.0, NIST, and RMF compliance solutions.

Visit Site
Kivu Consulting

Kivu Consulting

Kivu helps organizations contain and recover from cyber attacks using a unique, patented IR methodology. Kivu also conducts threat assessments and simulations as part of its advisory services, and actively monitors the web and dark web for clients’ data.

Visit Site
Knowbe4

Knowbe4

KnowBe4 is an automated, integrated security awareness training platform combined with simulated phishing attacks, suitable for small, mid-sized, or large organizations. It also offers such tools as domain spoof tests, ransomware simulations, weak password tests, and email exposure checks.

Visit Site
Kroll

Kroll

Kroll offers immediate, emergency IR assistance via a 24/7 hotline. Response services span the incident lifecycle, from IT forensics to litigation support. Other services include penetration testing, and credit and identity monitoring for individuals affected in breaches.

Visit Site
Layer 8 Security

Layer 8 Security

Layer 8 offers in-person and online cyber risk management instruction, among other services, using a highly customizable curriculum. Layer 8 also offers 24/7 infrastructure monitoring and semiannual phishing simulations, as well as vulnerability assessments and advising.

Visit Site
Malwarebytes

Malwarebytes

Malwarebytes’ enterprise-grade services include network endpoint detection of threats; proactive threat hunting based on past indicators of compromise (IOCs) and suspicious activity; and affordable, automated remediation with 24/7 monitoring.

Visit Site
Mandiant

Mandiant

The Mandiant platform includes access to threat intelligence letting users monitor the dark web, malware repositories and more for leaks. Clients can access experts on demand, and use Mandiant to train teams to confront threats.

Visit Site
MDD Forensic Accountants

MDD Forensic Accountants

MDD can help determine what businesses must pay to repair or replace equipment damaged in a breach, and to secure their systems. MDD provides expert witnesses when incidents lead to litigation, and helps parties reach rapid, equitable settlements.

Visit Site
Moxfive

Moxfive

Moxfive streamlines the IR with a platform that offers a centralized view of project details and milestones, and an experienced Technical Advisor who can advise clients on the most efficient and cost-effective responses.

Visit Site
Mullen Coughlin

Mullen Coughlin

Mullen Coughlin represents organizations facing data privacy events and information security incidents. It also provides 24/7 crisis management services, security monitoring, and education on pre-breach federal and state regulatory compliance.

Visit Site
NINJIO

NINJIO

NINJIO uses three- to four-minute, Hollywood-style animated micro-learning videos to educate individuals and organizations about cyber risk. Each video is based on a real-world corporate breach. The curriculum’s gamified nature (quizzes with a leaderboard) further engages viewers.

Visit Site
Northport Security

Northport Security

Northpoint focuses exclusively on TSCM (Technical Security Counter Measures) inspections and bug sweeps, performed by former FBI agents using the most advanced equipment. They also offer K9 electronic scent detection.

Visit Site
OnDefend

OnDefend

OnDefend offers proprietary solutions designed to help third-party cyber security providers scale their services. These white-label solutions include not only IR capabilities but also consultation through its “BlindSPOT” breach and attack simulations.

Visit Site
Pondurance

Pondurance

Pondurance clients pay for only services they need, which may include managed detection and response from 24/7, U.S.-based security centers; digital forensics and incident response; or advisory services on such issues as PCI and HIPAA compliance.

Visit Site
Propelex

Propelex

Propelex helps enterprises achieve smarter and faster growth path through secure digital transformation solutions. They provide deep business expertise with over 50 years of combined experience across Healthcare, Retail & Consumer Goods, Manufacturing and Oil & Gas sectors.

Visit Site
RSM

RSM

RSM consulting helps businesses manage and reduce risk by incorporating security solutions into their standard processes. Among its other cyber security services, RSM helps develop security monitoring strategies, and assess and manage companies’ threat detection tools and capabilities.

Visit Site
SecurityScorecard

SecurityScorecard

SecurityScorecard Cyber Resilience Services help organizations defend, respond, and scale cybersecurity and third-party risk management programs.

Their Cyber Resilience Services team brings 100+ years of collective experience in cybersecurity investigations across government and private sectors, with specialties in: Digital Forensics, Incident Response, Penetration Testing, Red Teaming, Tabletop Exercises, and Third-Party Risk Management.

Visit Site
SentinelOne

SentinelOne

SentinelOne offers several autonomous, AI-powered threat hunting and response services. Its platform works across user endpoints, containers, cloud workloads, and IoT devices. It also integrates with several leading third-party security tools.

Visit Site
SpearTip

SpearTip

SpearTip’s 24/7/365 Security Operations Center works in a continuous investigative cycle to provide breach investigation, IT remediation, decryption, and data mining (detecting data patterns to identify vulnerabilities and collect baseline indicators).

Visit Site
Telos

Telos

Telos Corporation offers advanced technology solutions that empower and protect the world’s most security-conscious enterprises. They offer many products including Xacta®, Telos Ghost®, IDTrust360, Cybersecurity Services, Cloud Services, Secure Networks, Cyber Analytics, and AMHS Organizational Messaging.

Visit Site
Tracepoint

Tracepoint

Focused on ransomware and business email compromise recovery, Tracepoint offers full-service IR, remediation and recovery solutions. Its monitoring and other active defense services reduce opportunities for threat actors to exploit.

Visit Site
Trustwave

Trustwave

Trustwave monitors clients’ environments 24/7/365 from eight global security operations centers, continuously refining the analytics, rules, and policies used to detect threats. Investigators coordinate rapid responses, and experts consult with clients to help them achieve optimal security.

Visit Site
Unit42 by Palo Alto Networks

Unit42 by Palo Alto Networks

A strategic advisor to CISOs around the world, Unit42 IR services stress rapid forensics and complete remediation, along with reporting that stands up in litigation. It offers 24/7 managed threat detection and response, and cyber correspondence services.

Visit Site
Upfort

Upfort

With software, automation, and data, Upfort closes the cyber protection gap by removing the hassle, headache, and high costs of managing cyber risks. They provide effective and accessible solutions.

Visit Site

Book a Call with Us

Want to hear how ProWriters can help your clients with a comprehensive risk management strategy? Schedule a call with us today.

Schedule a Call