Each policyholder at Evolve has exclusive, free access to the following cybersecurity risk management resources that retail at $7,500+ in the market.

EVOLVE’S CYBERSECURITY MOBILE APP
FREE FOR ALL POLICYHOLDERS

Evolve’s mobile app continually scans for cyber vulnerabilities facing your organization, and alerts you of new threats in real time. The insured can directly message cyber questions to our forensic experts, and even notify a claim directly in the app. Mobile App download instructions and walkthrough can be found here.

DARKTRACE
IDENTIFY & PREVENT CYBER ATTACKS

Darktrace’s artificially intelligent cybersecurity technology identifies & prevents cyber attacks on your organization in real time, autonomously shutting down hackers by monitoring your organization’s entire digital footprint, including data wherever it resides (cloud, SaaS, email, endpoints, IoT, & physical systems).

BLACKFOG
ON DEVICE RANSOMWARE PROTECTION

BlackFog’s data exfiltration prevention technology stops ransomware! See it for yourself in 7 days with a free ransomware assessment. After your trial meet with BlackFog’s VP of Threat Intelligence, an expert in cybersecurity investigations with a background in law enforcement who will analyze the findings and present you with your customized threat report. Don’t become the next Ransomware statistic, get started today!

 

NINJIO
EMPLOYEE CYBERSECURITY AWARENESS VIDEO TRAINING

4 minute “gamified” video episodes on real breaches that train your employees on how to avoid falling victim to hack attacks. Actively train up to 25 of employees.with this educational software.

CONTROL CASE
PRIVACY REGULATORY BODY COMPLIANCE AUDIT

Control Case provides a 30 minute consultation to identify if your business’ sensitive information properly complies with foreign, federal, state, & private privacy regulatory laws.

Common Cyber Security Controls Explained

Multi-Factor Authentication (MFA)

Multi-factor authentication, is a method to protect access to corporate networks and business-critical systems, both on-premises and remotely. MFA can be used to secure remote access to the network, business email accounts, and privileged user accounts (e.g. IT admin accounts). 

Phishing Training & Simulated Attacks

The simulated phishing emails may look like they are from a manager, vendor, or a well-known brand name. It is important to have phishing training because human error is the number one cause of cyber events.

Offline Backups

An offline backup is a copy of your data that is not stored on the same device as your original data and is not connected to the Internet.

Endpoint Detection & Response

Endpoint Detection and Response (EDR) is a solution that continuously monitors devices to detect and respond to cyber threats like ransomware and malware.

Network Monitoring Solution

A network monitoring solution continuously monitors and evaluates a computer network by identifying and remediating inadequate network components.

Computer System Updates & Critical Patches

Critical patch management is the process of applying updates to software. These patches are often necessary to correct errors, vulnerabilities, and bugs in the software.

Email Filtering Software

An email filter will filter incoming emails for spam, malware, and suspicious links. Malware, including ransomware, is often hidden within links or attachments, which lure employees to open them.