Welcome!

News Feed Item

Liberty International Underwriters to Provide Network Activity Monitoring through BitSight Technologies for all LIU Data Insure Policyholders

Liberty International Underwriters (LIU), part of Liberty Mutual Insurance, has collaborated with BitSight Technologies to provide LIU Data Insure policyholders with up-to-date ratings on their company’s information security health to help better protect their sensitive business and customer data.

Through LIU’s Data Insure coverage, policyholders will have access to BitSight Security Rating Service, which delivers timely, data-driven analysis of a company’s security performance. BitSight continuously analyzes, rates and monitors companies’ security postures, all from outside the company. Policyholders do not need to provide information and there is no intrusive testing involved. New ratings are generated on a daily basis, giving continuous visibility into the security of a company’s data.

“Risk mitigation for cyber exposures does not begin and end with an insurance policy,” said Oliver Brew, vice president of privacy and technology for LIU. “To truly help policyholders protect against cyber threats, we need to work with agents and brokers to provide services that actively mitigate the constant threat posed by hackers. By identifying potential attacks before they escalate, BitSight’s innovative technology increases our policyholders’ ability to avoid or reduce the consequences of a data breach.”

Website attacks can occur at any time. Hackers may spend days or weeks looking for an exploitable weakness in their target’s network. By tracking and analyzing publicly observable security events daily, such as malware distribution or communication with known botnets, BitSight Security Rating Service alerts LIU to unusual behaviors, allowing LIU to notify the broker and policyholder of the activity.

BitSight Security Rating Service is available to companies that have one of LIU’s Data Insure™ coverages:

  • LIU Tech Insure™: Covers breach of contract, intellectual property infringement, project failure coverage, data breach liability and E&O for technology companies.
  • LIU Data Insure™: Standalone coverage for data breach liability and related costs for companies that handle personal data.
  • LIU DataPro Insure™: Professional liability coverage as well as data breach liability and related costs cover for a wide range of professions and companies.

For more information on LIU’s Data Insure products, contact Oliver Brew at 212-208-4246 or [email protected].

About Liberty Mutual Insurance

“Helping people live safer, more secure lives” since 1912, Boston-based Liberty Mutual Insurance is a diversified global insurer and the third largest property and casualty insurer in the U.S. based on 2012 direct premiums written, as reported by the National Association of Insurance Commissioners.

Liberty Mutual Insurance also ranks 81st on the Fortune 100 list of largest corporations in the U.S. based on 2012 revenue. As of December 31, 2013, Liberty Mutual Insurance had $121.2 billion in consolidated assets, $102.2 billion in consolidated liabilities and $38.5 billion in annual consolidated revenue.

Liberty Mutual Insurance offers a wide range of insurance products and services, including personal automobile, homeowners, workers compensation, property, commercial automobile, general liability, global specialty, group disability, reinsurance and surety. Liberty Mutual Insurance (www.libertymutualinsurance.com) employs over 50,000 people in more than 900 offices throughout the world.

Liberty International Underwriters is the marketing name for the broker-distributed specialty lines business operations of Liberty Mutual Insurance. Certain coverage may be provided by a surplus lines insurer. Surplus lines insurers do not generally participate in state guaranty funds and insureds are therefore not protected by such funds. This literature is a summary only and does not include all terms, conditions, or exclusions of the coverage described. Please refer to the actual policy issued for complete details of coverage and exclusions.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet and...
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
Zerto exhibited at SYS-CON's 18th International Cloud Expo®, which took place at the Javits Center in New York City, NY, in June 2016. Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform™, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The company’s flagship product, Zerto Virtual...
Some people worry that OpenStack is more flash then substance; however, for many customers this could not be farther from the truth. No other technology equalizes the playing field between vendors while giving your internal teams better access than ever to infrastructure when they need it. In his session at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, will talk through some real-world OpenStack deployments and look into the ways this can benefit customers of all sizes....
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...