1. Knowledge Base
  2. For Policyholders
  3. What's new on the Policyholder Dashboard

How to work with Travelers Preferred Vendors

Find preferred cybersecurity vendors through your Cyber Risk Dashboard

The Preferred Vendors list is a centralized repository of preferred partners that offer cybersecurity products and services. Travelers has strategic relationships with vendors in the marketplace to unlock preferred pricing. As a Travelers policyholder, you can take advantage of discounts and know that the vendors you're working with were selected by our team of cybersecurity experts. 

What types of vendors are available?

All vendors in the Vendor Marketplace have been reviewed and sourced by the Travelers team. They have been identified as industry leaders in each category of products / services and were handpicked with policyholders in mind. To learn more, simply click on a tile to get connected with a vendor and discuss how their offerings can help improve your organization's cybersecurity program! 

What do the categories of services or products mean?

Vendors in the Vendor Marketplace are tagged with sub-categories of product or service offerings. There are three overarching categories that these products and services fall into:  Security Products, Security Services, and Incident Response Services. See below for more details and an explanation of each sub-category. 

Security Products

  • Backup and Recovery
  • Cloud Security
  • DDOS Mitigation
  • Email Security
  • Endpoint Security
  • Firewalls (VPNs)
  • Insider Threat
  • MDM
  • Privileged Access Management (PAM)
  • SaaS Backups
  • SaaS Security / CSPM
  • Security Training
  • SSO / MFA / Authentication
  • Third Party Risk Management
  • Vulnerability Management
  • Web Application Firewalls
  • Zero Trust Network Access (ZTNA)

Security Services

  • Managed Security Services Providers (MSSPs) / Managed Detection and Response (MDRs)
  • IT Managed Services Providers (MSPs)
  • Backup as a Service
  • Consults on Active Directory Hardening, Backups, EDR, and MFA
  • Governance, Risk and Compliance (GRC)
  • Penetration Testing
  • Security Assessments
  • Tech Advisory Services

Incident Response (IR) Vendors

When your organization experiences a cybersecurity incident, you may need outside help – Incident Response Vendors – to investigate and respond. We categorize these incident response vendors into:  IR - Legal, IR - Forensics, and IR - Notification and Identity Monitoring. Please keep in mind that for incident response vendors, your organization will need to submit a claim and work with the claims manager to determine the vendors best positioned to help for the situation at hand.

  • Legal counsel, often referred to in the industry as “Breach Coaches”, help policyholders determine whether notification to individuals or regulators is required under various state, federal and international laws and regulations. If required, counsel will assist in drafting the notification letters.
  • Digital forensics firms help policyholders investigate what occurred and confirm there is not an ongoing threat. These firms may also assist with ransom negotiation and data recovery if capable.
  • Notification, call center, and identity monitoring vendors will mail breach notification letters to impacted individuals, staff a call center, and provide identity monitoring services when appropriate.