Insurity

“We simply didn’t have the time in the day to do this kind of analysis. Reach made it possible in minutes.”

Jay Wilson

Jay Wilson

CIO & CISO

Insurity
circleslines
stars
banner wave decorativebackground

Insurity boosts security with Reach

Operating in the heavily regulated insurance sector, Insurity needed to balance agility with strict security requirements. As both CIO and CISO, Jay Wilson leads an integrated IT and security team that must move fast while maintaining trust with customers. This dual mandate gave Jay visibility into how fragmented best-of-breed tools and evolving initiatives like Zero Trust placed operational burdens on his team.

Like many organizations, Insurity had started its Zero Trust journey, but implementation was complex. Early design decisions prioritized speed, allowing the team to move quickly, but Jay knew the architecture wasn’t yet fully aligned with Zero Trust principles. A project to analyze access patterns across their ZTNA provider had begun, but completing it required extensive manual work across fragmented systems.

Using data to automate control hardening & attack prevention

Insurity

Insurity partnered with Reach to address these challenges and bring continuous posture management into their operations. Reach integrated with Insurity’s tech stack—including identity, network, endpoint, conditional access and email— to enable a unified and automated approach to optimizing security controls.

“Reach helps us manage new capabilities in ways we couldn’t before. It’s not just about starting a program, it’s about sustaining it efficiently over time.”

Since implementing Reach, Insurity has transformed its security operations and achieved several improvements:

  1. Continuous Posture Management: each automates monitoring and optimization of security controls, reducing the need for repeated manual efforts.
  2. Operational Efficiency: Reach Quests streamlined workflows, helping the team act quickly on actionable-insights.
  3. Improved Visibility: Reach enhanced understanding of attack surfaces through tools like NIST CIF compliance dashboards and MITRE alignment.
  4. Cross-Team Collaboration: Reach facilitated stronger ties between IT and security teams, ensuring alignment on tool management and objectives.

Hiring for security expertise instead of security product expertise

Demand security talent has never been greater as the threat landscape continues to evolve.

Reach supports Insurity in moving beyond assessments by helping them continuously identify risk, prioritize action, implement changes, and validate posture in an efficient, scalable way. With Reach acting as a virtual assistant, Jay’s team is empowered to maintain momentum on key programs without increasing headcount or overhead.
Reach supports Insurity in moving beyond assessments by helping them continuously identify risk, prioritize action, implement changes, and validate posture in an efficient, scalable way. With Reach acting as a virtual assistant, Jay’s team is empowered to maintain momentum on key programs without increasing headcount or overhead.
Reach supports Insurity in moving beyond assessments by helping them continuously identify risk, prioritize action, implement changes, and validate posture in an efficient, scalable way. With Reach acting as a virtual assistant, Jay’s team is empowered to maintain momentum on key programs without increasing headcount or overhead.
Laptop with Reach Dachboard
play button iconplay button icon
Reach’s platform integrates seamlessly with your existing infrastructure, ensuring minimal disruption during deployment. Our compatibility with a wide range of tools and environments allows you to quickly optimize your security posture without overhauling current processes.

Measuring, improving & reporting on product effectiveness

Insurity began working with Reach to accelerate progress on critical security initiatives starting with Zero Trust, but with a roadmap that spans broader maturity improvements across the stack. One of the most impactful early use cases involved analyzing and optimizing access across the organization. Reach enabled Jay’s team to evaluate their implementation, surface risky patterns, and refine policies far faster than traditional methods allowed.

Reach’s approach to measuring product effectiveness consists of the following:
  1. Continuously analyzing data from active deployments.
  2. Gathering direct feedback from customers.
  3. Measuring key outcomes, such as reduced risk exposure.
  4. Using insights from these measurements to enhance product.

By combining seamless integration, proactive threat detection, automation, and adaptability, Reach Security delivers a comprehensive approach to cybersecurity that empowers organizations to stay ahead of the curve and confidently face an ever-changing threat landscape.

"Reach provides a single pane of glass for viewing your entire security ecosystem. Comprehensive dashboards and detailed reports enable you to understand your risk posture, track trends over time, and make informed decisions. These insights help refine your overall security strategy, ensuring that you stay ahead of emerging threats. Reach’s platform integrates smoothly with your existing infrastructure, ensuring minimal disruption during deployment. Our compatibility with a wide range of tools and environments allows you to quickly enhance your security posture without overhauling current processes"

Insurity & Reach: The Story Continues

“Reach helps us manage new capabilities in ways we couldn’t before. It’s not just about starting a program, it’s about sustaining it efficiently over time.”

1000

9.6%

Of your organization’s risk
diagram
130
People in this group 1.2% of your organization
“Reach is in a unique position. They have the opportunity to create that ‘1 + 1 = 3’ moment across platforms and point tools. That’s the real power.”

Insurity views Reach as a long-term partner, not just a tool. As new tools and policies are introduced from access controls to endpoint and network configurations, Reach will play a role in enabling and maintaining them.

Getting Started with Reach

Unlock the full power of your security stack with a free tool rationalization assessment.

An API key to start
key icon

Read-only API key for a security tool of your choice

Setup in 3 minutes
settings icon

Create your account and setup the integration

Results in < 5 days
diagram icon

Get results across licensing, control mapping, risk exposure, and posture

Just Released: TAG Cyber's ROI analysis of the Reach platform
Read the Report
arrow rightarrow right