Integration Details
OneBrightlyCyber's Elite bundles for RUN Powered by ADP synchronize basic employee data automatically when you login as an administrator.
Monitor employee emails, remove and add users in seconds, enabling simple, fast, and effective monitoring of your business' cyber footprint.
ADP Applications Integrated
- RUN Powered by ADP®
Integration Type
- 1. Read data from ADP
2. Single Sign-On (SSO) (practitioners only)
3. Buy Now
Application Type
- Data Connector and End User
Data Sync Frequency
- Real-time
Data Fields
- The following fields will be sent from ADP to One Brightly Cyber:
1. Name
2. Department
3. Title
4. Email
Up And Running Within 10 Minutes
- Simply enter the number of employees - and hit subscribe. And that’s it. Within 10 minutes all your employees – as well as their families – will be actively monitored for threats, alerted when something significant is found and offered help in resolving it and getting things back to normal.
Commitment to Responsible AI
Together with ADP Marketplace, our company is committed to the responsible use of AI. When incorporating AI into our product(s), we have agreed to comply with ADP Marketplace’s AI principles focused on human oversight, monitoring, privacy, explainability, transparency, and mitigating bias. Learn more here.
How we use AI
- One Brightly Cyber uses D-ID AI agents to provide expert cyber resolution and remediation guidance to personal and commercial clients.
OBC’s AI Agent, Yui, draws up hundreds of pages of our proprietary resolution methodologies to help clients navigate their cyber threats, attacks and other events 24/7/365. Yui’s implementation does not use generative AI from unknown or unvetted sources.
Yui’s responses for the support of phishing, online fraud, cyberbullying, password compromise, ransomware, or other cyber events are based on materials within our operational catalogs that are constantly updated based on case experiences, new threats, and changes in compliance and regulatory frameworks.
The guidance Yui provides has been carefully vetted and clients receive the very best of our resolution recommendations. This ensures consistency and quality in our remediation responses and support.
If clients have questions about the information Yui provides, they can call one of our Cyber Advocates 24/7 for clarifications or further assistance.
If you have questions about how One Brightly Cyber uses AI, please contact us.
Ransomware Attack - Emergency Support
We’ve already successfully resolved ransomware incidents for companies like yours and have never had to pay out a dime. Our goal is to minimize any operational disruption to your business, getting things back to normal quickly.
Workforce Cyber Risk Assessment
From the first moments that you start our service, we begin assessing your business and employee cyber risks, not generally, but specifically. We continually collect new data and use our proprietary OBC Oxygen technology to simply provide updated assessments and alerts to reflect your current and emerging threats. More than just alerting, we will keep watching your specific threats and keep reminding you to change a password, scan for malware, or just call our Cyber Advocates to mitigate any serious cyber issues.
Cyber Advice Built Just For You
Cyber Education & Readiness
Let us educate and remind your staff on how to avoid the most common online cyber missteps through our series of short (3-4 minute) videos. Our education and readiness exercises cover the major cyber threats to your business, including phishing, spoofing, remote working, wire transfer fraud, weak passwords, social media leakage, ransomware, malware, and identity theft. More than just training, we monitor staff for readiness and compliance with cyber "basics".
Comply with federally mandated score tracking
- With tests after each module, you can even track and monitor employee progress and understanding. This score tracking may be mandatory for your business in January 2025 under the Critical Infrastructure Act (CIRCIA). Get on top of training today and avoid fines and penalties tomorrow.
Hands - Free Cyber Alerts
Once a corporate domain or employee email address has been set up, we automatically monitor for new cyber threats and alert administrators and staff when a new threat is detected. There is no need to keep logging into an application or portal. We will notify staff via email (and soon text) when we spot new threats and also provide specific details regarding the threat and support and actions to quickly mitigate it.
Dynamic threat monitoring and resolution support
24/7 Incident Response Services
Round-the-clock Incident Response from our US-based team of security experts to resolve cyber incidents, including ransomware, phishing, social engineering and online fraud. Most cyberattacks are perpetrated after hours and often are discovered in the evening, on weekends, or during holidays. Our Cyber Advocates are ready to support you and do the heavy lifting to get your operation back up and running, regardless of the day or time.
On call, day or night, 365 days per year
Regulatory & Compliance Services
Compliance legislation keeps evolving and can differ from state to state. We’re there to help ensure you’re always on top of regulatory issues and will advise you on any steps you need to take. If your business experiences a cyberattack, we will assist with regulatory notifications, communication with clients, and coordination with local and federal enforcement, the IRS, banks, credit bureaus, and vendors.
Helping your business meet regulatory requirements
Enhanced Employee Cyber Protection
Cyber is a people problem. Unfortunately, online behaviors and mistakes routinely lead to data breaches, ransomware, and other cyberattacks. Cyber tools cannot prevent a cyberattack. We detect threats beyond the firewall and identify behaviors and risks that conventional cyber tools aren't tracking. We are looking in different places and at different threat patterns. Before cyber tools detect a threat on your network, we routinely spot threats and provide advance warning from our unique vantage points. We don't replace or compete with any existing cyber tools, we just make your overall cyber program stronger - providing the essential cyberattack protection and recovery services that you need and do not currently have in place.
Which means we don’t step on anyone’s toes. We provide an extra and highly personal level of protection which is ideally suited to the needs of HR.Providing a critical piece in the cyber protection and recovery puzzle
AI-Powered Threat Management
You need to know about a data breach when it happens, not 200 days later, the average time it takes a business to notice.
Our AI-enabled technology identifies cyber threats 18-24 months before other providers and predicts where hackers will likely strike. We have developed proprietary algorithms and threat data sets based on over 50 different business segments, bringing the power of AI and twenty years of threat detection experience to better manage your cyber threats and protect your business.A better approach to early threat detection
Dynamic Cyber Risk Scoring
As you begin your cyber services with us, we calculate an initial cyber risk score for your company and each employee. This cyber risk score is similar to a credit score and is dynamically updated based on better online cyber behaviors, adding new cyber protections to standard processes, or the identification of new cyber threats. Cyber risk scores range from 0 to 1000 points and provide an easy means of reviewing your level of cyber protection and exposure over time.
Our intuitive dashboard allows you to see at a glance what’s happening:
- • Compromised passwords • Shared password • Weak passwords • Password strength • Malware infections • Compromised PII • And more
Employee Households - Family Cyber Protection
Cyber problems at home can be highly distracting and stressful too.
Give your staff total peace of mind by protecting their families and providing 24/7 expert assistance for any cyber issues or threats, including cyber bullying, identity theft, ransomware, home title fraud, and online fraud. Children at college or relatives under the employee's care also are eligible for cyber protection and recovery services.Cyber Services for Households
Cyber Insurance - Claims and Purchase Support
Post cyberattack, getting cyber claims prepared and submitted can be challenging and time consuming. Our Cyber Advocates will work with you, gathering the correct information and getting your claim properly formatted for submission. Most cyber claims are returned due to incomplete submission materials and mistakes. We can help your business avoid these challenges. Should your company require cyber insurance, our sister company, Brightly Insurance, can provide you with expert guidance. Brightly Insurance has worked closely with Lloyd's, Hartford Steam Boiler (MunichRe), Boxx Insurance, and others in developing new coverages and programs to meet the specific needs of small and medium-sized businesses.
Cyber claims and coverage made simple
Cyber Insurance - Limit Premium Increases
For many small and medium-sized business, obtaining proper cyber coverage has become more challenging and expensive. Our staff works closely with several global cyber carriers and many of our services have been created in response to the cyber protections and protocols that they encourage, and often require for issuance of coverage. Data encryption, Multi-Factor Authentication, Routine Staff Training and Scoring, Password Management protocols, and other protections are central to our cyber services for your business. Adopting and maintaining these protections will better qualify your business for renewal and provide a critical means of limiting the increase in your future premiums.