6 Pillars of Enterprise Setup
Pricing Models
- 2 documents per deal
- Basic AI analysis
- Perfect for testing
- Unlimited documents per deal
- Advanced AI with claims intelligence
- Full compliance audit logs
Payment is per-deal, not per-user. Upgrade individual deals to Premium as needed via the deal workspace. All payments are processed securely through Stripe.
Quick Actions
Security Features
Restrict platform access to specific IP ranges or CIDR blocks. Perfect for office networks or VPN-only access.
Configure IP Ranges →Require all users to authenticate via your Citrix Gateway. Platform checks for x-citrix-user header presence.
Enable Citrix Requirement →Force MFA across your entire organization. Users must verify identity via authenticator app or SMS.
Enforce MFA →When configuring IP whitelisting, the system shows your current IP address to prevent lockout. Set session timeout between 15 minutes to 12 hours based on your security policy.
User Roles
Full access to AI analysis, document management, and deal finalization across all stages.
Can upload documents, view analyses, and assist with deal preparation under supervision.
Limited to early-stage document uploads and initial deal setup. Cannot run AI or finalize.
Read-only access to deal information and document viewing for administrative support.
User Management
From the User Management table, you can invite new users via email, assign roles, and revoke access instantly. All users within your organization are automatically isolated from other firms' data.
Manage Team MembersUse strong, unique passwords and enable browser password managers. Chrome and Edge can generate secure passwords automatically during signup.
Permissions Matrix
Control exactly what actions each role can perform at each of the 14 workflow stages. The permissions matrix allows you to gate:
Workflow Stages
The 14-stage underwriting workflow spans from Deal Setup through Claims Intelligence, Underwriting Questions, Coverage Position, and final approval stages. Each stage can have different permission requirements.
Configure Permissions MatrixDefault permissions follow industry best practices: Underwriters have full access, Brokers can only upload in early stages. Customize based on your firm's workflow.
What is Claims Intelligence?
The Claims Intelligence system stores known breach patterns, sector-specific risks, and proven underwriting questions. When analyzing a deal, the AI automatically references this database to:
Adding Intelligence
System Admins can manually add claim trends by sector and region, or use AI-powered web search to discover the latest W&I insurance claims reports and M&A litigation trends.
Manage Claims IntelligenceRegularly update your claims intelligence database with insights from closed deals. The AI learns from your firm's unique expertise over time.
Security Audit Logs
Every action in Pocket Underwriter is logged with full context: who performed the action, what they did, when, and from which IP address. Audit logs include:
Export Compliance Reports
Client Admins can filter audit logs by date range, user, or action type, then export as CSV for annual IT audits or compliance reviews. Each log entry includes metadata showing exact AI prompts and responses.
View Audit LogsLogs from Citrix Gateway users display a special badge showing the x-citrix-user header data, providing full session traceability for enterprise IT teams.
Key Admin Pages
Best Practices
- • Review audit logs monthly for compliance
- • Update claims intelligence after major deals
- • Test security settings before enforcing firm-wide
- • Keep role permissions aligned with job functions
- • Enable MFA before adding IP restrictions