10:11 AM
Connect Directly

Cover-All Technologies Acquires BlueWave Technology

The cash transaction, which concluded on Dec. 30, underscores continuing vendor consolidation aimed at providing integrated core insurance software component suites.

The trend toward "componentized suite" core insurance system offerings continues with Fairfield, N.J.-based Cover-All Technologies' acquisition of BlueWave Technology (Honolulu), manufacturer of the PipelineClaims P&C claims software solution, through a cash transaction concluded Dec. 30, 2011.

The Cover-All/BlueWave browser-based claims administration software solution will be marketed both as a standalone solution as well as a fully integrated component within Cover-All's existing Policy and Business Intelligence products, including NexGen Policy (My Insurance Center), NexGen Business Intelligence, and NexGen Billing (currently in development), according to a vendor statement. Cover-All touts the BlueWave acquisition as positioning the vendor to deliver additional value and achieve significant competitive advantage through what it terms a fully integrated component within Cover-All's existing Policy and Business Intelligence products.

Cover-All's acquisition of Blue Wave underscores the growing dominance of the "componentized suite" model of core insurance software offerings, according to Matthew Josefowicz, partner and the managing director of Novarica (New York). "Insurance software buyers are increasingly looking for solution providers to be able to provide pre-integrated but separable components for policy, billing, and claims," Josefowicz comments. "We expect to see more consolidation in this space this year."

Karen Furtado, a partner at Boston-based SMA comments, "We are continuing to see the consolidation trend in the market as component based solution providers position for enterprise suite deals. The pendulum has been swinging in the direction of core system enterprise solutions which has created a challenging environment with a large number of policy or policy/billing players and few full suite options. As with similar transactions taking place in 2011, this will be an offering that will bear watching to see how it develops from both architecture and go-to-market viewpoints."

Anthony O'Donnell has covered technology in the insurance industry since 2000, when he joined the editorial staff of Insurance & Technology. As an editor and reporter for I&T and the InformationWeek Financial Services of TechWeb he has written on all areas of information ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.