09:35 AM
Nathan Golia
Nathan Golia
Connect Directly

Insurance Cloud Success Stories

Insurers that once doubted the cloud are benefiting from the competitive and economic advantages of as-a-service models -- with great results.
1 of 5

By now, most insurance technologists accept certain truths about "cloud" or "as-a-service" delivery models for business applications: They create opportunities to reduce IT maintenance costs and complexity while allowing increased scalability. While concerns about security of precious policyholder and business data constrained early adoption, maturation in the sector has led a growing number of insurance companies to attempt implementations.

Cypress Insurance moved to the cloud so it could "become more efficient, be more competitive, deliver products faster, and react to rate and regulatory issues," according to senior VP Dan Colarusso.

"The new approach was to develop completely new architecture and related operational efficiencies," he explains. "We have more positive control to react to the market much quicker by having that control ourselves."

Insurers are also finding that the flexibility afforded by the cloud helps meet many business imperatives in an increasingly anytime, anywhere world.

"From an insured perspective, there are many initiatives on the table that we want to be able to provide them, such as being able to file a claim electronically, being able to check billing, being able to interact with customer service people in a real-time environment," says Andre Nieuwendam, director of IT for United Property & Casualty Insurance Co. "And with an internalized local network, we can't achieve that. Being in the cloud has enabled us to meet all of these objectives in a very, very short period of time."

And that need for speed doesn't just apply to policyholders. Insurance company employees, too, have expectations for delivery that can be met using the cloud. Alex Salop, director of enterprise product marketing for Brainshark, has found a niche for his company's software-as-a-service training system in providing agent-based companies with an easy way to disburse training or regulatory information to the field force.

"There's a need to reach people located all over the place, especially with a mobile workforce," he says. "Insurers are trying to figure out ways to get information out rapidly to the field -- while still having an audit trail that you need for regulatory purposes."

While moving to the cloud requires an adjustment period, most insurers are weathering the unsettled environment well. It's important to embrace the change and make sure everyone's buying in, according to Alan Gutowski, finance manager for the City of Albuquerque, which uses a cloud-based system for its self-insured workers' compensation and liability organizations.

"You're just defeating the purpose by creating workarounds and Band-Aids," he says. You can never expect a system to be what it was with an old system. Part of it is a change in culture and getting the acceptance."

Following are four examples of insurers that are getting that buy-in and finding success with cloud-based systems.

Anthony O'Donnell also contributed to this report.

Nathan Golia is senior editor of Insurance & Technology. He joined the publication in 2010 as associate editor and covers all aspects of the nexus between insurance and information technology, including mobility, distribution, core systems, customer interaction, and risk ... View Full Bio

1 of 5
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Janice, I think I've got a message from the code father!
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.