News & Commentary

08:50 PM
John Sarich, VUE Software
John Sarich, VUE Software

Machine-to-Machine: Insurance Applications Emerging

As M2M becomes more widely understood, the use cases for insurance will only be limited by the imagination of technologists and insurance managers.

At the time of this writing, there is still uncertainty regarding Malaysian Airlines Flight 370. However, one interesting aspect of that tragic flight was the surprising revelation that its Rolls-Royce engines periodically transmitted engine performance data via satellite to the Rolls-Royce factory in the United Kingdom. That news was just another indication that machine to machine (M2M) technology is becoming more ubiquitous, and insurance companies should take notice — especially as it pertains to usage-based insurance (UBI) and telematics.

With UBI and telematics, devices located on a vehicle could transmit vehicle operation data (date and time, miles driven, speed, location, maintenance issues and air bag deployment) in real time back to the insurance company or the vehicle owner. That data can be used by insurance companies to provide more accurate rating information.

The use cases for M2M for insurance are largely focused on vehicle risks and not necessarily areas where the technology can provide broad benefits to insurance companies. But, as M2M becomes more widely understood, the use cases for insurance will only be limited by the imagination of technologists and insurance managers. For example, crop insurance is a little arcane when compared to other lines of insurance, but its use M2M technology is transferable to many other types of insurance. Crop Ventures is a company that has developed the capacity to monitor a myriad of data inputs coming from farm equipment such as a tractor or a combine. While the use of GPS is not new with farm equipment, the pairing of GPS with other technologies such as remote sensing, electro-mechanical devices, operating system monitoring and enhanced mapping creates a data platform where devices are reporting data on a continuous basis to a cloud-based application.

John Sarich, VUE
John Sarich, VUE

[Crop insurer RCIS' CIO on its Internet of Things initiative]

Crop insurance is an area where it is difficult to monitor a farmer's activities in relation to crop insurance guidelines and requirements. Documenting the date and time of planting provides proof of when the crop was planted or harvested. Since crop insurance protects against a loss in yield, accurately tracking real-time yield information ensures that claims are supported by the data. In addition to the data that crop insurers value, it is also informative for banks and other agriculture lenders to verify the date and number of acres planted in a certain field, amount of fertilizer used, and other data that is useful to the farmer, the lender and the insurance company.

Yet another area that M2M is emerging in insurance is in loss control. Remote sensing devices connected to pressure vessels such as boilers, water systems, pumps and so on, can sense drops in pressure, leaks, pumps that are going bad or boilers that are operating out of safe tolerance and use that data to alert appropriate management.

Insurance companies that insure construction and other heavy equipment can use the same technology described above for farming, to track construction equipment 24/7. For example, a road grader that is moving at 3am is likely in the process of being stolen. On the other hand, the contractor is able to track the exact number of hours that equipment is operating that becomes the basis of an audit trail for tracking construction costs as well as insurance exposure.

The whole of the technology that fits within M2M is significant, technologically interesting, and highly feasible. The information derived from it fits perfectly into the realm of insurance underwriting, risk assessment, and loss control will very soon begin to influence the panoply of risk assessment and management tools that are in common use today. As is often said, insurance reflects what is happening in society as a whole, and M2M is a reflection of a society that is adaptive of new technologies.

About the author: As Vice President of Strategy at VUE Software, John Sarich serves a senior solutions architect, strategic consultant and business advisor with more than 25 years of insurance industry experience.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Becca L
Becca L,
User Rank: Author
4/27/2014 | 7:39:25 PM
re: Machine-to-Machine: Insurance Applications Emerging
Wow, this is really interesting. The use cases with M2M seem limitless, and while it is a bit "big brother" I hope to see it used to justify budgets and enforce
regulations. For example, I don't know if insurers have an interest or obligation to report these things to government agricultural agencies, but it can be very revealing to line those numbers up with federal reports!
Nathan Golia
Nathan Golia,
User Rank: Author
4/26/2014 | 1:30:25 PM
re: Machine-to-Machine: Insurance Applications Emerging
Thank John. As many readers know this is a pet topic of mine. I think the infrastructure around the Internet of Things will grow faster than we think G and insurers need to be thinking about how it can or should impact their businesses now.
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.