News & Commentary

01:07 PM
Nathan Golia
Nathan Golia
Connect Directly

Market Delivers on Promise of Increased M&A

The studies came fast and furious all summer: Expect more M&A activity in the insurance industry. Today, we saw two examples. What can IT departments expect?

When Allstate bought Esurance earlier this year, several consultancies and analyst firms saw it as an inevitability that more M&A activity would follow. Many factors were said to be driving the activity. Deloitte suggested regulatory pressure, while Towers Watson noted that in a still-stagnant economy companies were looking to "right-size" their business.

"I think that [increased activity] is around both improved capital and increased earnings," Jack Gibson, Towers Watson’s managing director, global mergers and acquisitions, told me. "People are looking outside their normal areas — for greater global expansion, or new channels — while other companies are definitely looking to better balance their portfolio or right-size things."

KPMG alluded to both of those factors in a survey: "The key driver of increased M&A activity, according to 47 percent of the executives, is access to new markets, followed by regulatory changes and pressures (38 percent) and product synergies (33 percent)," the company said in a release.

Meanwhile, Aite Group's Stephen Applebaum posited that Allstate specifically might be looking to tap into Esurance's innovative IT culture.

The two acquisitions announced today — Nationwide's purchase of Harleysville, and Medical Protective taking on Princeton Insurance — demonstrate the breadth of strategic reasons for investments and divestments to which Gibson referred. Nationwide says it's looking to increase its commercial lines footprint. Meanwhile the company that sold Princeton Insurance to Medical Protective, Medical Liability Mutual, saw an opportunity to concentrate in one state while the suitor was looking to expand its distribution area.

For IT departments, these kinds of acquisitions don't often lead to many wholesale changes, according to Matt Josefowicz, partner and managing director of Novarica. Because it seems both Harleysville and Princeton will be continuing with business as usual, any IT assignments are likely to be about adding value rather than subtracting systems and employees.

"M&A impact on IT varies depending on the acquirer's strategy," Josefowicz says. "If the acquired company maintains its own organizational structure and is really merged only at a balance sheet level, there maybe some opportunity to do shared services or leverage relationships with key vendors, but there is generally less of an integration project or total re-engineering of operations and technology."

Nathan Golia is senior editor of Insurance & Technology. He joined the publication in 2010 as associate editor and covers all aspects of the nexus between insurance and information technology, including mobility, distribution, core systems, customer interaction, and risk ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.