03:15 PM
Connect Directly

Narragansett Bay Accelerates the Claims Pipeline

Narragansett Bay's move to BlueWave Technologies' web-based PipelineClaims system has helped the insurer speed claims resolution, boost recoveries and prepare for growth.

As new leadership strived in 2008 to resurrect Narragansett Bay Insurance Co. (NBIC) from the ashes of its predecessor, Pawtucket Mutual Insurance, legacy technologies impeded success, reports Mike Anselmo, NBIC's CIO. "None of our existing systems could keep up with our growth goals," he says. "We wanted new systems that provided big-company advantages while staying agile and nimble."

As NBIC researched core vendors in early 2009, two policy admin systems rose to the top. "But neither had claims systems we considered ready for prime time," recalls Bob Khosropur, chief claims officer for Pawtucket, R.I.-based NBIC. But research also introduced NBIC ($60 million in premium income) to BlueWave Technologies' (Honolulu) PipelineClaims.

"Because we intended to operate as a lean company by drawing on third parties for services, such as first notice of loss, BlueWave's interface was attractive because it required virtually no training," explains Khosropur. "Plus, BlueWave's SOA [service-oriented architecture] and web-enabled platform gave us confidence that it could scale up efficiently."

Wary about integration between BlueWave and its policy admin vendor at the time, SaaS-based Exigen Insurance Solutions (San Francisco), NBIC brought the CEOs of both companies together over the 2009 Labor Day weekend, according to Anselmo. "From that meeting, we gained commitment at the highest levels," he says.

By October 2009 a two-phase deployment began, starting with the BlueWave solution and followed by the integration with Exigen. For infrastructure, NBIC invested in separate private clouds for production and disaster recovery. Then NBIC's team, drawn from its IT staff of 12 as well as members of the business claims team, worked with BlueWave using an iterative development and testing approach.

In June 2010 the first phase hit a speed bump: Microsoft (Redmond, Wash.) SQL performance and Oracle (Redwood Shores, Calif.) licensing issues prevented PipelineClaims from operating on NBIC's private cloud. "As a workaround, BlueWave offered to host us at their colocation until these issues were resolved," recalls Anselmo. PipelineClaims went live in August 2010, and the fully integrated systems were rolled out less than three months later.

"With our legacy systems, it took at least a week to become comfortable with the claims systems," Khosropur observes. "Today, new internal and external staff hit the ground running -- such as during storm spikes when additional examiner resources are needed -- and are fully functional on the [BlueWave] claims technology in half a day. Plus, as a web-enabled system, PipelineClaims is accessible from anywhere, even on an [Apple] iPad."

Additionally, workflow and task automation allows NBIC to settle claims a week earlier, on average, according to Khosropur. And by designing its system to consider every claim as having subrogation potential by default, NBIC's recoveries have soared. "To override, an adjuster must provide a reason," explains Khosropur. "With technology driving subrogation, our recoveries are up 2 percent to 3 percent."

Next, NBIC plans to add external services from ISO and others, Anselmo says. "Our new enterprise architecture allows us to dramatically reduce costs, provide value, offer flexibility and grow the business," he adds.

Anne Rawland Gabriel is a technology writer and marketing communications consultant based in the Minneapolis/St. Paul metro area. Among other projects, she's a regular contributor to UBM Tech's Bank Systems & Technology, Insurance & Technology and Wall Street & Technology ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Janice, I think I've got a message from the code father!
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.