News & Commentary

11:39 AM
Deb Smallwood, SMA
Deb Smallwood, SMA
Commentary
50%
50%

Setting the Stage for Innovation, Part 3: Leverage Next-Gen Technologies

In the final part of a series on encouraging insurance IT innovation, SMA's Deb Smallwood talks about how technology can be an enabler of new ideas.

Philosophers have debated the question for ages: What came first? The chicken or the egg? A similar question arises when we think about today's technology: What spurs this surge of rapidly developing and advancing technology? Is it the need for new ways to solve problems, or is it the technology itself that spawns new offerings, approaches, and solutions? If the latter is the case, then the need to discover how to use the next-generation technologies becomes a different challenge – how to deploy the technology, harness its power and potential, and turn it into new ways to make businesses better, more efficient, and more profitable. The answer is simple. Innovate!

SMA has conducted extensive research into what is driving innovation in the insurance industry. More than a third of the insurers participating in a recent SMA survey say they have transformational game-changing objectives in mind, and are planning investments in major operational improvements. And, next-gen technologies will play a big role!

There are three fundamentals that insurers must embrace to create and foster a climate for innovation within their organizations. This blog addresses how leveraging next-gen technologies can help set the stage for innovation.

Leverage Next-Gen Technologies

Next generation technologies such as social media, mobile technologies, and collaboration are being increasingly utilized in insurance innovation efforts. The key to success lies in unleashing creativity and infusing it with information – especially with new insights gained from sophisticated analytics. Next-gen technologies, including mobile, collaboration, analytics & big data, social media, and cloud, are not only catalysts in the innovation process itself, they become part of the new processes and systems.

How do insurers plan to make use of next-gen technologies over the coming three years? More than 75% say they will increase IT spending in mobile technologies. Investments in analytics & big data and collaboration technologies follow closely behind. About 50% of insurers plan to increase spending on cloud computing and social media. Insurers see analytics & big data, mobile, and collaboration technologies as having the highest potential to be game changers.

It's time for every insurer to look closely at how their IT investments are influencing and nurturing innovation. Next-gen technologies need to be taken seriously. They offer tremendous opportunities to enable the small actions that seed the big picture, and produce the greatest returns.

About the Author: Deb Smallwood, the Founder of SMA, is recognized for her expertise in investing in technology to influence competitive advantage in the insurance industry. She offers a fresh perspective on how business capabilities can be enabled to meet strategic goals. Exclusively serving the insurance industry, Strategy Meets Action blends unbiased research findings with expertise and experience to deliver business and technology insights, research, and advice to insurers and IT solution providers. Deb can be reached at dsmallwood@strategymeetsaction.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Janice, I think I've got a message from the code father!
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.