News

03:15 PM
Connect Directly
Google+
LinkedIn
Twitter
Facebook
RSS
E-Mail
50%
50%

With Claims Data, Size Doesn't Matter

Insurers' claims organizations gain more benefits from flexible, agile analytics than from simply higher volumes of data, experts say.

Buzzwords can gain momentum quickly in IT, and the latest technology buzz is around "Big Data." Netflix's Jeremy Edberg, in an article for InformationWeek (a UBM TechWeb brand), recently defined big data as "the tools and processes of managing and utilizing large datasets." But for insurers looking to build smarter claims organizations, the tools are much more important than the size of the datasets themselves, experts say.

"There really is a ton of data in insurance," points out Aaron Fidler, VP at Applied Predictive Technologies, a Washington, D.C.-based provider of analytics software and consulting services. But, "There's always that question: Is more information going to be more valuable? Given what we've seen, it's critical to understand what is going to be helpful and what is noise."

To gain that understanding, most U.S. insurers are building proprietary data collection, storage and analytics capabilities, adds Craig Beattie, a London-based analyst with Celent. "Certainly big data has a role to play here," he says. "In the U.S., there's a little bit more proprietary analysis because insurance companies have invested in the infrastructure to do that."


Claims have become the next battleground for winning and retaining customers. Insurance & Technology's April digital edition explores the new ways in which insurance companies are applying people, process and technology to optimize the claims experience and create competitive distinction.

Mike Cesinger, VP of claims for Plymouth Rock Assurance ($1.2 billion in claims expense reserves, 2010), speaks with pride about his company's in-house analytics unit. The Boston-based carrier, which offers personal lines auto and home insurance, evaluates claims not by bolting on new data sources to its existing ones, he explains, but by proactively looking for the information that most accurately represents the profile of a claim.

"There's a shifting set of data elements that we look at," Cesinger says. "We're proud of the fact that we looked at not just the nature of the claim, but the nature of the risk — not just the insured's claims history, but garaging locations and undeclared operators, among other things. We're taking a more holistic approach to evaluating individual claims and not just triaging them based on the description of loss."

An Accurate Bucket List

At Plymouth Rock, claims are processed into one of three buckets, Cesinger adds: One bucket contains claims headed for the special investigations unit (SIU); another contains those that are potentially problematic, but don't necessarily need the SIU's attention; and the third is for claims that are unlikely to cause any problems. As data and analytics tools have proliferated outside of the IT department, he says, it has become easier and faster for the insurer to get a claim into a specific bucket — or move it from one to the other.

"The ability of our analysts to massage our data and let it take us where it needs to in a short period of time — but still be nimble in what our response might be — has been a huge boon," Cesinger says. "In the past, when you had your IT department write a query, you only got an answer to that query a couple weeks later. Now you've got the ability to go in and identify visual patterns and use neural networks to identify associations of data immediately."

Like many companies, Plymouth Rock has been applying its new analytics capabilities to social media data, Cesinger reports. Policyholders can expose a surprising amount of information via social networks, he notes. "It's interesting when you have someone who reports that their car was hit while unattended in the supermarket, but at the same time that was supposedly happening, they've got a Facebook post about how drunk they are," Cesinger says. "Young people have much more desire to be totally forthcoming in their social media posts, and that sometimes can be gold for an insurance investigation."

But that doesn't mean that the only use for analytics is to police policyholders, Applied Predictive Technologies' Fidler stresses. "Right now there's a focus on how we reduce fraud, but also on retention and interaction, as we think of ways to interact with our customers at the point of a claim," he says.

[For more about the 4 Ways Big Data is Changing Claims, see Nathan Golia's related story.]

Nathan Golia is senior editor of Insurance & Technology. He joined the publication in 2010 as associate editor and covers all aspects of the nexus between insurance and information technology, including mobility, distribution, core systems, customer interaction, and risk ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.