Insurance Tech Faces the Internet of Things Arms Race

The success of insurance companies always has been predicated on their ability to collect, understand and act on information they collect throughout the insurance value chain. That same logic appears to be the motivation behind a rising number of telematics and analytics technology providers entering alliances, if not executing mergers and acquisitions, according to industry experts. Just this spring and summer, new alliances include:

  •     Verisk Analytics partnering with IMS for telematics scoring and with Vehcon for a usage-based insurance mobile app
  •     CGI signing on with Baseline Telematics for usage-based insurance rating
  •     Telit Wireless and Agnik working on a combined platform for Internet of Things data in insurance
  •     Saama and HortonWorks, horizontally focused analytics and Hadoop companies, respectively, partnering for an insurance-specific analytics product
  •     AIR Worldwide tapping into Actian analytics for its catastrophe modeling product Touchstone

The motivation behind the deals, explains Donald Light, director of Celent's North America P&C insurance practice, is the desire to offer a more complete set of tools to insurers, and to reduce the costs and risks associated with big data projects.
“There’s real value in the results of the analytics from the data produced by telematics devices,” Light says. “But this is an integrated system. You need all three parts: the generation of data, the ability to analyze the data, and then the feedback,” which is used for scoring, gamification and social applications, he says. “The challenge for insurance companies is that in a lot of cases they do not have the ability, inclination or desire to analyze this huge amount of new data that these network sensors are throwing off,” Light says.

As business intelligence and analytics technologies have become more capable, many insurers have developed strategies around internal and easily accessible external data sources, explains Monique Hesseling, partner at insurance consultancy Strategy Meets Action. More recently, however, insurers have come to the conclusion that they can augment internal data with data from sensors and the Internet of Things (IoT) to service and protect customers better, offer more individualized propositions, manage risks better and handle claims faster and more effectively. 
“When combined with data already available within insurance companies, this new data will provide carriers with additional insights on both risks and customer behaviors, allowing them to service their clients with better products and improved claims handling. Ultimately, it will all benefit policy holders,” Hesseling says.

For insurers the problem has two parts, Light adds. First, the data is unfamiliar, second, insurers need data scientists and adequate tools, both of which are expensive and difficult to find. “So, there’s a natural opportunity for someone to aggregate the data, apply the analytic tools and generate scores.” As result, Light says he expects to see more deals of this type.

Thuy Osman, a research and consulting manager at Novarica, says technology companies are adding capabilities and functionality, frequently through mergers, acquisitions and partnerships in an effort to be more easy to do business with. For vendors of telematics, standing out from the crowd means being a one-stop shop, she explains, and the quickest way to gain more capabilities is to acquire or partner.
“In the last few years we’ve seen telematics service providers offer device, data collection and analysis. Through acquisitions, mainly Verizon’s acquisition of Hughes Telematics in 2012, connectivity is now also an offering,” Osman says. “Following Verizon’s play, Sprint partnered with DriveSync in 2014 to offer IMS UBI Intelligence. AT&T also has an insurance telematics offering for fleets.”

But telecoms aren’t the only ones entering the telematics space. “Connected car is another important player in usage-based insurance,” Osman says. “Acquisition activity you see here is Sirius XM's acquisition of Agero's connected vehicle services unit in 2013. There’s also the partnership between Progressive’s Snapshot and Onstar, affirming the importance of connected car in the UBI space. Not only do you see partnerships and acquisitions to add related and cross capabilities to bring everything under one house, you also see acquisitions to expand current capabilities, exemplified by LexisNexis’s acquisition of Wunelli in 2014."

Tom Benton, vice president of research and consulting at Novarica adds that the current lack of standards within the IoT technology space is another important driver of the trend, as most insurers’ current technology cannot handle the huge volumes of data created by IoT devices. As a result, insurers increasingly will rely on third parties to collect, host and analyze that data. “2015 is the year the future arrives,” Benton says.
Information-Management: http://bit.ly/1IEfEdG

 

« Hacktivist group 'Anonymous' declares Dec 11 as ISIS 'trolling day'
Cybersecurity Is A Big Government Problem »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

ODSC

ODSC

ODSC is a security systems integrator that provides services and expertise in identity management and access.

Findings

Findings

Findings (formerly IDRRA) is a scalable AI powered assessment platform that streamlines security compliance across sectors, jurisdictions and regulatory frameworks.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

Ascend Technologies

Ascend Technologies

Ascend Technologies offers a full suite of managed IT services including: Cloud & Infrastructure Management, Cybersecurity Management, Service Desk Management, Application Management , Data Management

Tapestry Technologies

Tapestry Technologies

Tapestry Technologies supports the Department of Defense in shaping its approach to cybersecurity.

UK Cyber Security Association (UKCSA)

UK Cyber Security Association (UKCSA)

The UK Cyber Security Association (UKCSA) is a membership organisation for individuals and organisations who actively work in the cyber security industry.

Cyber Security Canada

Cyber Security Canada

Cyber Security Canada is an accredited Certification Body for government-backed Cyber Security Certification Programs, designed specifically for small and medium-sized Canadian businesses.

Mitigate Cyber

Mitigate Cyber

Mitigate Cyber (formerly Xyone Cyber Security) offer a range of cyber security solutions, from threat mitigation to penetration testing, training & much more.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.

Center for Cyber Security Studies & Research (CFCS2R)

Center for Cyber Security Studies & Research (CFCS2R)

CFCS2R's mission is to empower individuals, organizations, and governments with the knowledge and tools necessary to protect against cyber threats.

Cavelo

Cavelo

Cavelo helps businesses proactively reduce cybersecurity risk and achieve compliance with automated data discovery, classification and reporting.

PhishFort

PhishFort

PhishFort offers brand protection services to combat phishing, fake content, and IP infringements.