Blog Posts

Filter By:
April 24, 2019 by (not verified)

At this year's RSAC, I sat down in 49 vendor briefings, each of which lasted 30 minutes, from Monday to Friday. So if you think, "Why should I believe Alissa when she tells me about the takeaways from this year's RSA?" Well ... in the memorable words of Bill Engvall, "Here's your sign."

If the show floor at RSAC is in any way indicative of the overall trends we'll see in cybersecurity controls in 2019, then I pretty much nailed it in my Aite Group report Top 10 Trends in Cybersecurity, 2019: User Experience and Machine Learning.

The words I'd use to describe the cybersecurity trends in 2019 and takeaways from this year's RSAC are “automation,” “AI,” “data,” “removing the human,” and “frictionless.”

April 23, 2019 by Jay Sarzen

For the most part, insurance carriers haven’t really viewed the claims process in a positive light, as it is complex (especially with a multiparty property and casualty claim), tedious (lots of data and fact gathering), and filled with suspicion (carriers thinking that policyholders could be trying to defraud them and policyholders thinking that carriers could be trying to pay less than what they are entitled to). Because of these factors, carriers have often viewed the claims process as more of a necessary evil than an opportunity to deliver a better experience to policyholders.

April 23, 2019 by Jim Klotz

Carriers have invested heavily in creating new digital customer experience but making claims payments often still ends in a “your check is in the mail” notification. Digital payment alternatives, first developed for industries like retail, are now finding their way into insurance.

April 23, 2019 by (not verified)

Security information and event management, or SIEM—once upon a time referred to as SEM (security event management), SIM (security information management), SIM/SEM, or (insert your preferred acronym here)—is a category of software that surfaced in the late '90s with Intellitactics (1996), netForensics (1999), Arcsight (2000), Q1 Labs (2001), LogRhythm (2003), and Splunk (2003). SIEM solutions would offer hope to security analysts looking to aggregate and correlate all of the log and other event information from different servers and devices on their network in a single place.

Pages