TITLE

Using digital trust to create industry value

PUB. DATE
September 2010
SOURCE
Asia Insurance Review;Sep2010, p84
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the strategy of using digital trust to create industry value with life insurers and annuity companies. It notes that potential clients must trust the integrity and long-term financial stability and resources of the insurance provider. It adds that digital trust is creating value with security services and technologies than just incremental improvement on the existing protection.
ACCESSION #
53847059

 

Related Articles

  • Button Up. Gay, Chris // Best's Review;Jul2009, Vol. 110 Issue 3, p99 

    The article reports on the significance of adopting advanced technologies by information technology (IT) professionals in the insurance industry in the U.S. It states that the implementation of technologies will help insurance companies in addressing the threat of data breaches as well as...

  • By Invitation Only. Voelker, Michael P. // TechDecisions;Apr2009, Vol. 11 Issue 4, p18 

    The article examines the need for information technology (IT) security in the insurance industry. The entry notes that insurers should be able to balance customer security and convenience in e-business access. The section cites the kinds of cyber attacks which insurers need to protect themselves...

  • Focus on the Future. Lewis, Robert // Best's Review;Nov2011, Vol. 112 Issue 7, p94 

    In this article the author discusses aspects of information technology (IT) and the Internet in the insurance industry. He states that IT departments have been facing challenges to adopt rapidly evolving digital technology. According to him, technology providers are now integral partners in...

  • SureSave security.  // Travel Daily;10/19/2015, p2 

    The article reports that various email addresses have been accessed by unauthorised parties following a security breach on the website of travel insurer SureSave Travel Insurance.

  • IT Security Lessons That Australia Can Teach Us. Kenyon, Paul // Database & Network Journal;Apr2012, Vol. 42 Issue 2, p19 

    The author reflects on the Australian government's "Strategies to Mitigate Targeted Cyber Intrusions" report that focused on data security requirements in the country. He explores the four measures of the 35-point strategy report, which are normal in doing business in the public sector and...

  • Securing the cloud in the digital age. Churchward, Guy // Database & Network Journal;Apr2010, Vol. 40 Issue 2, p21 

    The article offers the author's insights on the weaknesses of public computing cloud, such as the absence of visibility and issues on multi-tenancy which cover the true concern over critical data security. It states that the public cloud is incomprehensible, lacking the real accountability that...

  • INSURERS' TOP 5 IT SECURITY THREATS. McMahon, Chris // Insurance Networking News;Aug/Sep2014, Vol. 17 Issue 4, p10 

    The article presents information on several security threats to insurers.

  • Identity management for changing times. DIODATI, MARK // Information Security;May2009, Vol. 11 Issue 5, p29 

    The article focuses on various identity management technologies that have become part of the information technology (IT) infrastructure. It enumerates traditional systems that are being developed continually including directory services, provisioning systems, and Web access management (WAM)....

  • RISK ASSESSMENT FOR RFID DATA SECURITY. Pornieks, Valdis; Ginters, Egils // ICTE in Regional Development: 2008 Annual Proceedings;2008, p25 

    While planning to introduce a new technology like RFID, it is important to understand the impact that this technology might have and what problems it might bring with. Risk assessment is a methodology for finding and emphasizing problems that might occur in the future. And for RFID supported...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics