SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
Managing the Legacy Landscape in the
Insurance World
Managing the Legacy Landscape in the
Insurance World
www.niit-tech.com
Ritu Gupta
NIIT Technologies White Paper
CONTENTS
Introduction 3
Legacy in Insurance 3
Persistence with Legacy systems 4
Legacy Landscape Management 5
Conclusion 6
About The Author 7
About Niit Technologies 7
Legacy in insurance industry is an established reality. By virtue of being
one of the early adopters of new technology, the insurance industry
has seen the era of monolithic mainframes. Although there have been
many technological advances, the insurance industry still remains one
of the most intensive and largest users of mainframes and mid frames.
While mainframes continue to provide significant benefits in terms of
reliability, availability and security, the aging legacy systems are
plagued with a number of problems:
• Limited technical support
• Inflexible business rules
• Over-burdened databases
• Hard to learn interfaces
• Difficulty in integration
• High maintenance costs
• Inability to respond to regulator driven reporting requirements
• Too many changes in the original system logic
• Inability to respond to competitors owing to higher product launch time
Due to each of these factors, unresponsive and rigid legacy
application s negatively impact operational efficiency, resource
utilization and time utilization of insurance companies, creating cost
pressures and increasing compliance risks.
However, the fact is that insurance companies will continue to depend
on these legacy applications. It is therefore imperative to identify ways
and means of reducing the cost of ownership of these applications,
and enhance their effectiveness and efficiency. To accomplish this, the
maintenance teams handling these applications need to have a strong
hold on the functional, technical, and process details of the
application. This ability, however, is challenged by the absence of
proper documentation, a dynamic workforce and skill shortage.
Introduction
3
Legacy systems are integrated with new knowledge management and
competency development systems to centralize the management,
maintenance, and use of information
a) Knowledge Management (KM): KM ensures that the complete
knowledge of the system embedded in the thought processes of
individuals and in the code, is extracted, documented and
institutionalized
b) Competency Development: It ensures that the resources
maintaining these applications have the requisite levels of technical,
functional and behavioural skills, not just to maintain them, but also to
identify and implement performance tuning and productivity
enhancement mechanisms.
This thought paper attempts to look beyond the known set of
hindrances faced by insurance companies owing to their dependence
on legacy applications. It also discusses two essential imperatives
knowledge institutionalization and competency development that can
help organizations efficiently manage their legacy applications.
Insurance companies use legacy systems to manage applications
that handle:
• Marketing channels
• Customer service/claims
• Actuarial calculations/reinsurance management
Market Channel Applications
These applications were mostly used for monitoring the productivity
of marketing/field personnel and estimation of the commission
payable to them. As commission calculations are complex and need
to be paid for decades in case of lifetime policies, it was one of the
earliest processes to get “automated” in the insurance world. Thus
legacy is common in channel management portfolio of insurance IT.
Legacy in Insurance
4
Legacy systems persist because of the expense, effort and potential
risk of business interruption associated with the movement of data
and key business processes to more advanced and contemporary
technologies. There are numerous reasons why insurance
companies persist with their existing systems. Some of them are:
Persistence with Legacy systems
1. Repositories of Processes, Rules and Data
Legacy systems have been continuously involved in processing
policy holder information, creating repositories of insured data,
policy information and the operational processes in vogue. The
information pertaining to various processes/ practices that guide the
business rules are “hard to find”. In such cases, the data used may
not be available anywhere other than in the legacy systems.
This has kept many insurance companies from re-engineering or
replacing legacy applications with newer applications built on latest
technologies (both hardware and software). The risk of losing
information in embedded business logic, business rules and
underlying data is a big deterrent for insurance companies.
2. Reliability of Applications
Many insurance companies still depend on legacy systems to
handle key processes. These legacy applications are reliable and
capable of delivering what they were originally supposed to deliver.
Hence, many insurance companies are reluctant to undertake any
replacements related to these business critical systems.
3. Poor Understanding of the Existing System
It is difficult to find complete specifications that mirror the functionality
of the entire legacy system. This may be due to unavailability of the
original system designers, and insufficient documentation.
In such cases, it is best to resort to the available documentation.
However, in most of the instances the available system
documentation is incomplete and does not include the details of all
the system changes. Replacing a legacy system is dangerous
since businesses face the risk of losing vital business knowledge
embedded in these systems.
4. Expensive to change
Changing from legacy systems to new systems involves huge
resource overruns due to the following reasons:
• Various parts of the systems may have been developed by
different teams, resulting in lack of a consistent coding style
• New programs may have been added or interfaced with other
parts in an adhoc manner
• The level of system documentatio n available may not be
adequate, increasing the amount of time required to
comprehend, assess and make changes to the system
• Designers of the system may not be available
These applications have interfaces with both external and internal
systems (like Point-of-Sale (POS) data entry, commission
management, accounting, agency management etc.). Hence,
altering these applications may impact all/any of these systems.
Typically, front-end processes like agent communication, illustrations,
marketing, and training support within the channel management
space have been ported into newer technologies; Back-end
business processes like agent set up, agency monitoring and
commissions’ management continue to reside on legacy systems.
Customer Service and Claims applications
These applications are the core components of an insurance
company’s operations. They are the storehouses of policy and
claims data, and the pivots on which the entire insurance
organization’s business strategy is developed. The need to maintain
this data over an elongated period of time, repetitive data driven
processes, and complex business processing rules that underpin
the two sets of applications warrant early adoption of automation. In
recent times, the largest part of the aggressive insurance legacy
landscape is accounted for by these two sets of applications. They
interface with almost all applications (except the actuarial
applications) in an insurance company. The competition warrants
insurers to offer better and faster services to their customers.
However, insurance companies still need to manage existing legacy
applications for as long as the policies issued using such legacy
systems are in force and not terminated or ported to other customer
service/claims systems.
Actuarial/Reinsurance Management Applications
These applications are one of the most important information
assets of an insurance company. Data within these applications
is used for designing various products, performing claims
analysis and meeting regulatory requirements. They form the
“heart” of the insurance company’s strategy. The valuations and
modelling requirements of the actuarial department almost
mandated early adoption of automation.
2. Knowledge Institutionalization
Since no system documentatio n is ever really complete, the
previous/ongoing projects, collaborative efforts and communication
carried out during the modification of the legacy system needs to be
maintained in an environment where they can be readily accessed.
Most importantly, the practice of knowledge management needs to
be institutionalized, as the efforts yield rewards over a period of time.
A knowledge institutionalizatio n mechanism should ensure that
comprehensive, indexed, and easily accessible knowledge of the
system resides in the repository and is periodically updated. It should
also have a training management system with an assessment
mechanism to ensure that new members coming on board has good
understanding of applications before embarking on any maintenance
activity. The insurance industry should concentrate on the underlying
idea that knowledge should not get lost due to resource movement
and new resources should be made knowledge-rich within predefined
and short timelines.
3. Competency Development
Knowledge of applications alone cannot ensure successful operational
excellence and cost reduction. To be able to achieve this objective,
the maintenance teams need to have a specific set of technical,
functional and behavioural competencies. This demands the creation
of a competency development framework that details various
competencies required by the role holder. The assessment criteria
measures and creates a development program that generates
competencies in staff members across levels.
Only a fully competent team having adequate knowledge of the
applications and the processes underlying them will be able to
continually improve system performance and productivity.
5
Legacy systems are inherent, inescapable and here to stay. It is,
therefore, important to enhance existing applications to correctly
reflect the changes in business processes and rules. There is also a
need to reduce maintenance costs of these applications through
effective performance management, storage management, and CPU
time management.
NIIT Technologies believes that other than the traditional application
value enhancement methods, insurance companies need to strongly
focus on knowledge acquisition, knowledge institutionalization and
competency development to extract value from investments made on
legacy systems.
1. Knowledge Acquisition
Knowledge exists in embedded business logic, business policies and
rules formed over a period of time from the data extracted from
business operations.
Knowledge can be acquired by following the Top-Down and
Bottom-Up approach. In the Top-Down approach, knowledge from
the original designers of the existing system is documented to provide
a complete picture of the legacy system. The Bottom-Up approach
helps in gathering knowledge when original designers have missed
out on certain areas or when the original designers are not around and
the system documentation is incomplete or has been lost. In the
Bottom-Up approach, tools may be used to extract and document
the business logic underlying the various applications.
These created documents, thus, form the basis for future legacy
support/ maintenance activities.
Legacy Landscape Management
6
In an environment where the market demands high speed delivery
of products and services, the insurance companies’ legacy
systems are slowing them down. Legacy systems are not easily
adaptable and hence require extra effort to integrate, upgrade, and
test them. The cost of maintaining legacy systems is more than the
cost of maintaining new technologies as the latter is far more
flexible and user friendly. However, legacy systems are rich
goldmines of knowledge and processes, which are not available
anywhere else. Hence, maintenance of legacy systems is an
alternative which most insurance companies use, despite the heavy
costs involved. Managements believe that the cost of maintaining a
legacy system is less than the cost involved in replacing them with
state-of-the-art technology due to the risks involved.
Conclusion Maintenance of legacy systems in the absence of proper
documentation and non-availability of resources with requisite
fundamental knowledge base is a nightmare.
A robust knowledge acquisition engine, coupled with strong
knowledge institutionalization can go a long way in helping the
support and maintenance teams to comprehend the business
functionality within the legacy applications, enabling them to create
a modernized application in a relatively smaller time frame.
Maintenance of legacy systems enhances Return on Investment
(ROI) made in the hardware and software systems.
By focusing on these aspects, the insurance legacy landscape
management team can become more effective and efficient;
thereby reducing the Business as Usual (BAU) costs while
enhancing system flexibility.
Ritu Gupta heads the Insurance Practice at NIIT Technologies. She has over 17 years of experience,
including 11 years in insurance domain and about seven years in management consultancy.
She has been instrumental in setting up of Vantage Center of Excellence at NIIT Technologies.
She has a post graduation degree from the Indian Institute of Management, Bangalore.
About the Author
D_18_120413
Write to us at marketing@niit-tech.com www.niit-tech.com
NIIT Technologies Limited
2nd
Floor, 47 Mark Lane
London - EC3R 7QQ, U.K.
Ph: +44 20 70020700
Fax: +44 20 70020701
Europe
NIIT Technologies Pte. Limited
31 Kaki Bukit Road 3
#05-13 Techlink
Singapore 417818
Ph: +65 68488300
Fax: +65 68488322
Singapore
India
NIIT Technologies Inc.,
1050 Crown Pointe Parkway
5th
Floor, Atlanta, GA 30338, USA
Ph: +1 770 551 9494
Toll Free: +1 888 454 NIIT
Fax: +1 770 551 9229
Americas
About NIIT Technologies
NIIT Technologies Ltd.
Corporate Heights (Tapasya)
Plot No. 5, EFGH, Sector 126
Noida-Greater Noida Expressway
Noida – 201301, U.P., India
Ph: + 91 120 7119100
Fax: + 91 120 7119150
NIIT Technologies is a leading IT solutions organization, servicing customers in North America,
Europe, Asia and Australia. It offers services in Application Development and Maintenance,
Enterprise Solutions including Managed Services and Business Process Outsourcing to
organisations in the Financial Services, Travel & Transportation, Manufacturing/Distribution, and
Government sectors. With employees over 7,000 professionals, NIIT Technologies follows global
standards of software development processes.
Over the years the Company has forged extremely rewarding relationships with global majors, a
testimony to mutual commitment and its ability to retain marquee clients, drawing repeat
business from them. NIIT Technologies has been able to scale its interactions with marquee
clients in the BFSI sector, the Travel Transport & Logistics and Manufacturing & Distribution, into
extremely meaningful, multi-year "collaborations.
NIIT Technologies follows global standards of development, which include ISO 9001:2000
Certification, assessment at Level 5 for SEI-CMMi version 1.2 and ISO 27001 information
security management certification. Its data center operations are assessed at the international
ISO 20000 IT management standards.
A leading IT solutions organization | 21 locations and 16 countries | 8000 professionals | Level 5 of SEI-CMMi, ver1.2
ISO 27001 certified | Level 5 of People CMM Framework

Más contenido relacionado

Más de NIIT Technologies

NIIT Technologies Q4 FY’17
NIIT Technologies Q4 FY’17NIIT Technologies Q4 FY’17
NIIT Technologies Q4 FY’17NIIT Technologies
 
The 3 e’s of customer experience
The 3 e’s of customer experienceThe 3 e’s of customer experience
The 3 e’s of customer experienceNIIT Technologies
 
10 Lessons Learned from NIIT Technologies
10 Lessons Learned from NIIT Technologies10 Lessons Learned from NIIT Technologies
10 Lessons Learned from NIIT TechnologiesNIIT Technologies
 
NIIT Technologies delivers robust 145% growth in PAT for FY’16
NIIT Technologies delivers robust 145% growth in PAT for FY’16NIIT Technologies delivers robust 145% growth in PAT for FY’16
NIIT Technologies delivers robust 145% growth in PAT for FY’16NIIT Technologies
 
4 factors to consider before finalizing a Cargo Management System
4 factors to consider before finalizing a Cargo Management System4 factors to consider before finalizing a Cargo Management System
4 factors to consider before finalizing a Cargo Management SystemNIIT Technologies
 
Unlock value potential from Cargo Management Operations
Unlock value potential from Cargo Management OperationsUnlock value potential from Cargo Management Operations
Unlock value potential from Cargo Management OperationsNIIT Technologies
 
Results for Quarter 2 Financial Year 2015-16
Results for Quarter 2 Financial Year 2015-16Results for Quarter 2 Financial Year 2015-16
Results for Quarter 2 Financial Year 2015-16NIIT Technologies
 
New Distribution Capability benefits and challenges
New Distribution Capability benefits and challengesNew Distribution Capability benefits and challenges
New Distribution Capability benefits and challengesNIIT Technologies
 
Build consistent brand experience at the last mile
Build consistent brand experience at the last mileBuild consistent brand experience at the last mile
Build consistent brand experience at the last mileNIIT Technologies
 

Más de NIIT Technologies (20)

Q2 FY'20
Q2 FY'20Q2 FY'20
Q2 FY'20
 
Q1 FY'20 Result
Q1 FY'20 ResultQ1 FY'20 Result
Q1 FY'20 Result
 
Q4 FY'19 Result
Q4 FY'19 ResultQ4 FY'19 Result
Q4 FY'19 Result
 
Q2 FY'19 Result
Q2 FY'19 ResultQ2 FY'19 Result
Q2 FY'19 Result
 
Q1 FY’19 Result
Q1 FY’19 ResultQ1 FY’19 Result
Q1 FY’19 Result
 
Q3 Results
Q3 ResultsQ3 Results
Q3 Results
 
NIIT Tech Q2 Results
NIIT Tech Q2 ResultsNIIT Tech Q2 Results
NIIT Tech Q2 Results
 
Q1 FY'18
Q1 FY'18 Q1 FY'18
Q1 FY'18
 
NIIT Technologies Q4 FY’17
NIIT Technologies Q4 FY’17NIIT Technologies Q4 FY’17
NIIT Technologies Q4 FY’17
 
The 3 e’s of customer experience
The 3 e’s of customer experienceThe 3 e’s of customer experience
The 3 e’s of customer experience
 
Q3 FY17 results
Q3 FY17 resultsQ3 FY17 results
Q3 FY17 results
 
10 Lessons Learned from NIIT Technologies
10 Lessons Learned from NIIT Technologies10 Lessons Learned from NIIT Technologies
10 Lessons Learned from NIIT Technologies
 
NIIT Tech - Q1 FY17
NIIT Tech - Q1 FY17NIIT Tech - Q1 FY17
NIIT Tech - Q1 FY17
 
NIIT Technologies delivers robust 145% growth in PAT for FY’16
NIIT Technologies delivers robust 145% growth in PAT for FY’16NIIT Technologies delivers robust 145% growth in PAT for FY’16
NIIT Technologies delivers robust 145% growth in PAT for FY’16
 
Dynamic UX Ecosystem
Dynamic UX EcosystemDynamic UX Ecosystem
Dynamic UX Ecosystem
 
4 factors to consider before finalizing a Cargo Management System
4 factors to consider before finalizing a Cargo Management System4 factors to consider before finalizing a Cargo Management System
4 factors to consider before finalizing a Cargo Management System
 
Unlock value potential from Cargo Management Operations
Unlock value potential from Cargo Management OperationsUnlock value potential from Cargo Management Operations
Unlock value potential from Cargo Management Operations
 
Results for Quarter 2 Financial Year 2015-16
Results for Quarter 2 Financial Year 2015-16Results for Quarter 2 Financial Year 2015-16
Results for Quarter 2 Financial Year 2015-16
 
New Distribution Capability benefits and challenges
New Distribution Capability benefits and challengesNew Distribution Capability benefits and challenges
New Distribution Capability benefits and challenges
 
Build consistent brand experience at the last mile
Build consistent brand experience at the last mileBuild consistent brand experience at the last mile
Build consistent brand experience at the last mile
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Manging Legacy Landscape in Insurance world

  • 1. Managing the Legacy Landscape in the Insurance World Managing the Legacy Landscape in the Insurance World www.niit-tech.com Ritu Gupta NIIT Technologies White Paper
  • 2. CONTENTS Introduction 3 Legacy in Insurance 3 Persistence with Legacy systems 4 Legacy Landscape Management 5 Conclusion 6 About The Author 7 About Niit Technologies 7
  • 3. Legacy in insurance industry is an established reality. By virtue of being one of the early adopters of new technology, the insurance industry has seen the era of monolithic mainframes. Although there have been many technological advances, the insurance industry still remains one of the most intensive and largest users of mainframes and mid frames. While mainframes continue to provide significant benefits in terms of reliability, availability and security, the aging legacy systems are plagued with a number of problems: • Limited technical support • Inflexible business rules • Over-burdened databases • Hard to learn interfaces • Difficulty in integration • High maintenance costs • Inability to respond to regulator driven reporting requirements • Too many changes in the original system logic • Inability to respond to competitors owing to higher product launch time Due to each of these factors, unresponsive and rigid legacy application s negatively impact operational efficiency, resource utilization and time utilization of insurance companies, creating cost pressures and increasing compliance risks. However, the fact is that insurance companies will continue to depend on these legacy applications. It is therefore imperative to identify ways and means of reducing the cost of ownership of these applications, and enhance their effectiveness and efficiency. To accomplish this, the maintenance teams handling these applications need to have a strong hold on the functional, technical, and process details of the application. This ability, however, is challenged by the absence of proper documentation, a dynamic workforce and skill shortage. Introduction 3 Legacy systems are integrated with new knowledge management and competency development systems to centralize the management, maintenance, and use of information a) Knowledge Management (KM): KM ensures that the complete knowledge of the system embedded in the thought processes of individuals and in the code, is extracted, documented and institutionalized b) Competency Development: It ensures that the resources maintaining these applications have the requisite levels of technical, functional and behavioural skills, not just to maintain them, but also to identify and implement performance tuning and productivity enhancement mechanisms. This thought paper attempts to look beyond the known set of hindrances faced by insurance companies owing to their dependence on legacy applications. It also discusses two essential imperatives knowledge institutionalization and competency development that can help organizations efficiently manage their legacy applications. Insurance companies use legacy systems to manage applications that handle: • Marketing channels • Customer service/claims • Actuarial calculations/reinsurance management Market Channel Applications These applications were mostly used for monitoring the productivity of marketing/field personnel and estimation of the commission payable to them. As commission calculations are complex and need to be paid for decades in case of lifetime policies, it was one of the earliest processes to get “automated” in the insurance world. Thus legacy is common in channel management portfolio of insurance IT. Legacy in Insurance
  • 4. 4 Legacy systems persist because of the expense, effort and potential risk of business interruption associated with the movement of data and key business processes to more advanced and contemporary technologies. There are numerous reasons why insurance companies persist with their existing systems. Some of them are: Persistence with Legacy systems 1. Repositories of Processes, Rules and Data Legacy systems have been continuously involved in processing policy holder information, creating repositories of insured data, policy information and the operational processes in vogue. The information pertaining to various processes/ practices that guide the business rules are “hard to find”. In such cases, the data used may not be available anywhere other than in the legacy systems. This has kept many insurance companies from re-engineering or replacing legacy applications with newer applications built on latest technologies (both hardware and software). The risk of losing information in embedded business logic, business rules and underlying data is a big deterrent for insurance companies. 2. Reliability of Applications Many insurance companies still depend on legacy systems to handle key processes. These legacy applications are reliable and capable of delivering what they were originally supposed to deliver. Hence, many insurance companies are reluctant to undertake any replacements related to these business critical systems. 3. Poor Understanding of the Existing System It is difficult to find complete specifications that mirror the functionality of the entire legacy system. This may be due to unavailability of the original system designers, and insufficient documentation. In such cases, it is best to resort to the available documentation. However, in most of the instances the available system documentation is incomplete and does not include the details of all the system changes. Replacing a legacy system is dangerous since businesses face the risk of losing vital business knowledge embedded in these systems. 4. Expensive to change Changing from legacy systems to new systems involves huge resource overruns due to the following reasons: • Various parts of the systems may have been developed by different teams, resulting in lack of a consistent coding style • New programs may have been added or interfaced with other parts in an adhoc manner • The level of system documentatio n available may not be adequate, increasing the amount of time required to comprehend, assess and make changes to the system • Designers of the system may not be available These applications have interfaces with both external and internal systems (like Point-of-Sale (POS) data entry, commission management, accounting, agency management etc.). Hence, altering these applications may impact all/any of these systems. Typically, front-end processes like agent communication, illustrations, marketing, and training support within the channel management space have been ported into newer technologies; Back-end business processes like agent set up, agency monitoring and commissions’ management continue to reside on legacy systems. Customer Service and Claims applications These applications are the core components of an insurance company’s operations. They are the storehouses of policy and claims data, and the pivots on which the entire insurance organization’s business strategy is developed. The need to maintain this data over an elongated period of time, repetitive data driven processes, and complex business processing rules that underpin the two sets of applications warrant early adoption of automation. In recent times, the largest part of the aggressive insurance legacy landscape is accounted for by these two sets of applications. They interface with almost all applications (except the actuarial applications) in an insurance company. The competition warrants insurers to offer better and faster services to their customers. However, insurance companies still need to manage existing legacy applications for as long as the policies issued using such legacy systems are in force and not terminated or ported to other customer service/claims systems. Actuarial/Reinsurance Management Applications These applications are one of the most important information assets of an insurance company. Data within these applications is used for designing various products, performing claims analysis and meeting regulatory requirements. They form the “heart” of the insurance company’s strategy. The valuations and modelling requirements of the actuarial department almost mandated early adoption of automation.
  • 5. 2. Knowledge Institutionalization Since no system documentatio n is ever really complete, the previous/ongoing projects, collaborative efforts and communication carried out during the modification of the legacy system needs to be maintained in an environment where they can be readily accessed. Most importantly, the practice of knowledge management needs to be institutionalized, as the efforts yield rewards over a period of time. A knowledge institutionalizatio n mechanism should ensure that comprehensive, indexed, and easily accessible knowledge of the system resides in the repository and is periodically updated. It should also have a training management system with an assessment mechanism to ensure that new members coming on board has good understanding of applications before embarking on any maintenance activity. The insurance industry should concentrate on the underlying idea that knowledge should not get lost due to resource movement and new resources should be made knowledge-rich within predefined and short timelines. 3. Competency Development Knowledge of applications alone cannot ensure successful operational excellence and cost reduction. To be able to achieve this objective, the maintenance teams need to have a specific set of technical, functional and behavioural competencies. This demands the creation of a competency development framework that details various competencies required by the role holder. The assessment criteria measures and creates a development program that generates competencies in staff members across levels. Only a fully competent team having adequate knowledge of the applications and the processes underlying them will be able to continually improve system performance and productivity. 5 Legacy systems are inherent, inescapable and here to stay. It is, therefore, important to enhance existing applications to correctly reflect the changes in business processes and rules. There is also a need to reduce maintenance costs of these applications through effective performance management, storage management, and CPU time management. NIIT Technologies believes that other than the traditional application value enhancement methods, insurance companies need to strongly focus on knowledge acquisition, knowledge institutionalization and competency development to extract value from investments made on legacy systems. 1. Knowledge Acquisition Knowledge exists in embedded business logic, business policies and rules formed over a period of time from the data extracted from business operations. Knowledge can be acquired by following the Top-Down and Bottom-Up approach. In the Top-Down approach, knowledge from the original designers of the existing system is documented to provide a complete picture of the legacy system. The Bottom-Up approach helps in gathering knowledge when original designers have missed out on certain areas or when the original designers are not around and the system documentation is incomplete or has been lost. In the Bottom-Up approach, tools may be used to extract and document the business logic underlying the various applications. These created documents, thus, form the basis for future legacy support/ maintenance activities. Legacy Landscape Management
  • 6. 6 In an environment where the market demands high speed delivery of products and services, the insurance companies’ legacy systems are slowing them down. Legacy systems are not easily adaptable and hence require extra effort to integrate, upgrade, and test them. The cost of maintaining legacy systems is more than the cost of maintaining new technologies as the latter is far more flexible and user friendly. However, legacy systems are rich goldmines of knowledge and processes, which are not available anywhere else. Hence, maintenance of legacy systems is an alternative which most insurance companies use, despite the heavy costs involved. Managements believe that the cost of maintaining a legacy system is less than the cost involved in replacing them with state-of-the-art technology due to the risks involved. Conclusion Maintenance of legacy systems in the absence of proper documentation and non-availability of resources with requisite fundamental knowledge base is a nightmare. A robust knowledge acquisition engine, coupled with strong knowledge institutionalization can go a long way in helping the support and maintenance teams to comprehend the business functionality within the legacy applications, enabling them to create a modernized application in a relatively smaller time frame. Maintenance of legacy systems enhances Return on Investment (ROI) made in the hardware and software systems. By focusing on these aspects, the insurance legacy landscape management team can become more effective and efficient; thereby reducing the Business as Usual (BAU) costs while enhancing system flexibility.
  • 7. Ritu Gupta heads the Insurance Practice at NIIT Technologies. She has over 17 years of experience, including 11 years in insurance domain and about seven years in management consultancy. She has been instrumental in setting up of Vantage Center of Excellence at NIIT Technologies. She has a post graduation degree from the Indian Institute of Management, Bangalore. About the Author D_18_120413 Write to us at marketing@niit-tech.com www.niit-tech.com NIIT Technologies Limited 2nd Floor, 47 Mark Lane London - EC3R 7QQ, U.K. Ph: +44 20 70020700 Fax: +44 20 70020701 Europe NIIT Technologies Pte. Limited 31 Kaki Bukit Road 3 #05-13 Techlink Singapore 417818 Ph: +65 68488300 Fax: +65 68488322 Singapore India NIIT Technologies Inc., 1050 Crown Pointe Parkway 5th Floor, Atlanta, GA 30338, USA Ph: +1 770 551 9494 Toll Free: +1 888 454 NIIT Fax: +1 770 551 9229 Americas About NIIT Technologies NIIT Technologies Ltd. Corporate Heights (Tapasya) Plot No. 5, EFGH, Sector 126 Noida-Greater Noida Expressway Noida – 201301, U.P., India Ph: + 91 120 7119100 Fax: + 91 120 7119150 NIIT Technologies is a leading IT solutions organization, servicing customers in North America, Europe, Asia and Australia. It offers services in Application Development and Maintenance, Enterprise Solutions including Managed Services and Business Process Outsourcing to organisations in the Financial Services, Travel & Transportation, Manufacturing/Distribution, and Government sectors. With employees over 7,000 professionals, NIIT Technologies follows global standards of software development processes. Over the years the Company has forged extremely rewarding relationships with global majors, a testimony to mutual commitment and its ability to retain marquee clients, drawing repeat business from them. NIIT Technologies has been able to scale its interactions with marquee clients in the BFSI sector, the Travel Transport & Logistics and Manufacturing & Distribution, into extremely meaningful, multi-year "collaborations. NIIT Technologies follows global standards of development, which include ISO 9001:2000 Certification, assessment at Level 5 for SEI-CMMi version 1.2 and ISO 27001 information security management certification. Its data center operations are assessed at the international ISO 20000 IT management standards. A leading IT solutions organization | 21 locations and 16 countries | 8000 professionals | Level 5 of SEI-CMMi, ver1.2 ISO 27001 certified | Level 5 of People CMM Framework