<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=640341516891423&amp;ev=PageView&amp;noscript=1">
Put Data to Work for You

Tap into your data for deeper insights and streamlined operations

Customize Your Customer Experience

 AURA NEXT lets you add new sources of evidence to streamline your underwriting process and create a seamless, more efficient, less invasive customer experience.

Make Better Decisions Faster

Technology is transforming the insurance industry for those organizations with the tools to leverage data. AURA NEXT helps you take advantage of the latest in advanced and predictive analytics to better understand your markets, your customers, and your performance.

Keep Your Data Secure

Your data is one of your most valuable assets. AURA NEXT treats it that way, ensuring accessibility while keeping your data secure.

Always Available

AWS hosting and a comprehensive disaster recovery plan help ensure your data is always accessible.

Private & Protected

RGA data protection policies prohibit the disclosure or misuse of information about your customers.

Secured Network

AURA NEXT's Security protocols protect against unauthorized access.

Compliant

RGA investments andprograms ensurecontinuing compliancewith the latestprotocols.

Availability

Choosing AWS as our hosting partner provides AURA NEXT customers with a highly scalable, highly secure environment and the business continuity assurance that is only available from the leader in hyperscale cloud services.

    • Mission-critical AURA NEXT applications use a highly available configuration within one AWS region to minimize the impact during an outage.

    • AWS regions contain multiple data centers called Availability Zones (AZs) in geographically dispersed areas, on different floodplains, weather patterns, power grids, HVACs, etc.

    • AURA NEXT services are all load-balanced across multiple AZs, and AURA NEXT is set up in an Active / Active High Availability model.

    • AURA NEXT also takes advantage of AWS auto-scaling capabilities to handle peak loads and utilizes AWS self-healing technologies to address issues before they impact performance.

Data Protection and Privacy

    • AURA NEXT data is classified as restricted, which requires the most stringent level of security and data protection controls.

    • AURA NEXT data stays in the Amazon Web Services (AWS) region where services are consumed so that data does not cross geographical boundaries.

    • AURA NEXT services run solely on ISO-compliant AWS platforms and services. All data, at rest and in transit, use the latest cryptographic protocols for encryption.

    • Anti-malware solutions protect all AURA NEXT workloads.

    • Least privilege principles are in place to limit the number of individuals who have access to your data.

    • Regular host and network level vulnerability scans are executed, and findings remediated as a priority.

Network Security

    • Comprehensive monitoring and logging systems allow for a holistic view of your data environment.

    • Comprehensive network security technologies, including industry leading Intrusion Detection/Intrusion Prevention (IDS/IPS), quickly detect and respond to potentially malicious behavior.

    • A Web Application Firewall (WAF) secures all external services.

    • Regular penetration testing helps ensure vulnerabilities are detected and addressed before they can be exploited.

    • Incident management and response policies and procedures are regularly reviewed and adjusted to the latest threats.

Networking Security

RGA compliance programs continue to focus on designing and executing appropriate controls in order to maintainSOC 2 certification for AURA NEXT customer environments. Our security focus includes:

    • Access management

    • Secrets management

    • Encryption

    • Certificate management

    • Vulnerability scans

    • Penetration testing 

    • Data-loss prevention

    • Intrusion detection and prevention

    • Incident response

    • Privileged-access management

    • User-access reviews

    • Networking security