Userday 2025 Presentations

Userday 2025 — Review

Here you will find all the pre­sen­ta­tions by our speak­ers that we have organ­ised exclu­sive­ly for
you have put togeth­er as a participant:

Greet­ing

Gui­do Markow­itsch, Senior Con­sul­tant, VR

Pre­sen­ta­tion

Where is the WMC heading?

Peter Nessen­sohn, Mem­ber of the Board of Directors

Pre­sen­ta­tion

The future of BrokerStar

Thomas Bür­ki, Man­ag­ing Director

Pre­sen­ta­tion

BrokerStar.AI Arti­fi­cial intelligence

Julius Jan­da, Chair­man of the Board of Directors

Pre­sen­ta­tion

Pro­tec­tion against cyberattacks

Roger Burch, Secu­ri­ty Spe­cial­ist, Selu­tion AG

Pre­sen­ta­tion

Con­tent strategy

Bin­ci Heeb, Edi­tor thebrokernews

Pre­sen­ta­tion

News from SIBA

Markus Lehmann, Pres­i­dent SIBA

Pre­sen­ta­tion

Inte­gra­tion of direct insurers

Hugo Pfis­ter, COO Auto­mate Insur­ance AG

Pre­sen­ta­tion

Eco­Hub update and new features

Mar­cel Schradt, CEO of Eco­Hub AG

Pre­sen­ta­tion

Risk man­age­ment with riskAware

Mar­co La Bel­la, La Bel­la Consulting

Pre­sen­ta­tion

The WMC team would like to thank all guests, speak­ers and friends for their participation.

And here are a few for you…

Reporting in BrokerStar

The term report­ing cov­ers all types of analy­ses, whether as a list or a graph­ic and regard­less of the for­mat.

In the fol­low­ing arti­cle, we explain how the report­ing sys­tem in Bro­ker­Star is struc­tured. We look at tech­ni­cal and licence-relat­ed aspects and show you the var­i­ous options.

1. the Bro­ker­Star report­ing sys­tem
2. stan­dard, indi­vid­ual and ad hoc reports
3. file for­mats
4. ser­vices

 

1. the Bro­ker­Star report­ing system

Bro­ker­Star uses a so-called Busi­ness Intel­li­gence (BI) tool, TIBCO Jasper­soft. This wide­ly used tech­nol­o­gy allows all infor­ma­tion from the data­base to be select­ed and out­put. Data can be rearranged and put into rela­tion as required. The data can also be com­bined with infor­ma­tion from oth­er exter­nal data sources.
 
2. stan­dard, indi­vid­ual and ad hoc reports
Bro­ker­Star dis­tin­guish­es between dif­fer­ent cat­e­gories from a licens­ing perspective:
Stan­dard reports are sta­t­ic analy­ses, i.e. dif­fer­ent lists that are deliv­ered to all cus­tomers as stan­dard in Bro­ker­Star as part of the scope of deliv­ery. These eval­u­a­tions can be graph­i­cal­ly cus­tomised for the bro­ker from 2022.
Indi­vid­ual reports are cus­tomised analy­ses that are pre­pared specif­i­cal­ly for the bro­ker at the customer’s request. They are not sup­plied as stan­dard to oth­er bro­kers and are sub­ject to a charge. This also includes dynam­ic reports.
Ad Hoc Reports are analy­ses that are usu­al­ly cre­at­ed by the bro­ker itself. This requires a cer­tain amount of exper­tise com­pa­ra­ble to the cre­ation of more com­plex Excel tables. Of course, ad hoc reports can also be cre­at­ed by WMC. Anoth­er ser­vice is the trans­fer of knowl­edge, e.g. in the form of train­ing. As TIBCO Jasper­soft is a stan­dard prod­uct, there are also var­i­ous train­ing options avail­able on the Inter­net or from third-par­ty providers.
 
3. file formats

Reports from Bro­ker­Star can be out­put in all avail­able file for­mats. The most impor­tant of these include PDF/A (legal­ly archiv­able, unal­ter­able PDF), Excel, Word, Pow­er­Point or HTML. The stan­dard reports are usu­al­ly out­put as PDFs. How­ev­er, there are also gener­ic Excel exports for fur­ther pro­cess­ing. For out­put as Word, there is the option of auto­mat­i­cal­ly con­vert­ing the PDF into a Word file.

Tech­ni­cal­ly speak­ing, TIBCO Jasper­soft offers five dif­fer­ent levels:
- Lev­el 1: Sta­t­ic reports using an embed­ded report library
- Lev­el 2: Guid­ed and dynam­ic reports with sim­ple inter­ac­tiv­i­ty, plan­ning, secu­ri­ty and auto­mat­ic distribution.
- Lev­el 3: High­ly inter­ac­tive reports and dash­boards using the report server
- Lev­el 4: Ad-hoc reports for self-ser­vice via a BI server
- Lev­el 5: Self-ser­vice data explo­ration against a data mart using a BI server
 

4. ser­vices
Includ­ed in the sub­scrip­tion:
- All stan­dard reports

Addi­tion­al ser­vices sub­ject to a charge
- Cus­tomised adap­ta­tions to stan­dard reports -> Indi­vid­ual reports
- Indi­vid­ual reports. Dash­boards, cock­pits, Ad Hoc Reports
- Train­ing

Licences
- All reports from lev­el 2 require the licens­ing of the MIS module

Jaspersoft 

Analysis with BI 

Five Levels 

Data security, data protection (nDSG)

Data secu­ri­ty and data pro­tec­tion are play­ing an increas­ing­ly impor­tant role. A cyber attack or data breach usu­al­ly has seri­ous consequences.

It is there­fore more impor­tant than ever to pro­tect, back up and store data secure­ly. On 1 Sep­tem­ber 2023 the new Swiss Data Pro­tec­tion Act (nDSG) came into force, which also result­ed in adjust­ments to data stor­age. Bro­ker­Star and Bro­ker­Web are pre­pared for this.

Data secu­ri­ty deals with the gen­er­al pro­tec­tion of data and doc­u­ments. Thus, secu­ri­ty in any form falls under the term data secu­ri­ty, as does per­son­al data. The Data pro­tec­tion on the oth­er hand, relates exclu­sive­ly to the stor­age and use of per­son­al data, at least as far as the legal pro­vi­sions are concerned.

Data secu­ri­ty and data pro­tec­tion there­fore pur­sue the goal of secur­ing data of all kinds against threats, manip­u­la­tion, unau­tho­rised access or knowl­edge. Ana­logue and dig­i­tal mea­sures can be tak­en to achieve this. First of all, there are tech­ni­cal and organ­i­sa­tion­al mea­sures, which are also used in the con­text of data protection.

In the dig­i­tal sec­tor, the imple­men­ta­tion of IT secu­ri­ty solu­tions in the form of virus scan­ners, fire­walls etc. con­tributes to the secu­ri­ty of data. Phys­i­cal mea­sures, on the oth­er hand, include access con­trols, fire­proof fil­ing cab­i­nets or safes for sen­si­tive and con­fi­den­tial doc­u­ments. Data back­ups, such as the cre­ation of back­up copies on a sep­a­rate stor­age medi­um, are also essen­tial. A sol­id net­work infra­struc­ture and reg­u­lar updates are the basic pre­req­ui­sites for achiev­ing data secu­ri­ty goals. Data pro­tec­tion, on the oth­er hand, is essen­tial­ly about how per­son­al data is used and stored.

It is there­fore impor­tant to take organ­i­sa­tion­al and per­son­nel pol­i­cy pre­cau­tions to ensure a high stan­dard of secu­ri­ty with­in the com­pa­ny. Employ­ee train­ing and fur­ther edu­ca­tion, as well as the deploy­ment of spe­cial­ists such as IT secu­ri­ty offi­cers and data pro­tec­tion offi­cers, con­tribute to data secu­ri­ty and are some­times manda­to­ry for com­pli­ance rea­sons. IT secu­ri­ty and data pro­tec­tion offi­cers are ded­i­cat­ed to analysing poten­tial secu­ri­ty gaps in your com­pa­ny and cre­at­ing appro­pri­ate mea­sures to achieve the data secu­ri­ty objective.

The terms are there­fore not only close­ly linked, but also influ­ence each oth­er. For exam­ple, com­plete data secu­ri­ty can­not be achieved with­out data pro­tec­tion mea­sures, as oth­er­wise per­son­al data may not be ade­quate­ly pro­tect­ed. On the oth­er hand, com­pre­hen­sive data secu­ri­ty mea­sures are a pre­req­ui­site for effec­tive data pro­tec­tion in accor­dance with legal require­ments and best practice.

The fol­low­ing aspects of the new Data Pro­tec­tion Act are important:

  • Keep track of exact­ly what data is being processed and for what pur­pose. You can pro­vide infor­ma­tion about this at any time and avoid unpleas­ant surprises.
  • Crit­i­cal­ly review the col­lec­tion of per­son­al data. What is effec­tive­ly nec­es­sary for you?
  • Reduce the query cri­te­ria for your cus­tomers to a minimum.
  • Restrict inter­nal data access in the com­pa­ny to as few peo­ple as possible.
  • Check your pri­va­cy pol­i­cy in detail and amend it if necessary.
  • Check and improve the tech­ni­cal default set­tings and user-friendliness.
  • Train your employ­ees to sen­si­tise them to the impor­tance of the topic.

Details on the new data pro­tec­tion law can be found here  and on the offi­cial site of the fed­er­al government

Sources, Profi Engi­neer­ing, 2021, SME dig­i­tal­i­sa­tion 2022, Data pro­tec­tion part­ner 2022, www.admin.ch

Tem­plates and doc­u­ments   (Sources: SIBA, IG B2B, WMC)

Data processing 

Portal utilisation 

Secure Mail 

IG B2B nDSG 

3CX Firstclass telephony at an SME price

The com­plete tele­pho­ny solu­tion
Do you need a new tele­phone sys­tem? WMC offers the entire solu­tion from a sin­gle source. In addi­tion to con­ve­nience and great reli­a­bil­i­ty, you ben­e­fit from sig­nif­i­cant­ly reduced tele­phone costs. Coop­er­a­tion with sip­call and WMC have been work­ing togeth­er for around 20 years. As an expe­ri­enced part­ner of 3CX, WMC is the point of con­tact for all top­ics relat­ing to the vir­tu­al tele­phone sys­tem (PBX).

The three com­po­nents of the solution

1. voice over IP (VoIP)

Since 2019, tele­pho­ny in Switzer­land has always run via the inter­net. New meth­ods recog­nise whether calls or data are involved. In most cas­es, all com­mu­ni­ca­tion is trans­mit­ted via the same connection.

2. com­put­er inte­grat­ed telephony

Just as com­put­er data can con­tain a link to a web­site or an e‑mail address, direct links to a tele­phone num­ber are also avail­able. Click­ing on them cre­ates a con­nec­tion direct­ly to the VoIP-based tele­phone net­work or via a tele­phone sys­tem. This can be locat­ed any­where on the Internet.

3. the CTI soft­ware solution 

WMC pro­grammes such as Bro­ker­Star or iOf­fice have inte­grat­ed tele­pho­ny. The only link required is a com­pat­i­ble tele­phone sys­tem. Con­nec­tion to a 3CX is avail­able as stan­dard. This con­nec­tion option is also rec­om­mend­ed for Teams tele­pho­ny. Inter­faces to oth­er sys­tems can be cre­at­ed if required.

      Ser­vice included.

  • Record­ing the customer’s requirements.
  • Prepa­ra­tion of an over­all proposal
  • Can­cel­la­tion of pre­vi­ous provider
  • Con­clu­sion of sub­scrip­tion provider
  • Port­ing of tele­phone numbers
  • Licens­ing 3CX
  • Set up hosting
  • Deliv­ery of tele­phones and headsets *
  • Changeover on the key date with­out interruption
  • Pro­fes­sion­al tele­phone announcements *
  • Favourable Inter­net con­nec­tion *                   *option­al on request

Making calls with BrokerStar / iOffice

The com­plete solu­tion
In addi­tion to the WMC soft­ware, as a cus­tomer you need a tele­phone con­nec­tion and a 3CX tele­phone sys­tem. This can be pro­vid­ed by you or by a tele­phone provider. WMC offers the entire solu­tion from a sin­gle source. In addi­tion to the con­ve­nience and great reli­a­bil­i­ty, you ben­e­fit from sig­nif­i­cant­ly reduced tele­phone costs. The co-oper­a­tion with sip­call and WMC have been in exis­tence for around 20 years.

Call­ing with Bro­ker­Star and iOf­fice is now avail­able.
Not only does dialling a tele­phone num­ber in the pro­gramme auto­mat­i­cal­ly cre­ate the con­nec­tion. For incom­ing calls, the sys­tem also recog­nis­es a saved num­ber and auto­mat­i­cal­ly opens the cor­re­spond­ing cus­tomer win­dow. The solu­tion cur­rent­ly works exclu­sive­ly with the pop­u­lar 3CX tele­phone sys­tem. The low costs make this use­ful option a highlight.

 

The three com­po­nents of the solution

1. voice over IP (VoIP)

Since 2019, tele­pho­ny in Switzer­land has been made exclu­sive­ly via the inter­net. New meth­ods recog­nise whether calls or data are involved. In most cas­es, all com­mu­ni­ca­tion is trans­mit­ted via the same connection.

2. com­put­er inte­grat­ed telephony

Just as com­put­er data can con­tain a link to a web­site or an e‑mail address, direct links to a tele­phone num­ber are also avail­able. Click­ing on them cre­ates a con­nec­tion direct­ly to the VoIP-based tele­phone net­work or via a tele­phone sys­tem. This can be locat­ed any­where on the Internet.

3. the CTI soft­ware solution 

WMC pro­grammes such as Bro­ker­Star or iOf­fice have inte­grat­ed tele­pho­ny. The only link required is a com­pat­i­ble tele­phone sys­tem. Con­nec­tion to a 3CX is avail­able as stan­dard. This con­nec­tion option is also rec­om­mend­ed for Teams tele­pho­ny. Inter­faces to oth­er sys­tems can be cre­at­ed if required.

What does digitalisation actually mean

Dig­i­tal­i­sa­tion is the gener­ic term for the dig­i­tal trans­for­ma­tion of soci­ety and the econ­o­my. It describes the tran­si­tion from the 20th cen­tu­ry, which was char­ac­terised by ana­logue tech­nolo­gies, to the age of knowl­edge and cre­ativ­i­ty, which is shaped by dig­i­tal tech­nolo­gies and dig­i­tal innovations.

Dig­i­tal­i­sa­tion is the most impor­tant social and eco­nom­ic devel­op­ment of our time. But what do terms like: Dig­i­tal change, dig­i­tal trans­for­ma­tion, dig­i­tal disruption?


What dig­i­tal skills will we need in the future? What are dig­i­tal busi­ness models?

Com­pa­nies and organ­i­sa­tions are mak­ing progress with dig­i­tal trans­for­ma­tion at dif­fer­ent speeds. While some lim­it them­selves to dig­i­tal­is­ing exist­ing busi­ness process­es, oth­ers proac­tive­ly devel­op dig­i­tal con­cepts and busi­ness mod­els. The deci­sive fac­tor for suc­cess in dig­i­tal­i­sa­tion is the so-called „dig­i­tal matu­ri­ty lev­el“. This is a sci­en­tif­i­cal­ly based 360-degree instru­ment that is used to analyse all the fac­tors that are impor­tant for change.

Digi­ti­sa­tion explained simply

Over the past 20 years or so, var­i­ous dig­i­tal tech­nolo­gies (mobile inter­net, arti­fi­cial intel­li­gence, inter­net of things, etc.) have been dras­ti­cal­ly devel­oped and have made the leap from expert appli­ca­tions to every­day life. Just as the inno­va­tion of the steam engine has changed soci­ety, so too has the dig­i­tal transformation.

Dig­i­tal­i­sa­tion is dri­ven by tech­nol­o­gy. Dig­i­tal inno­va­tions are cre­at­ed on the basis of the dig­i­tal tech­nolo­gies devel­oped: New use cas­es dri­ven by exist­ing com­pa­nies and start-ups with ven­ture cap­i­tal. This leads to dif­fer­ent speeds. While pub­lic admin­is­tra­tion, for exam­ple, often only accepts paper doc­u­ments and works with files, mar­kets are chang­ing much faster. All sec­tors are now affect­ed by dig­i­tal­i­sa­tion. Dig­i­tal­i­sa­tion is also influ­enc­ing the future of the finance and insur­ance indus­try. New forms are only pos­si­ble thanks to dig­i­tal­i­sa­tion tech­nolo­gies, which will con­tin­ue to spread in the future.

Dig­i­tal­i­sa­tion is chang­ing the future of tra­di­tion­al pro­fes­sions. In future, doc­tors will be increas­ing­ly sup­port­ed by e‑health appli­ca­tions, espe­cial­ly in diag­nos­tics. Legal ser­vices (cur­rent­ly pri­mar­i­ly pro­vid­ed by lawyers) will be sup­ple­ment­ed or replaced by dig­i­tal ser­vices from the legal tech sec­tor. And the term Insuretech has already been established.

In the future, dig­i­tal­i­sa­tion will make new demands on schools, edu­ca­tion and train­ing in all areas. It is the task of busi­ness, asso­ci­a­tions and pol­i­tics to pre­pare soci­ety for the com­ing changes.

Dig­i­tal­i­sa­tion and companies

Dig­i­tal­i­sa­tion has an impact on com­pa­nies of all sizes. On the one hand, com­pa­nies are using dig­i­tal tech­nolo­gies to dig­i­talise their busi­ness process­es, i.e. for process opti­mi­sa­tion and process inno­va­tion. This is also being dri­ven by dig­i­tal trans­for­ma­tion and in some cas­es realised by start-ups. The chal­lenge for com­pa­nies in dig­i­tal­i­sa­tion is to iden­ti­fy new cus­tomer needs that arise due to the grow­ing spread of dig­i­tal ser­vices and apps.

The so-called „dig­i­tal natives“ have also cre­at­ed new tar­get groups. Com­pa­nies often need dif­fer­ent mar­ket­ing and sales strate­gies to increase their cus­tomer focus on these tar­get groups. Action must be adapt­ed in order to be suc­cess­ful in the dig­i­tal trans­for­ma­tion Com­pa­nies must address the ques­tion: How do we want to reach cus­tomers tomor­row? What role do new trends play? How do we deal with the increas­ing­ly indi­vid­u­alised needs of our customers?

Devel­op­ment of dig­i­tal work­flows and process­es: Say­ing good­bye to paper files by intro­duc­ing process­es and work­flows in the com­pa­ny, some of which need to be rad­i­cal­ly rethought as a result of dig­i­tal­i­sa­tion, such as the han­dling of data that is gen­er­at­ed with­in the com­pa­ny, in con­nec­tion with a company’s activ­i­ties and by cus­tomers. Data can be used to devel­op new ser­vices and busi­ness mod­els. Dig­i­tal­i­sa­tion presents us all with the chal­lenge of per­ma­nent­ly chang­ing and adapt­ing. Com­pet­i­tive advan­tages from the past only exist to a lim­it­ed extent. To achieve this, com­pa­nies need to dri­ve dig­i­tal trans­for­ma­tion with­in the organ­i­sa­tion and increase their dig­i­tal readiness.

Secure login

Mul­ti-fac­tor authen­ti­ca­tion is a secu­ri­ty pro­ce­dure in which a user pro­vides two dif­fer­ent fea­tures to iden­ti­fy them­selves. One of the fea­tures is usu­al­ly a phys­i­cal token, such as a secu­ri­ty code or an SMS.
Peo­ple like to talk about some­thing that „you have“ and some­thing that „you know”. A typ­i­cal exam­ple of two-fac­tor authen­ti­ca­tion is a QR code, while the PIN (per­son­al iden­ti­fi­ca­tion num­ber) forms the asso­ci­at­ed infor­ma­tion. The com­bi­na­tion of the two makes it more dif­fi­cult for a stranger to access the user’s data.

Mul­ti-fac­tor authen­ti­ca­tion for more secure connections

Mul­ti-fac­tor authen­ti­ca­tion cor­re­sponds to two-fac­tor authen­ti­ca­tion, where­by dif­fer­ent tokens can be used. This allows the user to choose which method suits them best. Mod­ern secu­ri­ty process­es often con­sist of a pass­word and bio­met­ric data such as a fin­ger­print or voice recognition.

An attack­er may suc­ceed in crack­ing a sin­gle authen­ti­ca­tion fac­tor, for exam­ple. For exam­ple, a thor­ough search of the victim’s envi­ron­ment can lead to the dis­cov­ery of an employ­ee ID card or a user ID with the cor­re­spond­ing pass­word that has end­ed up in the rub­bish. Or a care­less­ly dis­card­ed hard dri­ve may con­tain a pass­word data­base. How­ev­er, if oth­er fac­tors are required for authen­ti­ca­tion, the attack­er faces at least one more hur­dle to overcome.

The major­i­ty of today’s attacks are car­ried out via inter­net con­nec­tions. Mul­ti-fac­tor authen­ti­ca­tion can make these remote attacks far less dan­ger­ous because sim­ply crack­ing the pass­word is no longer enough to gain access. This is because it is very unlike­ly that the attack­er will also gain pos­ses­sion of the phys­i­cal device or code linked to the user account. Each addi­tion­al authen­ti­ca­tion fac­tor there­fore makes a sys­tem more secure. This is because the indi­vid­ual fac­tors are inde­pen­dent of each oth­er. If one of the fac­tors is com­pro­mised, this does not affect the others.

Bro­ker­Star and iOf­fice by WMC use mul­ti-fac­tor authen­ti­ca­tion from ver­sion 2.4.

Mul­ti-fac­tor authentication
Mul­ti-fac­tor authentication