logo

Your source for the latest technology information of interest to community banks across America.

Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

April 7, 2014

Complimentary Webinar

The Check is NOT in the mail: Easy to use, cost effective payment collection tools that reduce delinquencies & offer customers multiple payment options

How many times have you heard delinquent customers say, "THE CHECK IS IN THE MAIL!"? If you are interested in learning how they were able to solve this time and money consuming issue you need to attend this informative webinar.


What You Will Learn:

• How any computer with Internet access can be used to accept payments by phone
• Emailing payment receipts to comply with NACHA rules
• Easy reporting tools to reconcile payments
• Charging convenience fees: Are you eligible?
• Easy website and IVR payments for 24/7 payment collection

Who Should Attend: Any community bank looking to reduce delinquent payments.
 

Date: Schedule a 30-minute live demonstration at your convenience!

To Register: http://www.banktt.com/webinars.htm  
 

Hardware News

The next-gen USB cable, called USB Type-C, is designed to replace today's multitude of cables and fix a number of their shortcomings. Expect the new design on the market as soon as this year. The upcoming USB cable design is:

- reversible

- has no right-side-up or upside-down problems

- will click when you plug it in. 

- designed to accommodate future USB incarnations with higher data-transfer speeds

An estimated 60 - 80% of all corporate data is fixed content. ASTI is one company that addresses this issue with their UDO (Ultra Density Optical) archive solutions that permanently archive your fixed-content data to secure media that is readily accessed. They note that when you deploy a tiered storage strategy that addresses
data according to its use - active data, backup data, and archive data - you will be able to improve operational efficiencies and decrease costs. 

The CyberPower Smart App Sinewave PR1500LCDRT2U uninterruptible power supply (UPS) with LCD panel and pure sine wave output is Active PFC compatible for safeguarding mission-critical servers, telecom equipment, VoIP and internetworking hardware that require pure sine wave power. This UPS system is Energy Star qualified with patented GreenPower UPS Bypass circuitry to save on energy costs by reducing energy consumption and heat buildup, plus it features full Automatic Voltage Regulation (AVR).
 

Hardware Section Sponsored by
MVi

Back to Top


Software Updates

AdRem Software recently announced an upgrade to NetCrunch 8 which is their agentless, cross-platform network monitoring software. New features include advanced network baselining and increased monitoring coverage via the new NetCrunch Open Monitor. NetCrunch 8 is designed to monitor and troubleshoot multiple devices on any network, including computers, switches, printers, video cameras, sensor devices, and security systems, and users have the ability to easily create monitoring and alerting rules.

SecureTrack, Tufin’s unified firewall management system, provides central management of devices with change tracking, alerting and reporting; policy configuration analysis and optimization; and rule recertification. Network change management is provided by SecureChange which provides IT automation and service provisioning, enforcement of corporate security policies, proactive risk analysis, SLA tracking, ticketing and help desk systems integration, while application delivery management is handled by Tufin’s SecureApp which handles application definition, automatic application discovery, migration and decommissioning, connectivity monitoring and troubleshooting, service dependency analysis, and self-service portals. 

The latest offering from Fluke Networks, Visual TruView V9.0, offers a new capability of end to end user analysis, which is able to delve into the network connectivity of a single IP address. That capability allows administrators to trend access and compare it to collected norms, making it easier to determine if an access problem lies with an individual user or the underlying network.

Software Section Sponsored by
Raddon Financial Group (RFG)

 

Back to Top


ATMs/Kiosks

The FFIEC has issued a warning about an expanding campaign of cyberattacks against financial institution ATM networks. The council says the attacks pose the greatest threat to small- and medium-sized institutions. The warning covers a type of cyber attack that begins with phishing emails to employees and culminates in the installation of malware that removes ATM withdrawal limits and allows criminals to execute fraudulent transactions on a grand scale. 

The ATM Industry Association (ATMIA) announced the creation of a new U.S. Underbanked Forum, to help foster development and deployment of ATM solutions addressing the needs of the unbanked and underbanked. The new Forum will serve as a vehicle for facilitating collaboration among the various ATMIA member constituencies, in a non-competitive environment. The organization believes that "the ATM is the perfect platform for linking traditional and non-traditional financial transactions."

ATMs/Kiosks Sponsored by
Heritage Industries

Back to Top


Wireless World


A new report from CSC and Finextra shows that 46% of FIs said mobile was central to their IT strategy, but nearly as many — 40% — said that mobile is a niche effort. In terms of how mobile is handled internally, 48% said mobile and online teams are separate but work together; 39% said mobile and online are handled by one team; and 13% said mobile has its own dedicated team.

The Federal Reserve Board began conducting annual surveys of consumers' use of mobile financial services in 2011. A key takeaway from their most recent report is that the number of U.S. consumers using mobile phones to access their financial accounts rose by five percentage points last year. The Fed also found that:

• 87 percent of the U.S. adult population has a mobile phone

• 61 percent of mobile phones are smartphones (Internet-enabled)

• 12 percent of those mobile phone users who are not currently using mobile banking think that they will probably use it within the next 12 months

• among those who own mobile phones, there is no clear correlation between mobile banking use and either income or education level

• 69 percent of the unbanked have access to a mobile phone, approximately half of which are smartphones

• 88 percent of the underbanked have access to a mobile phone, 64 percent of which are smartphones

Back to Top


Security Section


According to Solutionary's annual Global Threat Intelligence Report, failures in patch management of vulnerable systems are a key enabler of cybercrime. The report notes that system and application logs are valuable and "underutilized" security resources for detecting that an attacker has obtained inside access. In terms of types of attacks faced by organizations, botnet activity aimed against the organization was the largest type, constituting 34% of all attacks, with the remainder parceled out to denial-of-service attacks, application-specific attacks, service-specific attacks and "network manipulation," such as DNS attacks, along with other "suspicious" attacks.

Kaspersky Labs says that nearly 30 percent of all Phishing attacks last year targeted financial institutions, second only to social networking Phishing attack campaigns, which accounted for nearly 36 percent of all attacks of this type. "The conclusion here is obvious: the attackers are increasingly focusing on bank web services and this is one of the strongest trends in the area of phishing threats," Kaspersky's report noted.

HID Global, a manufacturer of secure identity solutions, recently demonstrated their latest secure identity solutions and emerging technologies that utilize Bluetooth LE and NFC for mobile access at the ISC West Conference. The company also highlighted its new iCLASS SE Encoder for locally encoding credentials and managing keys, and showcased its Lumidigm multispectral imaging technology, software, and biometric fingerprint sensors that authenticate identities.

Back to Top


Leaders Roundtable

Security:

Addressing the Big 3: Compliance, Fraud & Cyber Security

Cyveillance
Cyveillance - http://www.cyveillance.com
Read Eric Olson's comments:
http://www.banktt.com/Cyveillance.pdf

 

D+H
D+H - http://www.dh.com
Read Jeff Marshall's comments:
http://www.banktt.com/D+H.pdf

 

DirectRM
DirectRM - http://www.directrm.com
Read Donald E. Malloy's comments:
http://www.banktt.com/DirectRM.pdf

 

Easy Solutions - http://www.easysol.net
Read Daniel Ingevaldson's comments:
http://www.banktt.com/EasySolutions.pdf

 

GMV
GMV - http://www.gmv.com
Read Andres Escobero's comments:
http://www.banktt.com/GMV.pdf

 

Horsetail
Horsetail Technologies - http://www.horsetailtech.com
Read Mark Berman's comments:
http://www.banktt.com/Horsetail.pdf
IMM
 
Integrated Media Management - http://www.immonline.com  
Read John A. Levy's comments:

 

Incapsula
Incapsula - http://www.incapsula.com
Read Marc Gaffan's comments:
http://www.banktt.com/Incapsula.pdf

 

LogRhythm
LogRhythm - http://www.logrhythm.com
Read Mike Reagan's comments:
http://www.banktt.com/LogRhythm.pdf

 

Mimecast
 
Mimecast - http://www.mimecast.com  
Read Mounil Patel's comments:

 

Onbase
Hyland Software - http://www.onbase.com
Read Steve Comer's comments:
http://www.banktt.com/Hyland.pdf

 

ProPay
ProPay - http://www.propay.com
Read Dr. Heather Mark's comments:
http://www.banktt.com/ProPay.pdf

 

RPost
RPost - http://www.rpost.com
Read Zafar Khan's comments:
http://www.banktt.com/RPost.pdf

 

SilverSky
SilverSky - http://www.silversky.com
Read Andrew Jaquith's comments:
http://www.banktt.com/SilverSky.pdf

 

TrustCC
TrustCC - http://www.trustcc.com
Read Andy Robbins' & Brandon Henry's comments:
http://www.banktt.com/TrustCC.pdf

 

Verafin
Verafin - http://www.verafin.com
Read Brendan Brothers' comments:
http://www.banktt.com/Verafin.pdf

 

Wombat Security Technologies
Wombat Security Technologies - http://www.wombatsecurity.com
Read Joe Ferrara's comments:
http://www.banktt.com/Wombat.pdf

 

Back to Top


Technology and Marketing

A recent Bankrate.com survey released found that one in five Americans hadn't visited their branch at all in the past year. As expected, Millennials are the age group least likely to have visited a bank branch in the past week, at 19 percent. Yet in a somewhat surprising finding, fully 50 percent of Americans had been to their local branch at least once in the past 30 days, and 23 percent of Millennials had visited in the last month and 33 percent of Millennials at some point in the last year.

Back to Top


Online Banking/E-Commerce/Website Design


Plaid is a San Francisco startup that aims to make an API available for FIs to share financial data with developers. The company says that they keep all the data anonymized internally, and the entire system was built to be PCI compliant with encrypted traffic both ways. Their goal is to add value to transaction data by scrubbing it and providing context, e.g., they could deliver details on a restaurant’s name, type of cuisine, location, website and phone number along with the normal transaction data details such as amount, date, time, business name, etc. The firm is partnering with the large money center banks and others including American Express.

In a recent ABA survey, nearly two-thirds of Americans (62 percent) believe prepaid cards are good for consumers, and that number is 80 percent among those who have experience with prepaid cards. The most popular features were:

- 70% said the convenience of using the card anywhere the card's network brand is accepted

- 69% liked the fact that the cards' fixed spending limit helps stop users from spending more than is on the card

- 68% liked the flexibility to shop online where checks and cash generally are not accepted

Back to Top


Internet Access

Hughes Network Systems announced an enhancement to its HughesON Managed Security Solution: Virtual Domain (VDOM) technology, The company says that this capability enables secure partitioning of different segments at the branch, such as ATMs, enterprise, and third-party devices. The HR4700 Branch Gateway with the VDOM feature includes:

- Intrusion detection and prevention

- Data leak prevention

- Vulnerability scanning

- Content and web filtering

- Advanced antivirus and anti-malware

- Log management and reporting

- Broadband optimization features

- TCP optimization against packet loss

- ActiveQoS

Alcatel-Lucent enhanced its OmniVista 2500 network management system to better support network analytics and cloud-based services. They say that the enhancements make their platform more resilient and scalable. It also features a Web-based user interface for access from any browser-enabled device; and unified wired/wireless visibility and policy engine through centralized network analytics for wired and wireless networks.

Back to Top


Call Centers

Genesys, a leading provider of contact center solutions with over 3,500 customers, now has over 2400 cloud-based customers, with over 20% of Genesys business now cloud-based. Their Premier Edition is a pure cloud offering designed for small to mid-size contact centers and scales to 250 seats. The company sees multimodal IVRs, integration with assisted services, chat based on HTML5 and mobile messaging as important contact center trends.

Back to Top

Privacy Policy DBA: TRW ENTERPRISES, LLC