Your source for the latest technology information of interest to community banks across America.
Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
The Check is NOT in the mail: Easy to use, cost effective payment collection tools that reduce delinquencies & offer customers multiple payment options
How many times have you heard delinquent customers say, "THE CHECK IS IN THE MAIL!"? If you are interested in learning how they were able to solve this time and money consuming issue you need to attend this informative webinar.
What You Will Learn:
• How any computer with Internet access can be used to accept payments by phone
• Emailing payment receipts to comply with NACHA rules
• Easy reporting tools to reconcile payments
• Charging convenience fees: Are you eligible?
• Easy website and IVR payments for 24/7 payment collection
Who Should Attend: Any community bank looking to reduce delinquent payments.
Date: Schedule a 30-minute live demonstration at your convenience!
To Register: http://www.banktt.com/webinars.htm
Dell announced Dell Wyse Cloud Connect, an ultra-compact device that delivers desktop virtualization to any HDMI- or MHL-enabled display. The device supports multiple use cases including mobile workers, digital signage, kiosks and other space-constrained environments. Dell says that it can deliver secure and easy remote connections to computers running Microsoft Windows. Cloud Connect is $129 per unit. Complementary Dell accessories including MHL-capable displays and Bluetooth keyboards and mice are also available.
An increasing number of IT vendors are viewing ARM chips, which are being produced in large volumes for smartphones and portable devices, as an appealing alternative to x86 chips. Currently, there are only three companies producing processors for servers: Intel, AMD and IBM. AMD just announced that they will soon start shipping sample 64-bit ARM processors, along with associated development kits, to their partners. The chips should be less expensive and consume less power while doing the same amount of work as current x86 chips.
|
Hardware Section Sponsored by
MVi |
Software Updates
Unison offers a collaboration and productivity package that is an internal social network that the company says can be up and running in 5 minutes. The service makes use of live updates, organized chat rooms, and an intuitive interface. The firm's goal is to "fix how people communicate at work, in a way that email can't."
Crucial.com's System Scanner Tool is a handy utility for working with RAM. It can be a real time saver, e.g., rather than opening up a machine to check its configuration, the System Scanner tool can provide numerous details. The tool can quickly tell you how many slots you have in a machine and even recommend the appropriate memory.
|
Software Section Sponsored by
Raddon Financial Group (RFG) |
The bad news for ATM deployers running Windows XP is that Microsoft's sunset date of April 8th is fast approaching, but the news is much better for those deployers whose ATMs are running a special XP version called XP Pro for Embedded Systems. That is because that version’s end of life is Dec. 31, 2016 - Microsoft will continue to issue security patches until that date. Some observers believe that a short time fix is to update standard XP to Pro for Embedded Systems, while others recommend foregoing this step and say you should move directly to Windows 7.
Mercuri Systems has developed a system dubbed Spare that they think is an alternative to ATMs. The start-up is testing the system at several Los Angeles-area hotels. In action, a Spare user enters a request for funds on their mobile app which is linked to a checking account. At the hotel, which is also linked to the Spare system, the user is given the requested cash when checking in because the hotel knows who they are and has seen the request for funds, which can be added to their bill. Convenience stores and restaurants are possible candidates for the system as well.
PAYe Network, which bills itself as the world's first and only global electronic funds transfer (EFT) network to offer a universal cash 'pay-in-pay-out' solution, has introduced the PAYe USA Network. They say that their system is enabled by a software upgrade that requires neither hardware modification nor host system development or certification. Through strategic partnerships, Pay-e Network states it can offer banks access to more than 1 million ATM and cash point locations worldwide.
|
ATMs/Kiosks Sponsored by
Heritage Industries |
RDM Corporation announced the new release of its Simply Deposit Mobile remote deposit capture (RDC) solution for mobile devices. The new release adds remittance and general document image capture with data entry capabilities. In addition to capturing and keying check amount and check data, smartphone and tablet users can optionally capture remittance documents and key data into customized entry fields.
Kofax has launched a mobile capture platform that they say will permit the rapid development and deployment of mobile capture apps. The company says that their platform is highly customizable and can handle check deposit, bill pay, document scanning for account opening and mobile loan origination, including mortgages.
The 2014 Identity Fraud Study released by Javelin Strategy & Research reports an increase of more than 500,000 fraud victims to 13.1 million people in 2013, the second highest number since the study began. Key findings include:
- The total dollar amount stolen decreased to $18 billion – significantly lower than the all-time high of $48 billion in 2004
- One in three people who received a data breach notification letter became an identity fraud victim
- Account takeover fraud hit a new record in incidence for the second year in a row and accounted for 28 percent of all identity fraud
Washington, DC-based Virtru is a security startup founded by a former NSA staffer. The company is looking to solve usability problems around using email encryption software. They say that their software works within the Gmail, Outlook and Yahoo webmail interfaces and doesn't need an external client. Senders must install a browser extension, which manages the encryption and decryption of content. Recipients can opt not to install the extension and read the decrypted content within a browser window. Plans are in the works to allow organizations to run their own key servers using Virtru's software.
The Target malware, a variant of BlackPOS which is part of a Trojan horse family known as Trojan.POSRAM, was memory-only malware. Many security experts believe that there is no need to worry about memory-only malware more than other malware programs. That is because most memory-only malware can't live through a reboot. Of course if you haven't fixed what allowed it to gain initial access in the first place, the malware may return and reload the code into memory. The other good news is that scanning memory for malware is a very fast process and in general memory-only malware is not harder to detect than other malicious programs.
Security:
Addressing the Big 3: Compliance, Fraud & Cyber Security
|
Cyveillance - http://www.cyveillance.com
Read Eric Olson's comments: http://www.banktt.com/Cyveillance.pdf |
|
DirectRM - http://www.directrm.com
Read Donald E. Malloy's comments: http://www.banktt.com/DirectRM.pdf |
![]() |
|
Easy Solutions - http://www.easysol.net
Read Daniel Ingevaldson's comments: http://www.banktt.com/EasySolutions.pdf |
|
Horsetail Technologies - http://www.horsetailtech.com
Read Mark Berman's comments: http://www.banktt.com/Horsetail.pdf |
|
|
|
|
|
SilverSky - http://www.silversky.com
Read Andrew Jaquith's comments: http://www.banktt.com/SilverSky.pdf |
|
TrustCC - http://www.trustcc.com
Read Andy Robbins' & Brandon Henry's comments: http://www.banktt.com/TrustCC.pdf |
|
Wombat Security Technologies - http://www.wombatsecurity.com
Read Joe Ferrara's comments: http://www.banktt.com/Wombat.pdf |
CUneXus offers a Comprehensive Pre-Screened Lending (CPL) system that they say answers the need for integration of advanced risk-based pricing automation, direct marketing communications, cross-sales tools, and delivery channel management. The system utilizes customer relationship profiling and risk-based pricing criteria to preapprove individuals for an array of loan/credit products. It also manages the communication and acceptance of personalized multi-product offers at all key customer touchpoints — online banking, mobile banking, in-branch, call center, direct mail and email.
Online Banking/E-Commerce/Website Design
Some analysts are predicting that the open loop prepaid card market will evolve into two distinct business models this year. Those models are:
- prepaid cards will serve as portable bank accounts, offering numerous financial services to longer-term consumers
- prepaid cards will provide fundamental prepaid debit functionality for one-time use by anonymous consumers
According to research by The Street, most American consumers are unaware of Bitcoin and the concept of alternative currencies, and those that are aware of them are very wary of using them. The vast majority (76%) of the consumers surveyed in the study said they were not familiar with Bitcoin, while 79% said that would never consider using Bitcoin. Younger consumers, even though they were no more likely to be aware of Bitcoin than the older respondents, are more likely use crypto-currencies; 32% of 18-24 year old consumers said they would consider using an alternative currency like Bitcoin.
Google has entered the videoconferencing market with the release of the Chromebox for Meetings. The search giant is touting the system as a low-cost, easy-to-use device for holding business meetings in any room. The wireless device, which costs $999, comes with everything but a display for holding meetings of up to 15 people on laptops, smartphones or tablets.
More than 90 percent of unknown malware comes via Web-browsing, according to data from Palo Alto Networks, and 68 percent of all malware is delivered to victims via browsing. That has lead to the growing popularity of secure browsers. Vendors such as Invincea and Bromium offer sandboxed and virtualized browser sessions. Another option is cloud-based secure browsers from firms such as Authentic8 and Spikes Security. These are container-based browsing solutions that help shield the endpoint and its data from exposure to malware or from inadvertently leaking sensitive information.
Avaya announced the Avaya IP Office Contact Center offering multichannel contact center functionality to midsize organizations. The solution is purpose-built for the Avaya IP Office platform for contact centers with 5 -100 agents. Features include: support for multichannel inbound and outbound contacts (voice, email, chat); an agent interface to rapidly access customer information; call recording for every agent and flexible reporting; and support for a dedicated server or deployment in a virtualized environment.