Your source for the latest technology information of interest to community banks across America.
Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
Complimentary Webinar
The Check is NOT in the mail: Easy to use, cost effective payment collection tools that reduce delinquencies & offer customers multiple payment options
How many times have you heard delinquent customers say, "THE CHECK IS IN THE MAIL!"? If you are interested in learning how they were able to solve this time and money consuming issue you need to attend this informative webinar.
What You Will Learn:
• How any computer with Internet access can be used to accept payments by phone
• Emailing payment receipts to comply with NACHA rules
• Easy reporting tools to reconcile payments
• Charging convenience fees: Are you eligible?
• Easy website and IVR payments for 24/7 payment collection
Who Should Attend: Any community bank looking to reduce delinquent payments.
Date: Schedule a 30-minute live demonstration at your convenience!
To Register: http://www.banktt.com/webinars.htm
Hewlett-Packard's new Pro X2 410 is a tablet that comes bundled with a detachable keyboard. HP believes the future of laptops lies in these types of "converged" devices. The hybrid device has an 11.6-inch screen that can be used as a tablet and gives more than 12 hours battery life with a keyboard attachment. The Pro X2 410 weighs over 907 grams but its display, at 11.6 inches on the diagonal, is larger than those of most regular tablets, which generally have 7- to 10-inch displays.
While total PC shipments declined 10% in 2013, laptops remain popular for business executives. Senior bank managers looking for new machines may want to consider these powerful new business-grade laptops:
- Sony Vaio Flip 15 ($1,799)
- HP ZBook 15 ($2,999)
- Acer Aspire V3-772G-9402 ($1,099)
|
Hardware Section Sponsored by
MVi |
Software Updates
Spiceworks announced a new version of its free IT management application: Version 7.1. The update includes performance enhancements to its IT inventory, help desk and mobile device management capabilities. The package also includes new security integrations and help desk plugins.
CounterTack announced the next-generation of its endpoint threat detection and response platform, Sentinel, which helps control targeted, persistent threats. The company says that the package combines its "real-time stealthware" with Big Data analytics to provide organizations with visibility, context and intelligence. Sentinel does not install agents to collect data on endpoints. Instead, it uses a lightweight, driverless kernel technology to gather continuous, real-time data from endpoints.
|
Software Section Sponsored by
Raddon Financial Group (RFG) |
Personetics recently conducted a survey of ATM usage from their client base and found these results:
- most consumers will take out cash from an ATM every 7 to 10 days using a combination of in-network ATMs and out-of-network ATMs
- 30% of all ATM withdrawals were conducted at out-of-network ATMs
- less than 50% of the consumers who are using the FI’s digital channels have used the ATM lookup service
- when asked to estimate the fees they have incurred using foreign ATMs, the common answer is less than half of the actual cost
Image-enabled ATMs have claimed significant volumes of checking activity formerly handled by tellers. According to Novantas, a management consultancy firm, these machines can handle some 8,000 transactions a month without wait-time issues, while individual tellers typically handle less than a fourth of the monthly transaction volume of an “i-ATM,” but can cost 150% more annually. They base these numbers on a one time cost of $50,000 for a new ATM (and about $18,000 annually for upkeep and servicing), while a typical teller costs $30,000 for salary and benefits (plus $15,000 for “linked costs” such as recruiting, turnover, training, etc.) At the transaction level, Novantas concludes that there is a 10-to-1 comparative advantage for i-ATM services.
|
ATMs/Kiosks Sponsored by
Heritage Industries |
According to Parks Associates, more than 40 million U.S. consumers used at least one mobile proximity or mobile e-commerce wallet in 2013. This figure represents about 20 percent of all smartphone users. They are predicting that mobile wallet usage will rise to nearly 113 million, or 43 percent of all smartphone users, by 2017. They also believe that the prospects for the market are no longer tied to the success or failure of NFC due to the emergence of barcode, cloud, and Bluetooth-based wallets.
AT&T has launched a mobile identity toolkit and is hoping to partner with financial institutions on their mobile banking apps. The telecom giant can offer hosted services such as call recording, videoconferencing, geolocation services and mobile identity verification.
Senior managers are the biggest offenders of putting their organizations at risk of a data breach, according to a new survey by breach investigation and risk services firm Stroz Friedberg. While about 25 percent of all employees admit to inadvertently sending the wrong recipient sensitive company information, 58 percent of senior managers say that they have done so. Plus, more than half of senior managers and 37 percent of midlevel managers say they have taken work-related emails, files, or other resources with them when they have left an employer for another job.
At last week's Consumer Electronics Show (CES) in Las Vegas, dozens of new tech products that use biometrics were on display. Some scan fingerprints, palm prints and irises, while others utilize facial recognition, eye tracking, voice recognition and even monitor behavior. Some of the companies that were displaying their biometric wares included:
- YubiKey
- AGNITiO
- FingerQ
- Nok Nok Labs
- Synaptics
- Fingerprint Cards
- EgisTec
- CrucialTec
- GO-Trust
- Sonavation
- Eyelock
- Tobii
Security:
Addressing the Big 3: Compliance, Fraud & Cyber Security
|
Cyveillance - http://www.cyveillance.com
Read Eric Olson's comments: http://www.banktt.com/Cyveillance.pdf |
|
DirectRM - http://www.directrm.com
Read Donald E. Malloy's comments: http://www.banktt.com/DirectRM.pdf |
![]() |
|
Easy Solutions - http://www.easysol.net
Read Daniel Ingevaldson's comments: http://www.banktt.com/EasySolutions.pdf |
|
Harland Financial Solutions -http://www.harlandfinancialsolutions.com
Read Jeff Marshall's comments: http://www.banktt.com/HFS.pdf |
|
Horsetail Technologies - http://www.horsetailtech.com
Read Mark Berman's comments: http://www.banktt.com/Horsetail.pdf |
|
|
|
|
|
SilverSky - http://www.silversky.com
Read Andrew Jaquith's comments: http://www.banktt.com/SilverSky.pdf |
|
TrustCC - http://www.trustcc.com
Read Andy Robbins' & Brandon Henry's comments: http://www.banktt.com/TrustCC.pdf |
|
Wombat Security Technologies - http://www.wombatsecurity.com
Read Joe Ferrara's comments: http://www.banktt.com/Wombat.pdf |
With the recent Target and Neiman-Marcus breaches in the news, identity protection is garnering more attention as a worthwhile product for banks to offer their customers. Javelin Strategy and Research notes that ID theft claims a new victim every three seconds which causes many people to become increasingly worried about this pervasive crime damaging their finances. ID protection proponents argue that the service can help drive revenues, customer engagement and act as a retention/loyalty tool.
Online Banking/E-Commerce/Website Design
Celent is reporting that there has been about 10% growth in the number of check scanners deployed for commercial RDC (remote deposit capture) over the past year, while there has been a tripling in the number of financial institutions offering mobile RDC to consumers and small businesses. The research firm expects continued growth of deployed scanners to commercial locations over the next three years, but the real growth will be with mobile RDC.
A new service called Online Appointment Setting is being offered by Regions Bank. Both existing and prospective customers are now able to tell employees when and where they’d like to meet, either in-person or over the phone. It will also be available on mobile devices soon.
As more and more people forego landlines for mobile phones, some observers believe that banks should step up their efforts to make sure that they have their customers' cell phone numbers on file. One way to accomplish this is to remind customers at login to review their account info on file. Going a step further, you can add a small reminder to have them make their mobile number primary, if desired.
WAN optimization is increasingly being delivered as a cloud service as opposed to traditional on-premise equipment. WAN Optimization as a Service is available from companies such as Aryaka Networks. With this utility-like cloud service, you are able to deploy WAN optimization quickly because you do not have to install any hardware. Aryaka’s service is based on a global network of distributed PoPs and provides application acceleration proxies for “chatty” protocols like CIFS and MAPI, data deduplication and compression for bandwidth scaling, and a specialized multi-segment approach to TCP optimization.
Oracle announced the Oracle Enterprise Communications Broker which is designed to help make various UC (unified communications) products interoperate. Oracle says that their new product simplifies network operations by eliminating the vendor incompatibilities at the session protocol layer. The Communications Broker also controls the routing of the sessions between the various voice, video and other UC systems.
Intradiem, formerly Knowlagent, offers intraday management solutions for multi-channel contact centers. As more centers add live chat to their inbound calls and e-mail responses, intraday management becomes more important. The company claims that intraday management technology can create agents who are as much as 20 percent more productive, improving the overall performance of the frontline workforce without increasing headcount. When volume in one channel spikes, agents can be automatically moved from one channel to another to cover peaks and valleys in volume.