Your source for the latest technology information of interest to community banks across America.
Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
Lenovo has launched their new Gen5 Thinkservers which offer greater expansion potential and smarter management tools. The RD550 supports Intel’s E5-2600 v3 Xeons, 768GB of DDR4 memory, AnyFabric mezzanine cards and unique AnyRAID adapters. The embedded ThinkServer Deployment Manager provides tools for platform updates, BIOS setup, hardware configuration and OS deployment.
Lite-On is providing SSDs for the latest Dell PowerEdge line of servers, including 1.8 inch SSDs customized for Dell. The PowerEdge R730xd Rack Server is the first hybrid storage server to feature Lite-On N9S 1.8-inch SATA flash drives, and they provide up to 100TB of storage. Lite-On SSDs feature built-in data protection such as power-loss-protection (PLP), which can prevent data corruption by detecting power loss and completing write operation safely. They also have self-regulated temperature control features and built-in performance monitoring that can determine when a drive will need to be replaced.
|
Hardware Section Sponsored by
MVi |
Software Updates
Windows 10, which is slated to ship this year, will include extensive support for biometrics. With Windows 10, Windows devices and Microsoft-owned and partner SaaS services supported by Azure Active Directory authentication can be accessed via an enterprise-grade two-factor authentication solution - without a password. The upcoming OS will also include Active Directory integration for on-premise scenarios.
Illumio is a very well-funded startup and their product is a software platform called Adaptive Security Platform (ASP) that consists of an agent and a policy server. The agent – Virtual Enforcement Node (VEN) – is installed on every database and Web and application server in the network regardless of whether it’s a virtual machine or hardware. The policy server, called Policy Compute Engine (PCE), can be deployed on premises or in Illumio’s cloud and tells VENs what policies to enforce. Because the policies are enforced on every machine involved in all workloads, the security can span corporate data centers, private clouds and public clouds.
|
Software Section Sponsored by
Raddon Financial Group (RFG) |
Ascert and Cashware have partnered to offer ATM deployers an end-to-end ATM application testing platform. Ascert's VersaTest can be used for message processing and network-host simulation while the actual ATM application can run within Cashware's ATMirage. The solution allows testing of ATM and kiosk applications adhering to the CEN/XFS, J/XFS or Xpeak standards — without the need for physical hardware.
Hoyos Labs is offering software that will allow ATM deployers to utilize biometrics with their machines. Consumers can use facial, fingerprint, or iris biometrics to access their accounts and withdraw money from them via their phones to authenticate their identities. To access the ATM, consumers can use the app to scan a QR code that is displayed on the ATM screen to link the ATM with the smartphone and authenticate their identities. Once the identity has been verified, they can access their accounts to withdraw money using the ATM or automatically get amounts of cash that have been queued up in the app beforehand. The company claims that their system is smart enough to distinguish a real person from an image or video.
|
ATMs/Kiosks Sponsored by
Heritage Industries |
A new report by The Economist Intelligence Unit explores how mobile technologies are transforming the retail banking industry. Here are some findings from the report:
• today only 15 percent of transactions are conducted via mobile devices — that figure will rise to 25 percent in five years, according to an EIU consumer survey
• many financial executives believe they must offer more compelling mobile experiences to consumers; 69 percent believe quality must match that provided by big Internet companies
• FIs will move to provide more advanced mobile features, such as spending analyses and wealth management tools
Mitek Systems announced the availability of Commercial Mobile Deposit Capture, the company’s new mobile deposit solution created specifically to meet the needs of business users. The San Diego-based company says that their solution enables businesses of all types to easily capture important invoice documents and deposit checks from anywhere. The company is targeting the 28 million small- and medium-sized businesses in the US with a set of business focused features built-in to the solution.
According to a new study by Damballa, the majority of new malware is added to antivirus signature databases within 24 hours of first appearance, and 93 percent is detected within a month, but it can take as long as six months for antivirus software to catch the remaining 7 percent. Damballa researchers ran their "zero day" sample set past the top four antivirus products, and then one hour after discovery, the antivirus products missed 70 percent of the malware. It took six months to get to a 100 percent detection rate.
Facebook has launched another social network called ThreatExchange, and this website is designed for security experts and companies to collaborate and share information about online threats they're seeing, such as malicious software and computer vulnerabilities. The software giant says that with ThreatExchange, security pros can decide what they want to share and with whom, without worrying about disclosing sensitive information.
Security:
Meeting the Challenges of Attacks, Breaches & Compliance
|
CatchFire Creative - http://catchfirecreative.com
Read Drew Schulthess' comments: https://www.banktt.com/CatchFire.pdf |
|
Easy Solutions - http://www.easysol.net
Read Daniel Ingevaldson's comments: https://www.banktt.com/EasySolutions.pdf |
|
eScope Solutions - http://www.escope.net
Read Dean Marshall's comments: https://www.banktt.com/eScope.pdf |
|
Horsetail Technologies - http://www.horsetailtech.com
Read Mark Berman's comments: https://www.banktt.com/Horsetail.pdf |
|
HyTrust - http://www.hytrust.com
Read Hemma Prafullchandra's comments: https://www.banktt.com/HyTrust.pdf |
|
|
|
Info@Risk - http://www.infoatrisk.com
Read David Trepp's comments: //www.banktt.com/images/LR/Info@risk_sec15.pdf" target="_blank" style="text-decoration: none; color: rgb(51, 51, 153); font-weight: bold;">https://www.banktt.com/This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Ingalls Information Security - http://www.iinfosec.com
Read Russell “Rusty” Wilson's comments: https://www.banktt.com/Ingalls.pdf |
|
Hyland Software - http://www.onbase.com
Read Steve Comer's comments: https://www.banktt.com/OnBase.pdf |
|
PhishLabs - http://www.phishlabs.com
Read Stacy Shelley's comments: https://www.banktt.com/PhishLabs.pdf |
|
SilverSky - http://www.silversky.com
Read Andrew Jaquith's comments: https://www.banktt.com/SilverSky.pdf |
Mercator Advisory Group's most recent Insight Report, “Branch Banking: Rising Use for Financial Advice,” reveals that more consumers are turning to financial advisors to help them manage their money (37% report using financial advisors, up from 34% in 2013). While higher-income earners have always been more likely than average to use financial advisors, in 2014 young adults are even more likely to use financial advisors than older adults. The research firm notes that consumers seeking financial advice through wealth management relationships are especially interested in being made aware of potential products, special offers, and services that may benefit them based on their personal account history and payment behavior, and they are more likely to want to be notified about these products in person rather than digitally.
Online Banking/E-Commerce/Website Design
Many banks would like to make loans to customers with scant credit histories, but they are understandably nervous about their ability to repay. One option is to look at alternative data such as mobile phone bills, rent payments, social media connections and payday loans. Regions Bank has spent the last three years experimenting with alternative data and found some success: in some cases they were able to approve credit card applicants with FICO scores that were 20 points less than what they normally would have required.
Corporate Insight recently studied some FI websites and found that many of them are suffering from a bit of neglect as "improvements are being made to mobile." The New York consulting and research firm notes that that many consumers still conduct business using FI websites, making it important for them not to ignore that format. "Especially when it comes to things like account maintenance, statements, ordering checks, and the type of things that are serviced through filling out a form, those little extras are really just Web-only," states the report because "they aren't fully integrated into mobile apps yet."
|
Online Banking Sponsored b
IMM
|
IMM - The Nation's Leading eSignature, Workflow & Teller Provider
The industry’s leading “end-to-end” eSignature platform that integrates with all business applications, provides flexible eSigning options, and seamless archival into Imaging/ECM repositories.
Differentiate your eSignature solution with industry unique business-rules driven workflow automation. Control and enforce critical eSignature business operations, processes and tasks.
Innovative electronic receipt and check 21 teller capture solutions that streamline teller processes and reduce costs, while enhancing the consumer experience and eliminating paper-generation.
Contact us today:
(800) 836 - 4750
Since 2003, the Open Web Architecture Security Project (OWASP) has published a list of the ten most critical web application security risks. The list represents a consensus among many of the world's leading information security experts about the greatest risks, based on both the frequency of attacks and the magnitude of their impact on businesses. In response to this list, TraceSecurity has developed a complimentary application risk assessment to quickly see if your application is vulnerable to these ten most critical web application security risks.
Many organizations are wary of using the cloud for anything important or confidential. To counter this trust issue, Microsoft has attempted to ally these fears by gaining ISO 27018 cloud security certification. What makes this unique is that Microsoft says it is the first cloud provider to gain this certification. The certification provides a framework on which PII (Personally Identifiable Information) can be managed in a controlled and predictable way. It also specifies controls that should be put in place to assist keeping the PII data secure.
Many contact centers employ a building block approach to training, but some experts contend that this is not an optimal methodology. They say that using a scenario-based approach that trains agents on various skills through progressively more difficult scenarios is a better alternative. Each scenario is designed to replicate an actual contact the agent would handle, e.g., lost debit card. They contend that this approach naturally introduces a high degree of repetition which is key to learning, while showing agents how to simultaneously use all of the skills required for a successful contact.