Your source for the latest technology information of interest to community banks across America.
Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
Virtual Instruments provides appliances that help deal with the massive amounts of data associated with log collection and analysis. Virtual Instruments provides the appliances needed to collect the data, while its software analysis tool called VirtualWisdom is used to visualize the data. Virtual Instruments leverages anonymized data from existing client data to help provide accelerators in the form of canned reports. The company says that their accelerators can be used to reduce the time required to garner useful information from machine data such as network tapes and application logs.
Dell’s XPS 13 laptop is the company’s thinnest and lightest laptop ever. The 13.3-inch display with a resolution of 2,560 by 1,440 pixels has a very slim border, and it weighs just 3.3 pounds. The XPS 13 has 802.11ac Wi-Fi and can have as much as 8GB of RAM. In all, a fully loaded laptop with the most storage and biggest touchscreen could cost more than $1,000.
|
Hardware Section Sponsored by
MVi |
Software Updates
Sysmon is a Windows system service and device driver that, once installed on a system, remains resident across system reboots to monitor and log system activity to the Windows event log. It provides detailed information about process creations, network connections, and changes to file creation time, and can help identify malicious or anomalous activity. Microsoft just released Version 2.0 of the software and it includes driver load and image load events with signature information, configurable hashing algorithm reporting, flexible filters for including and excluding events, and support for supplying configuration via a configuration file instead of the command line.
Citrix Systems says that the latest version of their XenServer software cuts the cost of virtualizing high-end PCs by increasing the number of desktops that can run on each server. For XenServer 6.5, Citrix partnered with Nvidia so that graphics commands of each virtual machine are passed directly to the GPU, without translation by the hypervisor. XenServer 6.5 is also now based on a new 64-bit kernel architecture that offers improvements in networking and storage performance, according to Citrix. Plus the company added "geo-tagging," which lets IT departments restrict workloads from running in a particular location for security reasons.
|
Software Section Sponsored by
Raddon Financial Group (RFG) |
The ATM Industry Association (ATMIA) has established an international ATM Marketing Committee. The mission of the new group is to promote communication between marketing professionals, educate customers on advances in marketing technology and techniques, and provide them with the information they need to more effectively promote their organization’s ATMs.
TD Bank is testing "Smart ATMs" at a few Canadian locations. They say that the machines feature a more intuitive user interface, with larger fonts and touch screens for ease of use, and the option to get on-site help from branch staff. The Smart ATMs also offer enhanced withdrawal and deposit functionality, including the ability to choose bills in various denominations.
|
ATMs/Kiosks Sponsored by
Heritage Industries |
According to research from RiskIQ, more than 11% of Android banking and finance-related apps contain malware or suspicious binaries. More than 40,000 surveyed apps were deemed suspicious in some way: 21,000 contained adware, 20,000 Trojan malware, 3823 spyware, 209 exploit code, and 178 malicious JavaScript. The research also shows that many of these apps request "excessive permissions" - such as the ability to capture device logs, record audio and access contact lists. The company notes that policing app stores for malicious apps and taking them down is a never ending battle for FIs.
USAA customers will soon be able to log into the FI's mobile app via biometric recognition. They claim to be the first U.S. financial institution to offer facial and voice recognition on a mobile device. The technology will allow customers to access their account information using multifactor authentication options that include a PIN, as well as face and voice recognition — all of which work in conjunction with a security code generated by the app for each login. USAA facial recognition requires users to look at the screen and, when prompted, blink their eyes, while for voice verification, users must read a short phrase.
A recent survey by Verifone showed that more than half of respondents – 53 percent – said it was important for more stores to install devices that enable consumers to pay with their smartphones. The response was significantly higher among younger consumers; 64 percent of respondents aged 40 and below agreed that more stores should install devices that allow customers to use smartphones to pay. However, the survey also showed that almost half of consumers polled were unfamiliar with mobile technologies such as near field communication (NFC) and mobile wallets.
According to the Online Trust Alliance, over 90 percent of data breaches in the first half of 2014 could have been prevented if businesses rethought their cyber-security strategies. The non-profit group states that only 40 percent of data breaches involving the loss of personally identifiable information (PII) were caused by external intrusions - while 29 percent were caused either accidentally or maliciously by employees. OTA says a lack of internal controls, lost or stolen devices and documents, as well as social engineering and fraud were to blame for almost 30 percent of data loss incidents suffered by businesses.
Fortinet announced the Fortinet Internal Network Firewall (INFW), which is aimed at protecting a company's critical data from inside the network. The INFW sits close to network assets, which helps prevent breaches from spreading, while the included software allows administrators to view network traffic, users and devices on the network. The company claims that their Threat Intelligence services can detect and block malicious network traffic and implement security policies without necessitating changes to the existing network topology.
Security:
Meeting the Challenges of Attacks, Breaches & Compliance
|
CatchFire Creative - http://catchfirecreative.com
Read Drew Schulthess' comments: https://www.banktt.com/CatchFire.pdf |
|
Easy Solutions - http://www.easysol.net
Read Daniel Ingevaldson's comments: https://www.banktt.com/EasySolutions.pdf |
|
eScope Solutions - http://www.escope.net
Read Dean Marshall's comments: https://www.banktt.com/eScope.pdf |
|
Horsetail Technologies - http://www.horsetailtech.com
Read Mark Berman's comments: https://www.banktt.com/Horsetail.pdf |
|
HyTrust - http://www.hytrust.com
Read Hemma Prafullchandra's comments: https://www.banktt.com/HyTrust.pdf |
|
|
|
Info@Risk - http://www.infoatrisk.com
Read David Trepp's comments: //www.banktt.com/images/LR/Info@risk_sec15.pdf" target="_blank" style="text-decoration: none; color: rgb(51, 51, 153); font-weight: bold;">https://www.banktt.com/This email address is being protected from spambots. You need JavaScript enabled to view it. |
|
Ingalls Information Security - http://www.iinfosec.com
Read Russell “Rusty” Wilson's comments: https://www.banktt.com/Ingalls.pdf |
|
Hyland Software - http://www.onbase.com
Read Steve Comer's comments: https://www.banktt.com/OnBase.pdf |
|
PhishLabs - http://www.phishlabs.com
Read Stacy Shelley's comments: https://www.banktt.com/PhishLabs.pdf |
|
SilverSky - http://www.silversky.com
Read Andrew Jaquith's comments: https://www.banktt.com/SilverSky.pdf |
Some marketing experts believe that banks are not spending as much money on their websites and on email marketing as they should. They contend that customers visit and spend more time on a bank's website than any branch that they have, and that the website should be the focal point of any bank’s digital marketing strategy. As for email marketing, proponents point to a McKinsey study that found that email remains a significantly more effective way to acquire customers than social media. The report states that 91% of U.S. consumers use email daily and the rate at which emails prompt purchases is estimated to be at least three times that of social media.
Online Banking/E-Commerce/Website Design
A few start-ups, such as Earnest, Affirm and ZestFinance, are creating new models of lending. Using sophisticated software, they look well beyond a person’s credit history. The data is compiled from diverse sources, such as household buying habits, bill-paying records, and social network connections. They argue that this approach can lead to more accurate assessments of creditworthiness that will broaden the lending market and lower borrowing costs. These young companies see opportunities due to the fact that as many as 70 million Americans either have no credit score or a limited credit history, and they contend that most mispriced group in the loan market is the millions of financially responsible young people.
Barclays is implementing a system which enables their mortgage staff to take photos of paperwork for immediate upload to an applicant's case file. Employees can simply take photographs of the paperwork on their smartphone or tablet. These images, as well as those of documents that have been scanned, can then be uploaded directly into the applicant's case folder online, where they are instantly visible to both employees and the applicant.
|
Online Banking Sponsored b
IMM
|
IMM - The Nation's Leading eSignature, Workflow & Teller Provider
The industry’s leading “end-to-end” eSignature platform that integrates with all business applications, provides flexible eSigning options, and seamless archival into Imaging/ECM repositories.
Differentiate your eSignature solution with industry unique business-rules driven workflow automation. Control and enforce critical eSignature business operations, processes and tasks.
Innovative electronic receipt and check 21 teller capture solutions that streamline teller processes and reduce costs, while enhancing the consumer experience and eliminating paper-generation.
Contact us today:
(800) 836 - 4750
Viptela is looking to improve traditional WANs (wide area networks) that are too complex, too costly and too inflexible with their leading edge solutions. The company implements software defined WANs via their Secure Extensible Network solution. Their architecture is composed of five major pieces:
- Enable transport independence
- Enable security at routing scale
- Enable network-wide segmentation
- Centrally enforce policy and business logic
- Insert Layer 4-7 services on demand
Fraudsters have developed software called FraudFox VM that makes spoofing a browser fingerprint much easier. Web browsers send a variety of data to websites, including a computer's operating system, its time zone, language preference and version numbers for software plug-ins. When those "fingerprint" parameters change, along with others such as an IP address, it may mean an account is being fraudulently accessed. FraudFox makes it easier to change a browser's fingerprint to one that matches that of the victim whose account they are trying to exploit. Some security experts are suggesting that tools like this mean that device/browser fingerprinting is losing effectiveness and cannot be relied upon by anti-fraud packages looking to protect online banking sites.
8x8, a cloud-based service provider, announced an integrated cloud communications solution that combines telephony, unified communications (UC) and contact center users via a common underlying platform. The 8x8 Virtual Office/Virtual Contact Center integrated solution features:
- “Shared Presence” - so agents can see the status of anyone in the bank to handle customer issues
- Single Sign-On – enabling use of authorized tools including call center features, UC services for agent desktops, meetings, switchboards and mobile clients
- Extension-to-Extension Dialing – provides click-to-call dialing and call processing between contact center users and other staff
- Call Center Agent Hardware Endpoints – for agents who don’t use a soft phone solution (e.g. a remote IP phone) can make their device part of the contact center call flows and reporting