logo

Your source for the latest technology information of interest to community banks across America.

Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

May 4, 2015

Hardware News

The Sensaphone IMS Series products can monitor a small server room, or a large data center. The Sensaphone IMS-4000 system is a stand-alone infrastructure monitoring system with an integrated voice and modem, an internal UPS, flash-disk storage, and a web server. Each unit supports up to eight Environmental Sensors such as: Temperature, Humidity, Smoke, Sound Level, Motion, Water Leak Detection, Intrusion, and Power Outages. When a problem occurs, the Sensaphone IMS Series supports multiple communication interfaces for alerting IT staff, e.g., an Ethernet port or a standard telephone interface.

SanDisk has launched their next generation Fusion ioMemory PCIe solid state drives with their new SX350 Series. The new series offers capacities of 1.25 TB to 6.4 TB and are designed to satisfy the requirements of mixed-use workloads, such as virtualization, databases and real-time financial data processing. The SSDs provide up to 350,000/385,000 random read/write IOPS.

Hardware Section Sponsored by
MVi


Software Updates

When a Windows system becomes unresponsive, the Task Manager is often used to troubleshoot the problem. But there are other tools available that can provide even more insight into what's going on. One such tool is Process Lasso which can be used to analyze the processes that are running on your PC. It maintains lists of all processes and active processes. In addition to displaying running processes, the software plots processor use, memory load, responsiveness, and memory restraint on a graph. The software includes features such as the ability to balance processes, park CPU cores, limit process instance counts, and configure anti-sleep processes. Process Lasso sells for $32.95, but a free 30 day trial is available for download.

LOGbinder announced new updates to LOGbinder for Exchange and LOGbinder for SQL Server. LOGbinder for Exchange, version 3.0, now allows customers to manage mailbox audit policy from inside the LOGbinder application. LOGbinder for SQL Server, now at version 2.5, adds events to support Microsoft SQL Server 2014 and introduces LEEF output. The company says that their software offers the only solution for collecting security log data from inside mission critical Exchange, SharePoint and SQL Server applications into SIEM log management deployments.

Software Section Sponsored by
Raddon Financial Group (RFG)

 


ATMs/Kiosks

Kiosks are becoming more popular at bank branches because they allow visitors to get details about current rates, advertise your products and services, sign in to meet with a CSR, and much more. Kiosks can setup on a PC or a tablet. One tool for locking down a tablet is SureFox which is available as an Android and IOS app that locks a tablet into browser mode and allows you to set a whitelist of pages the browser can visit. SureFox lets you set up categories for users to select and add multiple URLs (and even include subdomains). Other features include the ability to enable/disable zoom, complete device lockdown, and configure remotely.

Gas attacks on ATMs are increasingly popular in Europe, but fortunately have not made it to America yet. There were no such attacks in England until 2013, but since then there have been more than 90. Gas bomb gangs have struck all over the world due to the effectiveness of the technique - it can quickly expose the cash inside the vault for a quick getaway.

ATMs/Kiosks Sponsored by
Heritage Industries


Wireless World


Apple Pay is a closed system, but Android phones offer the potential for banks to supply a mobile wallet on them. Prairie Cloudware says that they offer banks the ability to provide an Apple Pay-like experience for Android devices. Their Digital Payments Guardian provides a token switching service on the digital wallet side. DPG, which is delivered within a virtual private cloud environment, allows the customer to manage all payment types from one place including DDA accounts as well as credit, debit, store and gift cards.

About 3,000 FIs offer mobile deposit capture, and Celent estimates that nearly a thousand financial institutions have licensed the product and are waiting to implement it. Some institutions that are concerned about fraud have enlisted Early Warning to help fight RDC fraud. Early Warning, a bank-owned organization that shares deposit data to fight fraud, can scan a deposit to see if the suspect check was written on an open or closed account and conducts other reviews in an attempt to stop fraud at the moment of deposit.


Security Section


92 percent of finance professionals firmly believe that EMV cards will be effective in reducing point-of-sale fraud, according to the "2015 AFP Payments Fraud & Control Survey." The survey, produced by the Association for Financial Professionals, also found that 61 percent believe that chip-and-PIN would be the most effective authentication method for mitigating credit and debit card payments fraud. However, old fashioned checks still remain the payment method most subjected to actual or attempted fraud, and they accounted for the largest dollar amount of loss. The most targeted payment methods in 2014 were: checks (77 percent); and credit and debit cards (34 percent); and wires (27 percent).

Quick Heal Technologies has released their SEQRITETM line of data security solutions for small to medium sized organizations in the US. The software covers endpoint, server, network and mobile device protection, as well as cloud-enabled management. Quick Heal Technologies was founded in 1993, and has more than 1,300 employees worldwide.


Leaders Roundtable

Security:

Meeting the Challenges of Attacks, Breaches & Compliance

 

CatchFire
CatchFire Creative - http://catchfirecreative.com
Read Drew Schulthess' comments:
https://www.banktt.com/CatchFire.pdf

 

D+H
D+H - http://www.dh.com
Read Jeff Marshall's comments:
https://www.banktt.com/D+H.pdf

 

Easy Solutions
Easy Solutions - http://www.easysol.net
Read Daniel Ingevaldson's comments:
https://www.banktt.com/EasySolutions.pdf

 

eScope
eScope Solutions - http://www.escope.net
Read Dean Marshall's comments:
https://www.banktt.com/eScope.pdf

 

Horsetail
Horsetail Technologies - http://www.horsetailtech.com
Read Mark Berman's comments:
https://www.banktt.com/Horsetail.pdf



DirectRM
HyTrust - http://www.hytrust.com
Read Hemma Prafullchandra's comments:
https://www.banktt.com/HyTrust.pdf

 

IMM
 
IMM - http://www.immonline.com  
Read John A. Levy's comments:

 

Info@Risk - http://www.infoatrisk.com
Read David Trepp's comments:
//www.banktt.com/images/LR/Info@risk_sec15.pdf" target="_blank" style="text-decoration: none; color: rgb(51, 51, 153); font-weight: bold;">https://www.banktt.com/This email address is being protected from spambots. You need JavaScript enabled to view it.

 

LogRhythm
Ingalls Information Security - http://www.iinfosec.com
Read Russell “Rusty” Wilson's comments:
https://www.banktt.com/Ingalls.pdf

 

KnowBe4
KnowBe4 - http://www.knowbe4.com
Read Stu Sjouwerman's comments:
https://www.banktt.com/KnowBe4.pdf

 

MVi
Millennial Vision - http://www.mviusa.com
Read Scott Cowan's comments:
https://www.banktt.com/MVi.pdf

 

Onbase
Hyland Software - http://www.onbase.com
Read Steve Comer's comments:
https://www.banktt.com/OnBase.pdf

 

PhishLabs
PhishLabs - http://www.phishlabs.com
Read Stacy Shelley's comments:
https://www.banktt.com/PhishLabs.pdf
Q2
Q2 - http://www.q2ebanking.com
Read Jay McLaughlin's comments:
https://www.banktt.com/Q2.pdf



SilverSky
SilverSky - http://www.silversky.com
Read Andrew Jaquith's comments:
https://www.banktt.com/SilverSky.pdf

 

Vormetric
Vormetric - http://www.vormetric.com
Read Sol Cates' comments:
https://www.banktt.com/Vormetric.pdf

 

Xamin
Xamin - http://www.xamin.com
Read Erik Gustafson's comments:
https://www.banktt.com/Xamin.pdf


Technology and Marketing

Despite lowered debit interchange fees, debit rewards programs have not gone away. A new study by the Mercator Advisory Group found that five years after the Dodd-Frank Act's Durbin Amendment was enacted, 50 to 60 percent of U.S. financial institutions offer debit rewards. Merchant-funded debit rewards programs are offered by 22 percent of FIs with less than $10 billion in assets, and 31 percent of large regulated FIs over $10B, according to the study, and rewards programs are associated with higher debit card use, particularly among young adults.


Online Banking/E-Commerce/Website Design


According to a new Forrester Research report, broad U.S. adoption of EMV cards will not happen until 2020. The research firm says the new payments standards currently fail to resolve basic security issues, while emergent technologies such as contactless and mobile payments could further slow uptake. Forrester predicts payments via magnetic stripes will continue to account for most transactions, but secure mobile payment solutions such as Apple Pay and the Merchant Customer Exchange, as well as a boost in digital wallets, could offer less expensive and more secure alternatives.

A newly released Harris Poll EquiTrend report ranked Visa as the highest payment card in brand equity for five years running. MasterCard came in second, with American Express and Discover ranking below the category average. The survey also polled consumers about mobile wallets for the first time, and PayPal led all of their direct competitors by a wide margin.


Internet Access

Many experts believe that the rise of the Internet of Things (IoT) will lead to an explosion of Simple Service Discovery Protocol (SSDP)-based amplification attacks. With the proliferation of the Internet of Things, any network-connected device with a public IP address and vulnerable operating system will increase the number of devices that could be used to launch SSDP-based reflection type attacks. According to NSFOCUS, this particular type of DDoS (distributed denial of service) attack was seen as the second most dominant threat, after NTP-based attacks, in 2H 2014. One piece of good news: 90 percent of DDoS attacks lasted less than 30 minutes.

Revolabs has introduced the FLX UC 1000 IP & USB Conference Phone. Doubling as a high-performance IP conference phone and a USB audio device, the UC 1000’s design enables unified communications by supporting both USB audio for PC communication tools and SIP telephony for market leading IP PBXs. It also features HD audio quality for call bridging between VoIP and USB calls.


Call Centers

RingCentral, a cloud-based business communications provider, has added contact center capabilities to its portfolio. The company has partnered with inContact, which is a third-party provider of cloud contact center software that has deployed over 2,000 cloud contact center instances. The service is bundled into packages with the basic tier supporting a voice channel; an advanced tier that adds multichannel support for email, chat and SMS; and a top of the line edition that adds automated outbound voice calling.

Privacy Policy DBA: TRW ENTERPRISES, LLC