IBM unveiled IBM Z, which IBM says is capable of running more than 12 billion encrypted transactions per day. The new system also introduces an encryption engine that, for the first time, helps make it possible to pervasively encrypt data associated with any application, cloud service or database all the time.
MagnaChip announced it was selected as a foundry partner by ELAN Microelectronics to manufacture the world's first fingerprint sensor IC-based smartcard. The smartcard uses biometrics technology that helps to provide secure identification to prevent credit card fraud. The sensor-IC based smartcard will be manufactured utilizing MagnaChip's 0.35 micron Mixed Signal Thick IMD manufacturing process technology.
The article lists the top external hard disks and SSDs from their reviews. It also walks you through what you need to know to buy the best external drive for your needs.
The Xeon Scalable line offers up to 28 cores per processor and brings together a variety of integrated accelerators and complementary fabric, memory and storage technology. It also represents a new way for Intel to package, market and deliver its technology, particularly for data centers that are moving toward software-defined infrastructure.
Microsoft is making available its first public near-final Release Candidate for its SQL Server 2017 database, which will run on both Linux and Windows Server. SQL Server 2017 Release Candidate 1 adds SQL Server on Linux Active Directory integration, Transport Layer Security (TLS) for data encryption, more SQL Server Analysis Services functionality, and SQL Server Integration Services on Linux and Windows Server.
Lastline introduced Lastline Breach Defender which is meant to help provide a dynamic blueprint of a breach as it unfolds and moves laterally across a network. Lastline Breach Defender aims to provide the visibility, context, threat intelligence, and integration that enterprise security teams need to remediate breaches faster.
With the Creators Update, Windows 10 can monitor a Bluetooth connection to your phone and automatically lock your computer when you walk away. This article explains how to set up this feature.
Microsoft is rolling out Security Risk Detection (SRD), a cloud-based tool built to catch software vulnerabilities before companies release or use it. A preview version is available for Linux users. SRD aims to eliminate the headache of handling bugs, crashes, and attack response by automating fuzz testing. Fuzzing seeks out vulnerabilities that could potentially enable threat actors to launch cyberattacks or crash systems. Based on results, developers can use other tools to fix the bugs.
Visa's "Cashless Challenge" campaign to promote electronic payments is not finding much support from the ATM industry. However the ATMIA may have some cause for concern: of five economies — Germany, the United Kingdom, the United States, France, and Israel — examined with respect to use of cash by consumers, 58% of U.S. consumers were likely to use cash for a purchase at least once a week, below that of Germany, 75%, the leader.
NCR announced the launch of simplified managed services for community financial institutions in the United States. According to NCR, their Managed Services allow FIs to help maximize availability, minimize failed interactions, enhance regulatory compliance and reduce both security risks and the cost of cash.
With continued investments in 5G and edge computing, AT&T said it is "reinventing the cloud" to better support next-generation technologies. The firm is also targeting "single-digit millisecond latency" to more efficiently provide access to these services.
Fis that do mobile best are ones that perform "constant reassessment" and have moved away from prebudgeted, three-year road maps.
MasterCard has outlined plans for greater choice in retail payments through the planned expansion of its QR-based programs. Beginning this month, the company will broaden its products to offer QR codes that can be scanned by either consumers or merchants under a common set of global specifications.
One of the most widely used technologies in mobile computing is getting an important upgrade that could accelerate the development of the smart home and industrial Internet. The Bluetooth Special Interest Group, the Kirkland, WA-based group that enforces compatibility among the billions of devices that use the short-range Bluetooth wireless technology, plans to announce that the standard that now supports mesh networking.
Legacy channels probably can’t beat mobile — so they should join it. By bridging mobile banking with other channel interactions, FIs may be able to raise convenience and user satisfaction in the branch, at ATMs, and in call centers. To this end, FIs should prioritize adding features such as the ability to view wait times in mobile banking before calling support, the ability to use a mobile phone to gain access to ATMs, or mobile scheduling tools to set appointments with branch employees.
The Cisco 2017 Midyear Cybersecurity Report uncovers the rapid evolution of threats and the increasing magnitude of attacks, and forecasts potential Destruction of Service attacks, which could eliminate organizations’ backups and safety nets. Also, with the advent of the Internet of Things, key industries are bringing more operations online, increasing attack surfaces and the potential scale and impact of these threats.
StackRox announced its platform that aims to deliver adaptive threat protection for container technologies, including Docker and Kubernetes. StackRox says that their new platform enables security teams to see containers in high resolution; defend against threats such as code injection, privilege escalation, malicious lateral movement, and data exfiltration; and streamline security operations.
Awake Security announced the general availability of its security analytics solution. The solution’s patent-pending Security Knowledge Graph data model uses machine learning and data science to try to automate painstaking analyses expert investigators perform. They say that their solution explores devices instead of IP addresses, people instead of packets, data instead of protocols and activities instead of sessions.
A new startup called ScaleFT aims to commercialize a security approach birthed at Google. The San Francisco-based company notes that the BeyondCorp and zero trust approach for security that is the basis for their solution comes from Google, and they believe it will redefine the way security is done.
HackerOne announced HackerOne Response, a new product offering for organizations to receive security vulnerability reports from the hacker community, their users, and customers. Organizations that don’t have a formalized method for receiving vulnerability submissions from the outside world may find out about security issues on social media, through various support channels, or not at all, leaving customers at risk. HackerOne contends that their platform is for organizations that want to learn what the bas actors already know about them.
Jumio announced the addition of eyeball tracking to Netverify's biometrics capabilities. When verifying an identity, in addition to conducting a "liveness" check to ensure a real person is holding the device, Jumio will require users to follow an icon on the mobile device screen with their eyes as it moves in a random pattern.
Removing Friction from the Digital Experience
IMM - http://www.immonline.com
Read Michael Ball's comments:
The article discusses some of the top themes in CETech – customer engagement technology – that are worth watching. Those trends include: 1) Social media delivering personalization (and profiling), 2) Artificial intelligence and cognitive learning, 3) The power of video, 4) Biometrics, and 5) Smarter virtual assistants.
The use of mobile peer-to-peer (P2P) payment apps such as Venmo in the US will continue to grow by double digits through 2021, according to eMarketer’s latest mobile banking and payments forecast. The transaction value of US mobile P2P payments will grow 55.0% this year to $120.38 billion. This figure is on pace to double by 2021.
Discover is offering a complimentary service that monitors risky websites known to sell or trade personal data, and alerts Discover cardmembers if their SSNs are found. In addition, Discover will alert cardmembers if any new credit cards, mortgages, car loans or other accounts are opened on their Experian credit report.
The SDN market has emerged from early adopter to early mainstream, and in doing so its use cases have expanded. SD-WAN enables organizations to aggregate multiple types of network connections into a branch office and have a software management platform that enables high availability and can automatically prioritize traffic. SD-WANs can save on a customer’s capital expense of installing expensive customized WAN acceleration hardware by allowing them to run a software overlay on less-expensive commodity hardware. IDC expects SD-WAN could become a $6 billion market by 2020.
Companies using Cisco's Application Centric Infrastructure are seeing success and Cisco’s marketing efforts will cause a “rising tide” of software-defined networking that will lift all boats. A similar effect was seen when Cisco moved into VoIP, Wireless LAN and converged infrastructure.
The article discusses five measurable, value-added benefits contact centers can get from putting social support in the hands of their contact center team.
A new feature from IBM takes voice recognition a step further by detecting subtleties in tone. The Tone Analyzer for Customer Engagement from IBM Watson attempts to bridge the gap between the human and automated sides of the conversation by expanding how it interprets tone of voice. IBM's new tool can pick up on seven different types of tone via conversations with contact center agents and chatbots: frustration, satisfaction, excitement, politeness, impoliteness, sadness and sympathy.