Your source for the latest technology information of interest to community banks across America.
Subscribe to our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
Robots in Charge of the Branch
First time visitors to China Construction Bank's Shanghai branch have their ID cards scanned before being handed a queue number by a robot. Subsequent visits will see visitors identified via facial recognition. Once inside the branch, a second robot can answer queries while smart ATMs lets users carry out account openings, money transfers, forex transactions, and some wealth management actions.
New Intel Tool Uses GPU to Scan for Malware, Saving Time and Compute Resources
Intel announced a new security initiative titled Threat Detection Technology, intended to make security scanning and threat detection easier. At launch, the plan has two component parts. The first, Accelerated Memory Scanning, uses the integrated graphics system to scan for malware in memory. The second, Advanced Platform Telemetry, attempts to combine diagnostic information with machine learning to more reliably detect threats.
~~~
FICO Upgrades Financial Crime Suite
FICO Falcon Platform will provide third-party model support that allows users to deploy analytic models created by their own data science teams. This Falcon Platform 6.5 release also includes new executive dashboards that make it easier for fraud teams to track detection performance across a variety of financial products while monitoring evolving fraud vectors and distribution trends.
Microsoft Releases Its First Linux Product
Microsoft has released a product containing its own Linux kernel: Azure Sphere. It's not MS-Linux or Linux Windows, but it's still remarkable.
~~~
ATM Users Crave Cardless Cash Access, M2M Transfers
Cardless cash solutions for ATM withdrawals hold appeal for more than one-third of U.S. consumers (37 percent) and more than half of millennials, according to the Fiserv's quarterly survey, Expectations & Experiences: Household Finances. However, only 7 percent currently use cardless cash access. Of those not currently using the service, the survey found that: Slightly less than one-quarter (22 percent) would use such a service only in an emergency (e.g., a forgotten wallet). Sixteen percent think it would keep others from accessing their PIN. Six percent would use cardless ATM access in order to avoid carrying their debit card. The survey also found that more than one-third (35 percent) of consumers would be interested in being able to transfer funds from one ATM to another, and 62 percent of millennials reported interest in this option.
NCR Remains #1 Provider of Multivendor ATM Software in 2018 RBR Industry Report
NCR announced that it has been named the world’s largest supplier of multivendor ATM middleware and applications according to a new report by strategic research and consulting firm RBR. RBR’s “ATM Software 2018” report shows that more than 1.3 million ATMs globally run multivendor software, an increase of approximately 14 percent since the last report in 2016. NCR ATM software accounts for 32 percent of the global multivendor software market, 12 percentage points more than any other ATM software provider.
~~~
Smart Speaker Banking Must Overcome Digital Inertia
More than half of all consumers are interested in leveraging their connected speakers for balance and recent transaction updates. The Alexa challenge for FIs is in differentiating the voice value proposition from other digital delivery options, while balancing security concerns that have slowed the introduction of full transactional functionality on the platform. Given the immense, and growing, volume of smartphone interactions that consumers have with their primary FI on a monthly basis, Javelin recommends that most FIs’ priority for voice banking investment should focus first on the mobile banking channel.
5 Mobile Security Threats You Should Take Seriously in 2018
Mobile security hazards for corporate employees lie in some easily overlooked areas, all of which are only expected to become more pressing in the coming year: 1) Data leakage; 2) Social engineering; 3) Wi-Fi interference; 4) Out of date devices; and 5) Physical device breaches.
~~~
Data Visibility, Control Top Cloud Concerns at RSA Conference
Organizations moving their data and processes to the cloud are worried about the ability to view and secure them, as indicated by trends and announcements at the recent RSA Conference. Visibility and control were two commonly voiced concerns related to cloud security. One speaker pointed to six types of cloud security threats likely to challenge cloud-enabled organizations: "cross-cloud" attacks between the private and public cloud, attacks within the data center, attacks between cloud tenants, cross-workload attacks, orchestration attacks, and serverless attacks.
MinerEye Introduces AI-Powered Data Tracker
MinerEye is launching MinerEye Data Tracker, an AI-powered governance and data protection solution that they say will enable organizations to continuously identify, organize, track and protect vast information assets including undermanaged, unstructured and dark data for safe and compliant cloud migration.
~~~
More Organizations Putting Focus on Data Integration
Consumer data isn’t just about what’s in a CRM or ERP system, or even what’s in a master data management system. Getting a 360-degree view of accountholders also involves data from transactions, engagement with call centers, Web inquiry logs, chatbot sessions, and other sources, according to some analysts.
~~~
Online Banking/E-Commerce/Website Design
W3C WebAuthn to Advance FIDO Protocols for Strong Authentication
A new browser standard developed by the FIDO Alliance, an industry consortium of tech and financial companies, should help enhance the security of online banking. The W3C web standards organization is working with the FIDO Alliance to bring the new WebAuthn standard – which provides two-factor and biometric authentication options – to all major web browsers.
~~~
Cloud Security Alert: Log Files Are Not the Answer
While users do not have direct access to public cloud infrastructure, cloud providers do offer access to logs of events that have taken place in the user’s cloud—often for an additional cost. With logs, administrators can view, search, analyze, and even respond to specific events if they use APIs to integrate the event data with a security event and incident management (SEIM) solution. So why aren’t log files sufficient to maintain security? This article provides some answers.
~~~
Building the Ideal CX Dashboard
This article looks at the best practices for building the ideal customer experience (CX) Dashboard.
~~~