CU news Logo

Your source for the latest technology information of interest to community banks across America. Subscribe to our weekly e-mail newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

April 23, 2018

 


Hardware News

 

Robots in Charge of the Branch

First time visitors to China Construction Bank's Shanghai branch have their ID cards scanned before being handed a queue number by a robot. Subsequent visits will see visitors identified via facial recognition. Once inside the branch, a second robot can answer queries while smart ATMs lets users carry out account openings, money transfers, forex transactions, and some wealth management actions.

finextra.jpg

 

New Intel Tool Uses GPU to Scan for Malware, Saving Time and Compute Resources

Intel announced a new security initiative titled Threat Detection Technology, intended to make security scanning and threat detection easier. At launch, the plan has two component parts. The first, Accelerated Memory Scanning, uses the integrated graphics system to scan for malware in memory. The second, Advanced Platform Telemetry, attempts to combine diagnostic information with machine learning to more reliably detect threats.

techrepublic.jpg

~~~

Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)

Back to Top


Software Updates

 

FICO Upgrades Financial Crime Suite

FICO Falcon Platform will provide third-party model support that allows users to deploy analytic models created by their own data science teams. This Falcon Platform 6.5 release also includes new executive dashboards that make it easier for fraud teams to track detection performance across a variety of financial products while monitoring evolving fraud vectors and distribution trends.

finextra.jpg

 

Microsoft Releases Its First Linux Product

Microsoft has released a product containing its own Linux kernel: Azure Sphere. It's not MS-Linux or Linux Windows, but it's still remarkable.

zdnet.jpg

~~~

Back to Top


ATMs/Kiosks

 

ATM Users Crave Cardless Cash Access, M2M Transfers

Cardless cash solutions for ATM withdrawals hold appeal for more than one-third of U.S. consumers (37 percent) and more than half of millennials, according to the Fiserv's quarterly survey, Expectations & Experiences: Household Finances. However, only 7 percent currently use cardless cash access. Of those not currently using the service, the survey found that: Slightly less than one-quarter (22 percent) would use such a service only in an emergency (e.g., a forgotten wallet). Sixteen percent think it would keep others from accessing their PIN. Six percent would use cardless ATM access in order to avoid carrying their debit card. The survey also found that more than one-third (35 percent) of consumers would be interested in being able to transfer funds from one ATM to another, and 62 percent of millennials reported interest in this option.

atmmarketplace.jpg

 

NCR Remains #1 Provider of Multivendor ATM Software in 2018 RBR Industry Report

NCR announced that it has been named the world’s largest supplier of multivendor ATM middleware and applications according to a new report by strategic research and consulting firm RBR. RBR’s “ATM Software 2018” report shows that more than 1.3 million ATMs globally run multivendor software, an increase of approximately 14 percent since the last report in 2016. NCR ATM software accounts for 32 percent of the global multivendor software market, 12 percentage points more than any other ATM software provider.

ncr.jpg

~~~

ATMs/Kiosks Sponsored by
Heritage Industries

 


Back to Top


Wireless World

 

Smart Speaker Banking Must Overcome Digital Inertia

More than half of all consumers are interested in leveraging their connected speakers for balance and recent transaction updates. The Alexa challenge for FIs is in differentiating the voice value proposition from other digital delivery options, while balancing security concerns that have slowed the introduction of full transactional functionality on the platform. Given the immense, and growing, volume of smartphone interactions that consumers have with their primary FI on a monthly basis, Javelin recommends that most FIs’ priority for voice banking investment should focus first on the mobile banking channel.

javelin.jpg

 

5 Mobile Security Threats You Should Take Seriously in 2018

Mobile security hazards for corporate employees lie in some easily overlooked areas, all of which are only expected to become more pressing in the coming year: 1) Data leakage; 2) Social engineering; 3) Wi-Fi interference; 4) Out of date devices; and 5) Physical device breaches.

cso.jpg

~~~

Back to Top


Security Section

 

Data Visibility, Control Top Cloud Concerns at RSA Conference

Organizations moving their data and processes to the cloud are worried about the ability to view and secure them, as indicated by trends and announcements at the recent RSA Conference. Visibility and control were two commonly voiced concerns related to cloud security. One speaker pointed to six types of cloud security threats likely to challenge cloud-enabled organizations: "cross-cloud" attacks between the private and public cloud, attacks within the data center, attacks between cloud tenants, cross-workload attacks, orchestration attacks, and serverless attacks.

darkreading.jpg

 

MinerEye Introduces AI-Powered Data Tracker

MinerEye is launching MinerEye Data Tracker, an AI-powered governance and data protection solution that they say will enable organizations to continuously identify, organize, track and protect vast information assets including undermanaged, unstructured and dark data for safe and compliant cloud migration.

helpnetsecurity.jpg

~~~

Back to Top


Technology and Marketing

 

More Organizations Putting Focus on Data Integration

Consumer data isn’t just about what’s in a CRM or ERP system, or even what’s in a master data management system. Getting a 360-degree view of accountholders also involves data from transactions, engagement with call centers, Web inquiry logs, chatbot sessions, and other sources, according to some analysts.

informationmanagement.jpg

~~~

Back to Top


Online Banking/E-Commerce/Website Design

 

W3C WebAuthn to Advance FIDO Protocols for Strong Authentication

A new browser standard developed by the FIDO Alliance, an industry consortium of tech and financial companies, should help enhance the security of online banking. The W3C web standards organization is working with the FIDO Alliance to bring the new WebAuthn standard – which provides two-factor and biometric authentication options – to all major web browsers.

eweek.jpg

~~~

Back to Top


Internet Access

 

Cloud Security Alert: Log Files Are Not the Answer

While users do not have direct access to public cloud infrastructure, cloud providers do offer access to logs of events that have taken place in the user’s cloud—often for an additional cost. With logs, administrators can view, search, analyze, and even respond to specific events if they use APIs to integrate the event data with a security event and incident management (SEIM) solution. So why aren’t log files sufficient to maintain security? This article provides some answers.

networksasia.jpg

~~~

Back to Top


Call Centers

 

Building the Ideal CX Dashboard

This article looks at the best practices for building the ideal customer experience (CX) Dashboard.

icmi.jpg

~~~

Back to Top

 

Get Our Free Email Newsletter

First Name(*)
Invalid Input

Last Name(*)
Invalid Input

Position(*)
Invalid Input

E-Mail(*)
Invalid Email Address