Your source for the latest technology information of interest to community banks across America.
Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
Targus is focusing on reimagining the workplace with a range of new products to bridge the gap for employees who are working from home or commuting to the office one or two days a week. The new products include: a new UV-C LED disinfection light, an antimicrobial backpack, a tablet cradle workstation and a universal phone dock.
Security vendors can now leverage new telemetry and machine learning processing capabilities built into Intel's 11th Gen mobile processors to better detect and block sophisticated ransomware programs that attempt to evade traditional detection techniques. The features are built into Intel Core CPUs designed for businesses that include the vPro feature set.
Some vendors have approached XDR (eXtended Detection and Response) from the endpoint in and others from the network out. Either approach is valid as the premise of XDR is that security shifts from a series of point products to a single platform for threat visibility across the enterprise. Data is collected from the various enforcement points and then analyzed so threats can be detected faster and, more importantly, can be responded to quickly to contain the blast radius. This article offers some advice on how to choose an XDR platform.
FireEye has released a complimentary tool on GitHub named Azure AD Investigator that they say can help organizations determine if the SolarWinds hackers (also known as UNC2452) used any of these known breach techniques. The malware, known as Sunburst (or Solorigate), was used to gather info on infected companies.
Intel has introduced RealSense ID, an on-device solution that combines an active depth sensor with a specialized neural network designed to deliver secure and user-aware facial authentication. Intel RealSense ID works with ATMs, kiosks, smart locks, access control, point-of-sale, and more.
QR technology is very functional - here are some reasons why: 1) Information storage; 2) Speed; 3) Self-service; 4) Versatility; and 5) Cost-efficiency. Increasingly it is being used to make bill payments easier, faster and more secure.
Verizon insists that 5G connectivity is “more than just another tech innovation.” 5G connectivity is due to increase network speeds and performance, with speed increases of up to 100 times that of 4G networks. But the reality is that 5G connectivity’s true enterprise benefits are still a few years away. Providers must still build the fiber infrastructure (thousands of cell towers, antennas and more) to enable high-speed connectivity and low latency, and many mobile devices are not yet 5G enabled. As a result, many infrastructure build-outs will take several years to develop, and many experts view 5G as aspirational, not present-day reality.
This spring the FCC opened up a new swath of unlicensed wireless spectrum in the 6GHz band that’s intended for use with Wi-Fi and can provide lower latency and faster data rates. The new spectrum also has a shorter range and supports more channels than bands that were already dedicated to Wi-Fi. This article takes a deep dive into Wi-Fi 6E.
Intrusion’s new AI-based Shield cybersecurity appliance combines plug-and-play hardware with software, a database of 270 data feeds, billions of IP addresses and real-time artificial intelligence. This combination of technologies helps it to identify and prevent threats in real time by analyzing both current traffic entering and exiting a network and historical traffic patterns to decide whether the traffic is trustworthy. It also skips the alert step altogether, blocking suspicious traffic immediately. The company claims to have blocked 77,539,801 cyberthreats during a 90-day beta test of 13 companies.
If Active Directory is compromised, so is your entire environment. By modifying Active Directory, attackers can get access to anything in the network. Therefore, specific security provisions must be in place to monitor for and prevent unsanctioned changes within Active Directory itself, as well the ability to return to a known secure state, should a change find its way past prevention efforts. The author highly recommends to make it a priority to identify and communicate who is responsible for securing Active Directory in your organization, and implement comprehensive threat monitoring, detection, and response capabilities both on-premises and in the cloud.
BI tools make it simpler to corral the right data and visualize it in ways that enable us to understand what it means. But how simple that process gets, and how you can visualize the data depends on the tool: Picking the right one for your needs is critical. This article provides a dozen BI solution recommendations.
Infineon Technologies, a semiconductor manufacturer, is replacing the employee ID cards at its headquarters with the world’s first solution that combines highly secured office building access with a flexible, contactless Mastercard payment function. Employees can use teh cards to enter company buildings and the workplace, make cashless payments or transmit their digital business card using NFC.
Crypto-broker Bitpanda is taking pre-orders for a new Visa debit card that combines all assets like cryptocurrencies, fiat and precious metals into one card in real time. The card is linked to any asset in a user's Bitpanda portfolio, allowing the cardholder to switch the linked asset at any time via a mobile app and to shop online and in stores worldwide. Transactions are processed immediately and users get a real-time push notification every time the card is used.
SD-WAN platforms provide some native monitoring, but supplemental monitoring tools are needed, particularly when seeking the root cause of poor application performance, according to an Enterprise Management Associates survey. The survey found that organizations list native monitoring as the third most important SD-WAN product requirement. (The first two are hybrid-connectivity support and integrated network security.)
We now have people like Elon Musk and Jeff Bezos launching satellites with dozens of innovations to make the launches and the satellites cheaper. Can they really compete with Verizon, ATT and other telcos? The author states that the relevant metrics are the cost per GB of data delivered, and the cost per square mile of coverage. He is pretty bullish: he predicts that it will be sometime in the 2030 timeframe before these satellites emerge as a great low-cost solution in rural markets.
In the first part of this guide on how to implement chatbots within an omnichannel experience, the author discussed how to set parameters for what you want the bots to accomplish and identify how the bots are needed. In this second part of this series, she covers (in Steps 7 - 12) how to measure bot interactions and use consumer feedback to build a better self-service experience.