Your source for the latest technology information of interest to credit unions across America.

Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

Credit Union Technology Talk Logo

March 3, 2014

~ This Week's News is Sponsored by Better Branches ~


General News  

* ESP Partners with Visible Equity
* Mid-Atlantic Corp Introduces Sollievo CUSO
* Bluepoint Solutions Announces Partnership with Corelation
* Member One FCU Selects Symitar's Episys

Enhanced Software Products, the Spokane, WA-based credit union Data Processing company, has formed a partnership with Visible Equity to offer their credit union clients a robust Loan Portfolio Analysis solution. Visible Equity's web-based software application is used by Analysts, CFOs, Chief Lending Officers and Lenders to identify, measure, and monitor the risks and opportunities in their loan portfolios.

Mid-Atlantic Corporate announced the launch of their CUSO, Sollievo, that will offer a comprehensive collection of risk management products and services to credit unions nationwide. The Pennsylvania-based CUSO will offer: Enterprise Risk Management; Information Security Services; Business Continuity; and Training and Consulting Services.

Bluepoint Solutions announced a partnership to integrate its teller check capture solution, ImagePoint Teller, with the KeyStone core system from Corelation, a leading credit union core processor provider. Bluepoint has been recognized by Corelation in its official Recognized Vendor Program. The integration of ImagePoint Teller and KeyStone will allow credit unions to capture check images as part of the core transaction, cutting keystrokes and minimizing corrections.

Jack Henry & Associates, a leading provider of technology solutions and payment processing services, announced that its Symitar division has signed the $600 million, Virginia-based Member One Federal Credit Union for its in-house core processing solution. The credit union, which was chartered in 1940, has grown into one of the largest credit unions in the region, currently serving approximately 75,000 members and more than 500 companies and organizations.




Credit Union InfoSecurity Conference Sponsored by
imsmartin consulting

The 12th annual CU InfoSecurity Conference will be held May 21 - 23, 2014 at the Red Rock Resort in Las Vegas, NV.

This is a one-of-a-kind conference - a security conference dedicated solely to credit unions. Highly experienced, expert speakers discuss the latest security trends as they specifically apply to credit unions. Also included is a virtual tour of The Partnership FCU and a Case Study of First Tech FCU. The CU InfoSecurity Conference is priced so that the majority of credit unions can afford it - just $395 per person and $295 for returning attendees. Topics include:


* Phishing 2.0 Exploits
* Anti-money Laundering
* DDoS Mitigation Strategies
* Advanced Log Management
* Effectively Using Data Feeds
* Owning Credit Union Networks
* Tuning Your Fight Against Fraud
* New Ways to Eliminate Malware
* Credit Union Virtual Security Tour
* Cyber Criminal Intelligence Programs
* Legal versus Enforceable eSignatures
* Building a Secure E-mail Infrastructure
* Next Generation Authentication Techniques
* Successful Security Awareness Training Programs

Click Here for information, agenda, reservations & more.

Hardware News

IBM announced the sixth generation of its enterprise X-Architecture for System x and PureSystems servers. The IBM System x3850 X6 four-socket server features the new IBM X6 architecture, Intel Xeon Processor E7 v2 families, and industry-first DIMM-based eXFlash memory-channel storage, allowing applications to perform 100 percent faster, according to Big Blue.

The Dell PowerEdge R920 is the computer giant's highest performing server. The 4-socket, 4U PowerEdge R920, built on Intel’s new E7 processors, is designed to handle demanding, mission critical workloads. The machine features 6 TB of memory and up to 24 local storage drives, as well as low latency PCIe Express Flash drives and the new H730P PowerEdge RAID controller (PERC) that doubles the previous cache size and delivers up to 100% more IOPS performance. 


Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)


Back to Top

Software Updates

Microsoft recently launched Power BI which is a tool that utilizes the familiar interface of Excel. Power BI enables users to search data within their own network, or access data from public sources. Users can query in plain English and easily convert the results into interactive charts or maps to put it into context that can help guide business decisions. Power BI is available as a standalone product for $40 per user per month.

According to new research from Secunia, the number of vulnerabilities found in Microsoft's Windows 7 and XP operating systems doubled last year over 2012, with the highest number of flaws reported in Windows 8. While Windows 8 had the most vulnerabilities, at 156, Secunia said that was due to the integration of Adobe System's Flash Player into the Internet Explorer browser, which accounted for 55 of those problems. Meanwhile, third party programs, which are made by a variety of vendors, contained about 76 percent of the vulnerabilities in the top 50 programs in 2013.



Software Updates Sponsored by
Raddon Financial Group (RFG)

Back to Top


Windows CE-based ATMs have been around for years in both indoor and outdoor locations. These inexpensive ATMs require far fewer service calls than traditional banking ATMs - by some accounts, most average only two services calls annually for the repair or replacement of a component. Most Windows CE ATMs do not accept check or cash envelope deposits, and they are not candidates for check imaging or deposit automation. Yet some institutions get around this issue by placing these low cost machines next to a night deposit box so that accountholders who need to make deposits are accommodated.

Triton Systems is partnering with Digital Donations to implement software that helps nonprofits connect with ATM users looking to make donations to charity. Digital Donations is working with the American Heart Association for the first test of the technology on Triton ATMs, and Genmega is expected to join the program shortly.


ATMs/Kiosks Sponsored by
Heritage Industries

Back to Top

CU Success Stories  


Here is a chance to learn about real life credit union success stories from various technology vendors through the words of their clients. This week's vendor is:


Horsetail Technologies


and their client is:

EP Federal Credit Union

Credit Unions - if you have a vendor that you are happy with then please This email address is being protected from spambots. You need JavaScript enabled to view it.!

Vendors - if you have a credit union that is happy with your solutions then please This email address is being protected from spambots. You need JavaScript enabled to view it. and we will give you a $100 discount on your Case Study!


Back to Top

Wireless World

Tyfone announced the launch of the Fluide Mobile banking platform which they say helps credit unions deliver secure and branded mobile apps in a cost effective and rapid manner. The platform can be leveraged for adding enhanced services, such as Remote Check Deposit, Mobile Marketing and Messaging, P2P Payments, and Mobile Payments at the point-of-sale (EMV).

MasterCard and Syniverse have joined forces to deliver an opt-in service that will enable card transactions for users only when they have their mobile device switched on in a specific geolocation abroad. This service aims to reduce consumers’ frustrations associated with having their payment cards used without their knowledge or having their own transactions unnecessarily declined when trying to make purchases in another country. Credit unions will also have an additional tool that will help them make more effective decisions when approving or declining a transaction on behalf of their members.

Royal Bank of Canada says that they are the first Canadian financial institution to offer augmented reality (AR) in their mobile banking app. AR provides a live view of a physical environment the elements of which are augmented by computer-generated input such as sound, video or GPS data. The app uses the mobile device's location, camera and compass to provide a live, real-time streetscape showing the nearest branch or ATM depending on which way the user is facing.


Back to Top

Security Section

At the recent RSA Security Conference, a panel of security experts agreed that security concerns should not deter organizations from using public cloud technologies when it makes business sense. Despite all the fears about cloud security, they note that there have been very few instances where enterprise data was compromised because it was moved to the cloud. In fact, a vast majority of enterprise breaches involving cloud providers stemmed from enterprise failures and not cloud provider faults.

In a white paper titled “The Convergence of IT and Physical Access Control,” HID Global is making the case that a new security environment is emerging in which users will have a seamless experience when using cloud-based applications and services, accessing data, and opening doors. They are convinced that future access control technologies will simplify and improve how we create, manage and use identities across many different applications on both smart cards and smartphones. It will also enable improved efficiency through the centralization of credential management for multiple logical and physical access control identities across IT resources and facilities.

SecureScan is a new free, cloud-based vulnerability management service for up to 100 Internet Protocol (IP) addresses on internal networks. Tripwire says that this new tool makes vulnerability management easily accessible to small and medium-sized organizations that may not have the resources for enterprise-grade security technology. Their vulnerability management solution requires no hardware or software to be installed and managed.


Back to Top

Leaders Roundtable


Addressing the Big 3: Compliance, Fraud & Cyber Security

D+H - http://wwwdh.com
Read Jeff Marshall's comments:

DirectRM - http://www.directrm.com
Read Donald E. Malloy's comments:

Easy Solutions - http://www.easysol.net
Read Daniel Ingevaldson's comments:

Horsetail Technologies - http://www.horsetailtech.com
Read Mark Berman's comments:

Integrated Media Management - http://www.immonline.com  
Read John A. Levy's comments:

Incapsula - http://www.incapsula.com
Read Marc Gaffan's comments:

LogRhythm - http://www.logrhythm.com
Read Mike Reagan's comments:

Mimecast - http://www.mimecast.com  
Read Mounil Patel's comments:

Hyland Software - http://www.onbase.com
Read Steve Comer's comments:

ProPay - http://www.propay.com
Read Dr. Heather Mark's comments:

Rallypoint Solutions - http://www.rallypoint.us.com
Read Kris Zupan's comments:

SilverSky - http://www.silversky.com
Read Andrew Jaquith's comments:

Spikes Security
Spikes Security - http://www.spikes.com
Read Branden Spikes' comments:

TrustCC - http://www.trustcc.com
Read Andy Robbins' & Brandon Henry's comments:

Verafin - http://www.verafin.com
Read Brendan Brothers' comments:

Wombat Security Technologies - http://www.wombatsecurity.com
Read Joe Ferrara's comments:

Zerto - http://www.zerto.com
Read Ziv Kedem's comments:


Back to Top

Technology and Marketing

Many email marketing experts agree that there are words that you should avoid in an effort to help ensure inbox delivery. Everyone agrees to have someone carefully proofread your emails and always avoid texting abbreviations and all caps. Here are some words to avoid in your subject lines:

- Free

- Affordable

- Apply Now

- Mortgage Rates

- Opportunity

- Save


Back to Top

Online Banking/E-Commerce/Website Design

Many observers contend that EMV-based credit and debit cards can be effective against fraud even without the use of a PIN thanks to their embedded chip technology. Some even go so far as to claim that EMV smartcard technology will all but eliminate counterfeit fraud when it is deployed in the U.S. Others believe that requiring a PIN for all payments would add significantly to the expense, complexity, and time involved in transitioning from magnetic stripe technology to EMV. A Visa spokesperson recently said that the gradual elimination of the utilization of static data such as PINs as transaction authentication is a priority of the card giant.

Many prepaid cards impose purchase, monthly maintenance, per-transaction, out-of-network ATM, and live customer service fees which are why the Consumer Financial Protection Bureau is closely looking at regulating prepaid card disclosures. The Pew Charitable Trusts has developed a disclosure form, similar to what is currently used in credit card offers, for prepaid cards (and checking accounts). Pew's research shows that inconsistent disclosures make it difficult to understand the fees associated with each prepaid card.


Back to Top

Internet Access

A Ponemon Institute survey discovered that poorly managed Secure Shell (SSH) keys pose serious risks for most companies. SSH keys allow administrators to remotely login to and operate a system via a secure encrypted tunnel, and are also used to authenticate machines running automated processes and services and to protect data in transit. The Ponemon Institute recommends that organizations figure out where SSH is in use, how many keys are in use, and put in place a process for automatically changing keys.

WatchGuard Technologies announced the WatchGuard Firebox T10 Unified Threat Management (UTM) solution, a network security appliance that allows organizations to extend powerful network security to teleworkers and small branch offices. The Firebox T10 features WatchGuard's cloud-based RapidDeploy capability, which self-configures and begins reporting back to the administrator's central console by simply plugging in the appliance. Pricing starts at $395 and includes one full year of UTM protection.

According to a Pew Research Center survey, 87% of U.S. adults use the Internet. As the 25th anniversary of the World Wide Web approaches this March 12th, 90% of those surveyed say the Internet has been good for them, and 76% say it has been good for society.


Back to Top

Call Centers

Hiring and training the right social media agent can be a difficult task. They need good listening skills, quick response times and great writing skills. Twitter with its 140 character limit especially demands concise writing abilities. Talented social agents write like journalists - brief and to the point. They also use contractions, substitute characters (% for percent), and omit extra words. They also know when to move a conversation to a different channel and bring in assistance from other experts in the credit union.