CU news Logo

 Your source for the latest technology information of interest to credit unions across America.

Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

October 13, 2014

~ This Week's News is Sponsored by Better Branches ~


General News  

* Eleven CUs Convert to Fiserv Portico
* USE Credit Union to Convert to Corelation
* PSCU & First Data Mark 25 Year Partnership
* Allied Solutions Deploys SmartVideos

Fiserv, a leading global provider of financial services technology solutions, announced details of increasing adoption of its Portico account processing solution, including eleven credit unions serving members in 12 states. The company states that they now have more than 360 clients using Portico, and that the converted 11 credit unions account for nearly 73 total years of contract commitment.

Corelation, an innovative San Diego-based core processor, announced that they have signed San Diego-based USE Credit Union to their KeyStone core system. The $775 million credit union with 43,459 members will convert to the KeyStone core in Q4 2015.

PSCU, the nation`s leading credit union service organization, and First Data Corporation, a global leader in payment technology and services solutions, will celebrate their 25-year partnership at PSCU`s St. Petersburg, FL headquarters on October 15. Since the partnership began in 1989, PSCU has become one of First Data`s largest clients by annual transaction volume in three key payments categories: debit, ATM Terminal Driving and credit.

Allied Solutions, a provider of products and services to credit unions, announced it will offer SmartVideo technology, powered by SundaySky, to all its credit union clients. PenFed recently rolled out a SmartVideo program for onboarding members, and the early results have driven measurable business impact: more than 90 percent of survey respondents said the videos help to understand account information; 83 percent would refer a friend or family member; and 79 percent watched the videos in their entirety.




Hardware News

VCE, a company formed by Cisco and EMC, integrates storage, networking, computing and virtualization into pre-validated systems it calls Vblocks. The company ships each system with a custom configuration for the customer, and tests all software updates before delivering them to the customer's site. EMC is bringing its all-flash XtremIO storage array into play in VCE for the first time with the Vblock System 540, which the company calls the first all-flash converged infrastructure system in the world. XtremIO arrays themselves are sold in modular units called X-Bricks, so organizations can scale up capacity and processing power at the same time.

Synology RS3614RPxs is a new 2U storage appliance with 12 drive bays that supports both 3.5-inch and 2.5-inch SATA hard disk drives (HDDs). The Synology DiskStation Manager, which is the operating software that powers all Synology storage appliances, is open source and uses a Web-based front end. Synology recommends setting up its NAS as an iSCSI target and connecting via iSCSI from the server for the best performance. HDDs can be grouped into different volumes with support for JBOD (just a bunch of disks) as well as standard RAID configurations such as RAID 0, RAID 1, RAID 5, RAID 6, RAID 10 (also known as RAID 1+0). 


Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)


Back to Top

Software Updates

AdRem NetCrunch 8.2 for network and systems monitoring includes advanced alert correlation and automatic execution of remote corrective actions in response to alerts such as restart service, run script, execute program, etc. NetCrunch can remotely gather, filter and analyze event log data from multiple Windows machines. The company says that their solution speeds up issue resolution and helps eliminate repetitive manual troubleshooting tasks.

Rapid7 released Nexpose Ultimate, a vulnerability management solution that combines assessment of vulnerabilities and controls, vulnerability validation, and prioritized remediation planning. The insight into risk goes beyond looking at the vulnerabilities in browsers, operating systems, Flash, Java and other third-party software to common weaknesses in controls such as weak password policies, out of date anti-virus solutions or desktop applications installed on servers.

BalaBit has unveiled Blindspotter which the firm says is an IT security tool that analyzes all user activity, including malicious events, occurring throughout IT systems. Blindspotter delivers an activity dashboard and prioritizes security events using advanced data science algorithms. The company states that their tool integrates a variety of contextual information in addition to standard log data, processes them using a unique set of algorithms, and offers a wide range of outputs from warnings to automatic interventions.



Software Updates Sponsored by
Raddon Financial Group (RFG)

Back to Top


Many ATM deployers are exploring new technologies such as biometrics and remote teller assistance, according to a new report, "The Changing Face of the ATM Market." The report from Cummins Allison also found that:

  • 57 percent of FIs plan to bolster ATM security technologies;
  • 61 percent plan to migrate to Microsoft Windows 7; and
  • 21 percent plan to add deposit automation.

American Express, Discover, MasterCard and Visa require that ATMs accepting EMV cards must have:

  • EMV Level 1 Approved Card Reader ("interface module" or "hardware"); and
  • EMV Level 2 Approved Application Kernel ("software").

Unfortunately, these certifications will not cover all types of testing that an ATM owner will need to perform. To be prepared for EMV cards. ATM deployers will most likely also need to perform regression, new feature, specific EMV, performance, volume and stress testing prior to certifying with a payment network. According to the EMV Migration Forum, it is very likely that ATM manufacturers have already obtained all EMV approvals and that the network certifications will be completed by the ATM processor.


ATMs/Kiosks Sponsored by
Heritage Industries

Back to Top

CU Success Stories  


Here is a chance to learn about real life credit union success stories from various technology vendors through the words of their clients. This week's vendor is:




and their client is:

Conexus Credit Union

Credit Unions - if you have a vendor that you are happy with then please This email address is being protected from spambots. You need JavaScript enabled to view it.!

Vendors - if you have a credit union that is happy with your solutions then please This email address is being protected from spambots. You need JavaScript enabled to view it. and we will give you a $100 discount on your Case Study!


Back to Top

Wireless World

Security remains a significant concern for consumers when it comes to mobile payments, and a new Kurt Salmon survey indicates security is even on the minds of consumers who have already embraced mobile payments. The firm reports more than 40 percent of active mobile payments users worry their personal information is at risk, while 37 percent believe making an online purchase via smartphone is not secure. However, despite security concerns, Kurt Salmon notes rewards and loyalty programs motivated 61 percent of active users to make a payment with a smartphone.

According to a recent Nielsen survey, NFC has gained a good level of awareness, having been used by 37 percent of U.S. adults who have embraced mobile payments with their smartphones. NFC ranked just behind the 45 percent who said they have presented merchants a quick response code or barcode on their smartphones. Nonetheless, NFC use was ahead of scanning codes at the counter, at 29 percent, and using card readers such as Square, at 24 percent, and making peer-to-peer transfers, at 22 percent. This level of awareness is somewhat surprising considering that fewer than 10 percent of merchants have NFC-capable POS terminals in place.


Back to Top

Security Section

A recently released report from IBM attributes some 95% of IT security breaches to human error. The computing giant's recent Security Services 2014 Cyber Security Intelligence Index report states that 38% of attacks involve malicious code, 20% are based upon probes/scans, 19% involve unauthorized access, 12% are categorized as suspicious activity, 9% involve credentials abuse, while 2% comprise of Denial of Service (DOS) attacks.

Exabeam announced a new user behavior security technology which adds a layer of user behavior intelligence on top of existing SIEM and log management repositories. Exabeam says that their platform provides access to real-time insights that tell users which indicators to look for in order to spot malicious behaviors. The software features session tracking of all user activities across multiple dimensions, from entrance to exit of the IT environment, regardless of the IP, devices and accounts used. It also comes with risk scoring to help quantify the security importance of the anomaly, taking into consideration key security data, such as user access, assets priority and threat intelligence.

CUNA has launched a new website designed to entice consumers into calling on Congress to hold retailers accountable for data breaches. The website urges Congress to take action by passing data security legislation. According to CUNA, members are often under the impression that their credit union suffered a data breach when they receive a new card, but current regulations prevent credit unions from disclosing the exact reason for reissuing a card that was compromised in a breach.


Security Section Sponsored by


We Will Pay Your Crypto-Ransom If You Get Hit With Ransomware

Question: With ransomware like CryptoLocker on the rise, what’s your only real defense against malware attacks… no matter what security software you’re using?

You know the answer: Training your employees how to recognize ‘red flags’ so they will be constantly alert to the threat.

Well, who better to train them than the man who was once the world’s most-wanted hacker?

You know the answer to that, too: No one. You need to do security awareness training to be compliant, so why not use the most effective program there is?

And, at KnowBe4, we’re so confident in the effectiveness of our Kevin Mitnick Security Awareness Training Program, we offer you a guarantee: If your employees have been through our training and you still get hit with ransomware, we’ll pay your ransom in Bitcoin while you’re a customer.

Sound good? Of course it does.

Learn more about our training and our guarantee, and find out just how affordable our program is for your credit union. Ask for your quote TODAY.

KnowBe4. Human error. Conquered.



Back to Top

Leaders Roundtable

Core Systems:

Using Core Systems to Enable Superior Financial Performance


Business Performance Innovation (BPI) Network -
Read Dave Murray's comments:

Celent -
Read Stephen Greer's comments:

Read Michael Nicastro's comments:

CU Answers

D+H -
Read Tom Berdan's comments:

Enhanced Software Products -
Read Matt Lefler's comments:

Share One -
Read Teri Van Frank's comments:

VSoft Corporation -  
Read Jon Barnard's comments:


Back to Top

Technology and Marketing

Velocity Solutions recently launched a program that allows credit unions to continue to offer free checking to their members by generating a new revenue stream with no cost to the credit union. The company says that this revenue stream will allow credit unions to keep no-fee checking accounts as an offering, which Velocity`s research has shown is important in marketing to prospective account holders. The revenue source is the My Rewards Premium Debit Card which offers benefits and services normally associated with elite credit cards. Cardholders enjoy benefits such as emergency roadside assistance, medical evacuation, prescription savings, extended warranty, local discounts and the ability to earn bonus cash back or points that can be redeemed for rewards such as electronics, household items, vacations, etc. The product is priced at $9.95 per month for a Gold Debit Card or $14.95 per month for a Platinum Debit Card.


Back to Top

Online Banking/E-Commerce/Website Design

Javelin Strategy & Research forecasts that only 29 percent of credit cards and 17 percent of debit and prepaid cards will be EMV-enabled in December 2015, while 53 percent of point-of-sale terminals will support EMV. Currently they say that just 1.5 percent of an estimated 1.2 billion U.S. payment cards are equipped with an EMV chip, and 10 percent of merchant terminals are EMV-enabled. In general, the research firm believes that the US is unprepared for the Oct. 15, 2015, fraud liability shift to non-compliant parties.

Oberthur Technologies announced that it is launching what they are calling the first payment card that integrates dynamic Card Verification Value/Code (dCVV/dCVC) technology from NagraID Security. The CVV/CVC or security code is a 3 or 4-digit code usually printed on the back of a payment card, next to the signature panel. With this new technology, this static printed code is replaced by a mini-screen that displays a code which is automatically refreshed according to an algorithm loaded in a chip embedded in the plastic. The refresh timing is defined by the card issuer. The company states that if stolen, the card information including this dCVV/dCVC immediately loses any value for fraudsters who usually resell stolen card data on “dark websites” to people who buy them to perform fraudulent online purchases.


Online Banking Sponsored by


PSCU - The Nation's Leading CUSO

We offer leading edge eCommerce Solutions:

* Electronic Banking

* Mobile Banking

* Online Bill Pay

* Remote Deposit Capture

Contact us today:

(800) 443-7728


Back to Top

Internet Access

iWAN is Cisco's implementation of PfR (Performance Routing) which is designed to deliver intelligent path control for application-aware routing across the WAN. PfRv3 brings centralized management for the entire domain, whereas each hub and branch location had to be administered independently in PfRv2. PfRv3 also includes a number of application-specific templates for applications, such as voice, video, and even custom applications.

Fourteen mega-banks and broker-dealers, including Goldman Sachs, have formed a holding company called Symphony Communications that will be looking to make Instant Messaging more secure. They purchased Perzo, a secure-messaging startup, to assist in their efforts. Many analysts agree that there is a real liability and risk to using instant messaging, and Symphony is looking to address this by their technology that features multiple layers of security to protect consumers' data, including encryption at the end-user level. Messages are sent using the https protocol, and when data arrives at the institution's data center, the software encrypts the message yet again. Encryption keys will be stored on the user's device or in a company vault.


Internet Access Sponsored by
Ongoing Operations


Ongoing Operations - The Credit Union Movement's Top BCP & Technology (Cloud) Provider

Always-On Production Connectivity typically includes:

* Internet Connectivity

* Core System Connectivity

* Credit Union Connectivity

* Credit Card Processor

* Debit Card Processor

* ATM Processor

* Online Banking Provider

* Fedline / Federal Reserve Connectivity

* Enterprise Grade Firewall

* Intrusion Detection System


Contact us today:

This email address is being protected from spambots. You need JavaScript enabled to view it.


visit our blog for the latest BC/DR news:


Back to Top

Call Centers

Plantronics has launched new headsets and software designed for the contact center. The company says that their EncorePro 500 Series features a professional grade industrial design that uses new materials and technologies to provide an ergonomic fit that is durable, lightweight, and comfortable for all-day wearing. Noise-canceling technology reduces background noise, and the models support wideband audio. Supported by the Plantronics Hub, each model contains firmware that can generate notifications based on hardware state changes, enabling efficiencies such as automation of agent status updates and screen-locking when a headset is disconnected.