Your source for the latest technology information of interest to credit unions across America.

Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

Credit Union Technology Talk Logo

January 5, 2015

~ This Week's News is Sponsored by Better Branches ~


General News  

* MVi Reaches Laserfiche Milestone
* Ocala Community CU Selects CU*South
* Alaric Updates Fraud Software
* Sharetec Adds 13 CUs in 2014

Being the preferred Laserfiche VAR (value-added reseller) for credit unions, Millennial Vision Inc., a document management provider and reseller of Laserfiche Enterprise Content Management Software (ECM), has reached the $1 million dollar sales milestone for 2014. The Salt Lake City-based company cited particular interest in Laserfiche Workflow and Laserfiche Forms as essential to the firm`s success.

Ocala Community Credit Union has selected CU*South, a credit union-owned cooperative, as their new core processing provider. Ocala Community Credit Union will be converting to CU*South`s CU*BASE core platform in mid-2015.

Alaric, an NCR Corp. business, has released a new version of its Fractals intelligent fraud detection solution that incorporates new features and enhancements. The new release includes cross-product, cross-channel, enterprise fraud detection and prevention features.

Sharetec System, one of the fastest growing core systems, added 13 new credit unions to their client list in 2014. Sharetec, a provider of both in-house and service bureau core solutions, has nearly 300 core credit unions and has grown 67% since the year 2000.



Credit Union InfoSecurity Conference Sponsored by
imsmartin consulting

 The 13th annual CU InfoSecurity Conference will be held June 3 - 5, 2015 in Las Vegas.

This is a one-of-a-kind conference - a security conference dedicated solely to credit unions. Highly experienced, expert speakers discuss the latest security trends as they specifically apply to credit unions. Also included is a virtual tour of F&A Federal Credit Union and a presentation by Alloya Corporate FCU. The CU InfoSecurity Conference is the only conference in the credit union movement that includes two nights lodging in a deluxe room as part of the already incredibly low price: just $595 per attendee and $495 for returning attendees. Topics include:

* Ransomware
* Securing VMs
* Cloud Security
* Breach Prevention
* Pervasive Security
* Device Configuration
* Compliant Social Media
* Transparent Encryption
* CU Virtual Security Tour
* Securing Virtual Branches
* Network Security Strategies

* Account Takeover Prevention

Click Here for information, agenda, reservations & more.

Also includes a behind-the-scenes tour of Zappos Headquarters - don't miss it!



Hardware News

Dell SonicPoint AC Series wireless access points combine high performance 802.11ac wireless technology with next-generation firewalls. SonicPoint Ace models feature dual radios, six external removable antennas, 802.11ac support and power through either an 802.3at Power over Ethernet (PoE) Injector or an AC adapter. Meanwhile, the SonicPoint ACi models come with internally housed antennas, dual radios, 802.11ac support, and are run via PoE.

Laptops no longer come with serial ports, but many enterprise network devices require that you perform the initial IP address setup via a serial console. The RN-240 Firefly Bluetooth serial adapter from Roving Networks is a handy device that solves this problem. You plug this device into a switch, router, etc and then you can work comfortably outside the telco closet or across the room. 


Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)


Back to Top

Software Updates

Paragon Software Partition Manager is a bootable CD tool. Partition Manager 14 Professional runs $79 and allows you to re-partition your virtual hard drives without booting your virtual machine. It can also be used to clone a drive in a laptop before it goes to repair, plus this software is able to resize and combine partitions onto larger drives.

Auslogics Duplicate File Finder is a no cost tool that features an easy-to-use interface that makes it simple to find and select duplicate files you want to delete. Just make sure that when you install the software that you uncheck the "Free Search Offer by Spigot" option.



Software Updates Sponsored by
Raddon Financial Group (RFG)

Back to Top


Blue Ridge Networks offers their AppGuard solution for ATM deployers. The company says that their system prevents exploits from known and unknown threats using patented isolation and containment technologies. According to the company, AppGuard prevents unauthorized scripts or malware from executing a first-stage attack on the ATM or running malware from a USB stick or CD-ROM used for maintenance. They recently formed a partnership with NuSource Financial to incorporate AppGuard security on ATMs.

The ATM Connectivity Coalition was recently formed by founding organizers Contour Networks, The DPL Group and OptConnect. These three ATM wireless technology providers formed the organization in order to form standards in security, connectivity and stability for wirelessly connected ATMs. The founders envision that the new coalition will engage with ATM and related hardware manufacturers, additional wireless network providers, host ATM processors and others.


ATMs/Kiosks Sponsored by
Heritage Industries

Back to Top

CU Success Stories  


Here is a chance to learn about real life credit union success stories from various technology vendors through the words of their clients. This week's vendor is:  

Enhanced Software Products (ESP)


and their client is:

Ukrainian Selfreliance New England FCU

Credit Unions - if you have a vendor that you are happy with then please This email address is being protected from spambots. You need JavaScript enabled to view it.!

Vendors - if you have a credit union that is happy with your solutions then please This email address is being protected from spambots. You need JavaScript enabled to view it. and we will give you a $100 discount on your Case Study!


Back to Top

Wireless World

The wearable computing trend is expected to explode in the near future, as global wearable device shipments will increase more than 400 percent by 2017, reaching 116 million units, according to Juniper Research. PayPal is one company that is prepared - they have aggressively ramped up their adoption of wearable devices, especially the fast-growing range of smartwatches. It supports the Pebble, Android Wear and Samsung Gear smartwatch platforms. A company spokesperson said "ultimately, the ability to pay or be paid can be embedded everywhere."

According to a Bain and Company survey, consumers now handle more of their banking interactions, on average, via smartphones and tablets than through any other channel. Their survey of 83,000 consumers in 22 countries found that mobile is the most used banking channel in 13 countries and accounts for around 30% of all interactions worldwide. The share of consumers using a using a FI`s mobile app rose 19 percentage points during 2014, with strong increases across all age groups in most markets.


Back to Top

Security Section

Acuity Market Intelligence is predicting that there will be an intensifying consumer demand for smart phones, tablets, and wearable mobile devices that incorporate biometrics in the years ahead. They forecast a global market of 2.5 billion users with nearly 4.8 billion biometric devices by 2020. Acuity projects that embedded fingerprint sensors will initially dominate the market becoming standard in smart phones and tablets by 2017. The research firm also believes that emerging biometric sensors that rely on an individual`s pulse, skin texture, or other yet unknown metrics will evolve rapidly, especially on wearables.

Doors.NET is Keri's software application to manage various access control hardware platforms, such as wireless locks from Assa Abloy and Allegion/Schlage. The company says that organizations can use their Keri electronic access control system to instantly lock down their facility to stop or minimize the damage caused by any troublemakers. The system can be configured to react in the following modes:

  • Global Lock - All doors lock, but authorized credentials/cards are still allowed access, and egress is permitted.
  • Lockout - All doors are immediately locked, authorized cards no longer work, but egress is still permitted.
  • Lockdown - All doors lock, cards no longer gain access, and egress is not allowed except where a mechanical exit device such as a crash bar exists.


Back to Top

Leaders Roundtable


Meeting the Challenges of Attacks, Breaches & Compliance

Alloya Corporate FCU - http://www.alloyacorp.org
Read Biff Myre's and Ron Schlecht's comments:

CatchFire Creative - http://catchfirecreative.com
Read Drew Schulthess' comments:

D+H - http://www.dh.com
Read Jeff Marshall's comments:

Easy Solutions - http://www.easysol.net
Read Daniel Ingevaldson's comments:

eScope Solutions - http://www.escope.net
Read Dean Marshall's comments:

Horsetail Technologies - http://www.horsetailtech.com
Read Mark Berman's comments:
HyTrust - http://www.hytrust.com
Read Hemma Prafullchandra's comments:
IMM - http://www.immonline.com  
Read John A. Levy's comments:

Info@Risk - http://www.infoatrisk.com
Read David Trepp's comments:
https://www.cunews.com/This email address is being protected from spambots. You need JavaScript enabled to view it.

Ingalls Information Security - http://www.iinfosec.com
Read Russell “Rusty” Wilson's comments:

Millennial Vision - http://www.mviusa.com
Read Scott Cowan's comments:

Hyland Software - http://www.onbase.com
Read Steve Comer's comments:

PhishLabs - http://www.phishlabs.com
Read Stacy Shelley's comments:

Rallypoint Solutions - http://www.rallypoint.us.com
Read Kris Zupan's comments:

SilverSky - http://www.silversky.com
Read Andrew Jaquith's comments:

Xamin - http://www.xamin.com
Read Erik Gustafson's comments:


Back to Top

Technology and Marketing

TriggerMail provides software that helps marketers implement automated and personalized behavior-based triggered email campaigns. The company`s motto is "It's not about more email, it's about better email." In action, their software plugs into your website via JavaScript. They offer numerous email "recipes" that represent best email practices, and each recipe represents a different member touchpoint, based on the category, brand or prices of products your member engages with. Their recipes include Window Shopping, Category Clustering, Brand Clustering and many more. Once set up, TriggerMail then automates the process of creating and distributing emails, dynamically reacting to member behaviors.


Back to Top

Online Banking/E-Commerce/Website Design

Although the shift to EMV chip-and-PIN cards next fall will help secure retailers against fraudsters, some observers are worried that financial institutions will become more significant targets. Javelin Strategy & Research analyst Al Pascual envisions increased threats focused on new account opening and account takeover fraud. Additionally, many experts are convinced that online, card-not-present fraud will grow due to the fact that EMV does not help in protecting online purchases.

Although investment in Bitcoin has grown substantially since 2012, an Aite Group analyst says that the crypto-currency is “solving a commerce problem that the vast majority of consumers simply don`t have.” Although Bitcoin boasts ease of use, it is no easier than credit cards and offers none of plastic's consumer safeguards. Aite Group analyst Nathalie Reinelt cites considerable consumer risks inherent in the virtual currency, including a lack of asset insurance that makes users vulnerable to risk of loss. She contends that the best use Bitcoin case for consumers is for cross-border remittances.


Online Banking Sponsored by



IMM - The Nation's Leading eSignature, Workflow & Teller Provider


The industry’s leading “end-to-end” eSignature platform that integrates with all business applications, provides flexible eSigning options, and seamless archival into Imaging/ECM repositories.


Differentiate your eSignature solution with industry unique business-rules driven workflow automation.  Control and enforce critical eSignature business operations, processes and tasks.



Innovative electronic receipt and check 21 teller capture solutions that streamline teller processes and reduce costs, while enhancing the consumer experience and eliminating paper-generation.



Contact us today:

(800) 836 - 4750

Back to Top

Internet Access

There are basically three ways to virtualize networks and networking devices:

1) Network Virtualization (NV) 2) Network Functions Virtualization (NFV) 3) Software-Defined Networking (SDN)

Network Virtualization is the ability to simulate a hardware platform - in this case a network appliance - in software, while Network Functions Virtualization is NV on steroids. Rather than control a network platform, NFV controls network functions such as network address translation, firewall, and intrusion detection. Software-Defined Networking is the next evolution in that it controls the entire network. Network Functions Virtualization is highly complementary to Software Defined Networking, but not dependent on it or vice-versa, although the two concepts and solutions can be combined.

AT&T is working with Cisco on a cloud-based, video collaboration service that will be available for almost any device. Meanwhile, Sprint announced a cloud-based audio conference service called UberConference from Switch Communications, which is run by a group of former Google employees, including the principle creator of Google Voice.


Internet Access Sponsored by
Ongoing Operations


Ongoing Operations - The Credit Union Movement's Top BCP & Technology (Cloud) Provider

Always-On Production Connectivity typically includes:

* Internet Connectivity

* Core System Connectivity

* Credit Union Connectivity

* Credit Card Processor

* Debit Card Processor

* ATM Processor

* Online Banking Provider

* Fedline / Federal Reserve Connectivity

* Enterprise Grade Firewall

* Intrusion Detection System


Contact us today:

This email address is being protected from spambots. You need JavaScript enabled to view it.


visit our blog for the latest BC/DR news: http://ongoingoperations.com/blog/


Back to Top

Call Centers

More than 2.1 million people work in U.S. call centers, and increasingly more and more of them are working from home. Remote workers must enjoy working alone and be able to manage their time well. In general, the at-home agent model attracts more educated and experienced individuals, but contact center experts recommend that recruiters also look for technically savvy people. That is because Virtual agents don`t have the benefit of supervisors, peers and technical support staff right around the corner. Virtual chat rooms can help bridge the gap when near real-time communication is required, but that may not be adequate in some circumstances, so these agents must be able to effectively troubleshoot technical problems themselves.