Your source for the latest technology information of interest to credit unions across America.

Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

Credit Union Technology Talk Logo

June 1, 2015

~ This Week's News is Sponsored by Better Branches ~


General News  

* PSCU Certified for EMV Debit
* CU*Answers and MidUSA CU Deliver 3D Telepresence
* Fox-IT Launches DetACT
* MemberClose Adds 4 New CUs

PSCU, the nation`s largest CUSO, is now certified to issue EMV debit cards on First Data`s Debit Solutions Platform. The St. Petersburg, FL-based CUSO will begin deploying the cards in June via its 800+ member-owner credit unions across the country.

CU*Answers, the West Michigan-based cooperative CUSO, is bringing the three dimensional telepresence experience to credit unions via their partnership with Buffalo Pacific. One of the first credit unions to use the technology is $194-million MidUSA Credit Union, a 15,000 member CU based in Dayton, OH, who is using the tech in concert with CU*Answers to enhance their ongoing education curriculum.

Cybersecurity provider Fox-IT has launched its Web and mobile event analytics platform DetACT for the U.S. financial services industry. The company says that their technology correlates click-path, event information, traffic information, financial information and historical information in real time and thereby protects Web and native mobile channels for credit unions.

MemberClose, a provider of a bundled mortgage settlement solution for credit unions that began in 2004, said it has added four CUs to its client list. The four new clients, all of which are based in Connecticut, are:

- $184 million GE Credit Union, Milford

- $73 million Northeast Family FCU, Manchester

- $39 million Torrington Municipal & Teachers FCU, Torrington

- $35 million Healthcare Financial FCU, New Haven



Credit Union InfoSecurity Conference Sponsored by
imsmartin consulting

 The 13th annual CU InfoSecurity Conference will be held June 3 - 5, 2015 in Las Vegas.

This is a one-of-a-kind conference - a security conference dedicated solely to credit unions. Highly experienced, expert speakers discuss the latest security trends as they specifically apply to credit unions. Also included is a virtual tour of F&A Federal Credit Union and a presentation by Alloya Corporate FCU. The CU InfoSecurity Conference is the only conference in the credit union movement that includes two nights lodging in a deluxe room as part of the already incredibly low price: just $595 per attendee and $495 for returning attendees. Topics include:

* Ransomware
* Securing VMs
* Cloud Security
* Breach Prevention
* Pervasive Security
* Device Configuration
* Compliant Social Media
* Transparent Encryption
* CU Virtual Security Tour
* Securing Virtual Branches
* Network Security Strategies

* Account Takeover Prevention

* Intelligence Driven Cyber Security

Click Here for information, agenda, reservations & more.

Also includes a behind-the-scenes tour of Zappos Headquarters - don't miss it!

sponsored by Ongoing Operations



Hardware News

Brother's Business Smart Pro MFC-J6925DW features full 11" x 17" capabilities (print/copy/scan/fax), dual paper trays and ships with high yield INKvestment cartridges. The all-in-one device features fast print speeds: up to 22ppm black / 20ppm color. Meanwhile their INKvestment cartridges provide less than $0.01 black cost per page and less than $0.05 color cost per page.

Panasonic`s True 4K surveillance cameras feature a responsive 12 megapixel 4K ULTRA HD sensor that produces a 12MP image at 15fps and a 4K2K image at 30fps for very high resolution at standard frame rates. The enhanced resolution of True 4K can cover a four times wider view compared to a 1080p full HD camera. Meanwhile Panasonic`s new ULTRA 360 camera comes with advanced business intelligence capabilities such as heat mapping, people counting and moving object removal. The ULTRA 360 doubles the resolution of previous generation 360 cameras, producing a 9MP 3K x 3K Fisheye image at 15fps and a 4MP Fish-eye image at 30fps.

Lenovo announced the addition of two new SAN storage arrays to its lineup geared towards smaller organizations. The S2200 and the S3200 offer single or dual controllers in a 2U form factor with 12- and 24-drive bay configurations. The S2200 supports up to 96 total drives, while the S3200 supports up to 192 drives. Both systems support Fibre Channel, iSCSI and SAS for full connectivity. In addition, the S3200 supports multi-protocol connectivity, allowing simultaneous use of Fibre Channel and iSCSI. Stored data that is used most frequently moves to the highest performing drives every five seconds, and both arrays offer Rapid RAID Rebuild, which minimizes recovery time when rebuilding the RAID array. 


Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)


Back to Top

Software Updates

Analytics tools are starting to become more affordable for credit unions. Instead of taking days or even weeks to develop a model and produce a result, predictive analytics can often reduce that time to minutes. Cloud-based analytics services can quickly analyze both internally generated data and external information. Another use case is risk analysis, e.g., one FI claims that cloud analytics enabled them to cut the time it needed for risk analysis from 23 hours to under an hour.

SolarWinds has updated their Web Help Desk software to help IT Departments more easily track multiple related tasks for automated business processes. In addition to help desk software, the package comes with IT asset management with built-in asset discovery, tracking and reporting. The package starts at $695.



Back to Top


Nearly one thousand FIs support Apple Pay and more and more merchants are getting onboard as well. Now the kiosk industry is getting behind the payment as well: by some estimates Apple Pay is now integrated into more than 200,000 devices in a wide variety of kiosks. Analysts say that consumers are not only growing more comfortable with mobile payments, they also expect to be able to interact with kiosks and other devices through their phones.

A study by Dieringer Research Group found that 74 percent of customers said that convenience of ATM locations was important in selecting a financial institution. Yet many deployers do not actively market and brand their machines even though effective branding calls attention to the machine and helps increase traffic. A strong visual identity can help promote usage — even with non-members — and positively impact the credit union's brand. Digital signage is one method of promoting ATMs and consumers seem to prefer it because a study by Stratacache showed that 77 percent of those surveyed felt that ATM deployers that use digital signage are more innovative than those that don't offer screens with their machines.


ATMs/Kiosks Sponsored by
Heritage Industries

Back to Top

CU Success Stories  


Here is a chance to learn about real life credit union success stories from various technology vendors through the words of their clients. This week's vendor is:  



and their client is:

New England Federal Credit Union

Credit Unions - if you have a vendor that you are happy with then please This email address is being protected from spambots. You need JavaScript enabled to view it.!

Vendors - if you have a credit union that is happy with your solutions then please This email address is being protected from spambots. You need JavaScript enabled to view it. and we will give you a $100 discount on your Case Study!


Wireless World Sponsored by
Member Access Pacific (MAP)



The MAP App™ is the first network-branded prepaid card exclusively serving credit unions to offer mobile banking -
contact us now to learn more about this market-leading innovation for credit unions:

(866) 598 - 0698

Back to Top

Wireless World

Google announced that Android Pay will roll out when Android M is released later this year. It uses a “virtual card number” — otherwise known as tokenization, and will work at over 700,000 stores in the U.S. Google's open API, unlike a proprietary API, paves the way for more developers to build payments functionality into their own apps, including mobile banking apps. AT&T, Verizon and T-Mobile will pre-install it and consumers won`t need to re-enter payment information if they switch between these carriers. Finally, merchant rewards are already a part of Android Pay, and they will even allow select retailers to integrate their own rewards programs with Android Pay, according to Google.

Celent has released a new report titled “State of Remote Deposit Capture 2015: Mobile Is the New Scanner.” The report states that as check usage declines, mobile RDC is becoming the preferred deposit method for a growing number of consumers. Celent expects RDC to account for a third of retail FI deposits by year-end 2015 and half by 2016. While most distributed capture methods (e.g., branch capture, image ATM, and merchant capture) have plateaued, mobile RDC continues to grow. Some 2,100 FIs went live with mobile RDC and added more than 23 million new end users, Celent estimates.


Back to Top

Security Section

SMS PASSCODE offers a sophisticated multi-factor authentication solution to secure remote access for employees and vendors. The system employs adaptive authentication that determines whether users are logging in from trusted locations (such as home or the office, versus an airport lounge with public Wi-Fi), and delivers the appropriate level of security. Employees use their mobile phones and the software takes advantage of contextual information such as time, geo-location and type of login system being accessed. The solution secures remote access systems including Microsoft, Citrix, Cisco and Checkpoint.

Network traffic analysis - if effectively deployed - can greatly increase a credit union's overall security posture. Even network card vendors are looking to help secure networks. For example, vendors like Emulex and Solarflare can capture and process data at the NIC card level based upon rules and triggers. This capability can help IT teams quickly filter through network noise so they can focus their investigations in the most relevant areas.


Back to Top

Leaders Roundtable


Meeting the Challenges of Attacks, Breaches & Compliance

Alloya Corporate FCU - http://www.alloyacorp.org
Read Biff Myre's and Ron Schlecht's comments:

D+H - http://www.dh.com
Read Jeff Marshall's comments:

Easy Solutions - http://www.easysol.net
Read Daniel Ingevaldson's comments:

eScope Solutions - http://www.escope.net
Read Dean Marshall's comments:

Horsetail Technologies - http://www.horsetailtech.com
Read Mark Berman's comments:
HyTrust - http://www.hytrust.com
Read Hemma Prafullchandra's comments:
IMM - http://www.immonline.com  
Read John A. Levy's comments:

Info@Risk - http://www.infoatrisk.com
Read David Trepp's comments:
https://www.cunews.com/This email address is being protected from spambots. You need JavaScript enabled to view it.

Ingalls Information Security - http://www.iinfosec.com
Read Russell “Rusty” Wilson's comments:

KnowBe4 - http://www.knowbe4.com
Read Stu Sjouwerman's comments:

Millennial Vision - http://www.mviusa.com
Read Scott Cowan's comments:

Hyland Software - http://www.onbase.com
Read Steve Comer's comments:

PhishLabs - http://www.phishlabs.com
Read Stacy Shelley's comments:

Q2 - http://www.q2ebanking.com
Read Jay McLaughlin's comments:

Rallypoint Solutions - http://www.rallypoint.us.com
Read Kris Zupan's comments:

SilverSky - http://www.silversky.com
Read Andrew Jaquith's comments:

Xamin - http://www.xamin.com
Read Erik Gustafson's comments:


Back to Top

Technology and Marketing

Twitter Cards, which are a core feature of Twitter`s platform, allow organizations to add photos, videos and a richer media experience to tweets. Some analysts contend that marketers should use them as a way to boost their business by piquing interest, promoting brand awareness and driving traffic. Currently, Twitter offers six card types with varying features and characteristics. When you include a URL in a tweet, Twitter`s system crawls that site to fetch the card type and content that will be displayed in an expanded window on users` timelines.


Back to Top

Online Banking/E-Commerce/Website Design

The most recent Insight Report from Mercator Advisory Group's CustomerMonitor Survey Series in its Primary Data Service reveals that more U.S. adults than in previous years are using online banking, but fewer are using their computers to do so. That digital channel, while now primarily computer-based, is shifting toward mobile devices, as more consumers prefer to make transactions using their smartphones (17% in 2014, up from 13% in 2013) and fewer prefer to transact on their desktop or laptop computers (74% in 2014, down from 78% in 2013). Young adults appear to be driving much of the shift to mobile, the millennials (aged 18–34) being even more likely than average to prefer to use smartphones (26%) and tablets (12%) and less likely than average to prefer computers (63%) to make transactions.

Ripple, the payment system, currency exchange and remittance network by Ripple Labs, looks to improve the efficiency of payments. The Ripple distributed payment network has a native digital currency called XRP but can also handle regular or fiat currency. After Bitcoin, Ripple Lab's XRP is currently the second largest digital currency by market capitalization. Commonwealth Bank of Australia plans to use the Ripple distributed network to transfer payments between subsidiaries as a controlled environment test to see how internal transfers work using crypto rather than existing payment providers.


Back to Top

Internet Access

A new WhiteHat Security report on Web vulnerabilities revealed that 35% of finance and insurance sites are always vulnerable, meaning sites had at least one serious vulnerability exposed every single day of the year. The report was generated by examining vulnerabilities of more than 30,000 websites under WhiteHat Sentinel management, and found that:

  • 86% of all websites tested had at least one serious vulnerability, and most of the time, far more than one – 56% had multiple
  • On average, 61% of these vulnerabilities were resolved, but doing so required an average of 193 days from the first customer notification
  • Insufficient transport layer protection is the most likely vulnerability across vertical industries including retail trade, health care/social assistance, information technology and financial/insurance, with a range of 65-76% likelihood

According to a new report by the Anti-Phishing Working Group (APWG), the number of domain names used for phishing has reached an all-time high. The study found that in the second half of 2014, the median uptime of phishing attacks increased to 10 hours 6 minutes -- up from 8 hours and 42 minutes in 1H2014. This means that phishing attacks were not being shut down as efficiently in the critical first hours, when most victims fall prey.


Back to Top

Call Centers

NICE and Vidyo have integrated the NICE Engage Platform, a recording and analytics solution that supports real-time engagement, with VidyoWorks. The companies say that their integrated solution is designed to help assure regulatory compliance at financial institution call centers. The combined NICE-Vidyo offerings features:

- Deployments on premise or in a SaaS model

- Support for existing audio recording infrastructure when implementing the video channel

- Integrated video recording into the company`s existing workflows and business procedures