Your source for the latest technology information of interest to credit unions across America.

Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

Credit Union Technology Talk Logo

May 30, 2016

~ This Week's News is Sponsored by Better Branches ~



General News  

* Fiserv Integrates with Zementis
* PayActiv Garners Award at Finovate
* Camino FCU Chooses Bluepoint
* Numerica CU Selects Baker Hill

Fiserv, a leading global provider of financial services technology solutions, announced that it will speed the use of new fraud detection models for clients using its Financial Crime Risk Management Platform by integrating the ADAPA solution from Zementis. Fiserv will include ADAPA with implementations of AML Risk Manager, Check Fraud Manager, Payment Fraud Manager and Customer Risk Manager.

PayActiv, a provider of turnkey, employer-sponsored financial wellness solutions, was among the six companies selected as Best of Show, out of 72 companies demoing at FinovateSpring 2016. PayActiv`s solutions help promote financial wellness to assist the 90 million U.S. workers living paycheck-to-paycheck. Employees able to access their earned but currently unpaid income with zero interest rate, and are also able to pay bills, access cash and start saving.

Bluepoint Solutions announced that Camino Federal Credit Union will deploy both the FASTdocs suite, for enterprise content management, and the ImagePoint suite, for end-to-end item capture and processing. FASTdocs, including File Import Studio and WebShare, will give the $140M assets credit union a single repository for all member-related content, and they will use ImagePoint Teller, ATM, and QwikDeposit ToGo to integrate in-branch teller capture with member-facing capture at image-enabled ATMs, and through their mobile banking app.

Baker Hill, a leading provider of technology solutions for common loan origination, relationship management and smart data analytics, announced that Spokane Valley, WA-based Numerica Credit Union has selected its Bank2Business solution to support the development of the member business lending segment within its portfolio. Numerica currently uses Baker Hill`s Exception Advisor risk management tool and decided to expand the existing relationship to accommodate its business lending process needs.




Hardware News

According to IDC, about 90% of the world`s data is considered “cold data,” which means it is accessed infrequently after capture which makes it a good candidate to be stored on traditional hard disk drives (HDDs). The remaining 10% of the world`s data is hot, meaning it is captured and accessed frequently which in turn makes it a great candidate for storage on solid state drives (SSDs). Tiered storage architectures, where each class of storage provides unique performance qualities that are best-suited to the data in that tier, feature various tiers:

- CPU cache and in-memory processing from the “hottest” tier, with small amounts of data in flight

- PCIe NVMe SSDs to handle hot data spilled from memory to storage

- MLC Serial ATA (SATA) SSDs for the warm tier

- HDDs for cold data since this offers the lowest cost per gigabyte

Brother's MFC-J985DW printers are designed for small offices - business-capable features include automatic two-sided printing, up to 20 sheet ADF, and wireless and mobile device connectivity. The MFC-J985DW prints a black and white page for less than a penny and color pages for less than a nickel. It comes with a two year limited warranty with free phone support for the life of the product. 


Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)


Back to Top

Software Updates

IBM Spectrum Protect, formerly Tivoli Storage Manager, provides advanced data backup and data recovery for virtual, physical, cloud and software defined environments. It delivers file, block and object data protection and integrates with VMware and Hyper-V. It also features incremental forever backups, enterprise management, journal-based backups, policy based, copy storage pools, deduplication and node replication.

CipherPost Pro Secure E-signature is AppRiver`s new secure electronic signature offering which integrates directly into Microsoft Outlook, Microsoft Office 365 and other web-based email clients. The company says that their solution provides an alternative to costly and inefficient signing and transmission of paper documents with a simple “click-to-acknowledge” way to e-sign documents right in email. The company states that their package delivers real-time activity alerts and timeline insights and provides instant verification. They offer a complimentary, fully functional 30 day trial.


Back to Top


MasterCard's October 2016 ATM liability shift could mean that somewhere between 10 percent and 40 percent of all U.S. retail ATMs will cease operations. Some observers are estimating that this translates into between 25,000 and 100,000 American ATMs that will be taken out of service. Some are so old that they may just be able to be used for parts before being sent to the scrap yard, while others may find new lives as refurbished EMV-compliant ATMs.

Discovered in 2009, Skimer was the first malicious program to target ATMs, and now a revised version is making a comeback according to Kaspersky Lab. Scammers install the malware either through physical access, or via the FI`s internal network which then allows them to withdraw all the cash in the ATM or pilfer the data from cards used at the ATM, including a user`s account number and PIN. Kaspersky Lab has identified 49 modifications of the Skimer malware, with 37 of these modifications targeting one major ATM manufacturer. To prevent this threat, Kaspersky Lab recommends undertaking regular AV scans, accompanied by the use of whitelisting technologies, a good device management policy, full disk encryption, protecting the ATM`s BIOS with a password, allowing only HDD booting and isolating the ATM network from any other internal credit union network.

At the recent Banknote Conference, attendees and vendors were discussing new security concepts. Giesecke & Devrient was one company that was proposing new security schemes based on magnetism or electrical conductivity, as well as features that would only be visible in UV or polarized light. Another anti-counterfeiting technique was a registered security thread dubbed "Registered RollingStar," which allows new effects and designs to be used on security laminating film. Finally, "micromirror" and "ColourShift" technologies may help create new optically variable effects that will deter counterfeiters.


ATMs/Kiosks Sponsored by
Heritage Industries

Back to Top

CU Success Stories  


Here is a chance to learn about real life credit union success stories from various technology vendors through the words of their clients. This week's vendor is:  

Member Business Solutions


and their client is:

South Carolina Federal Credit Union

Credit Unions - if you have a vendor that you are happy with then please This email address is being protected from spambots. You need JavaScript enabled to view it.!

Vendors - if you have a credit union that is happy with your solutions then please This email address is being protected from spambots. You need JavaScript enabled to view it. and we will give you a $100 discount on your Case Study!


Back to Top

Wireless World

Beaming technology enables POS (point of sale) laser scanners to read barcodes on mobile devices. This is important because about $5 billion worth of coupons are redeemed at checkout to partially pay for items. Mobeam says that their solution allows smartphones to communicate reliably and securely with the world's laser scanners enabling a true mobile wallet experience with support for barcode gift card, loyalty card & coupon payments. Mobeam technology allows laser scanners to read 1D barcodes from mobile devices, using patented technology that sends pulses of light to the sensor in scanners mimicking the black-and-white sequencing of standard barcodes. Users hold the smartphone screen towards the scanner and it works without a barcode showing on the screen, offering non-reproducible mobile-only offerings.

Mountain America Credit Union is among the first credit unions in the nation to make instant loan application approval available for select loan types submitted through their mobile banking app. Members can apply and receive an instant decision when applying for Visa credit cards, credit line increases, or personal loans. Decisions are based on approved credit. When a loan application is approved through the mobile app, the funds are then immediately available to the member. Visa credit cards can be printed and ready to pick up in a branch location the same day during normal business hours.


Wireless World Sponsored by
Member Access Pacific (MAP)



The MAP App™ is the first network-branded prepaid card exclusively serving credit unions to offer mobile banking -
contact us now to learn more about this market-leading innovation for credit unions:

(866) 598 - 0698

Back to Top

Security Section

IBM is convinced that blockchain technology has the potential to make the financial system more efficient and secure. They are suggesting that the US government replace SSNs with a new blockchain-based system modeled after India's new Aadhaar numbers, which link to biometric and demographic information. Blockchain technology could maintain a detailed audit trail of data, including time stamps and annotations to assure participants of data accuracy, and Big Blue wants the federal government to invest in research to further this technology.

CrowdStrike announced enhanced next-generation antivirus (AV) capabilities to its CrowdStrike Falcon Platform to help customers identify and block ransomware families such as Locky, Cerber and Teerac, among others. The new release also includes introducing an expanded and updated set of APIs for the Falcon Platform, along with CrowdStrike`s new open source tool, CrowdStrike Falcon Orchestrator.

The Anti-Phishing Working Group observed more phishing attacks in the first quarter of 2016 than at any other time in history. There was a 250 percent increase in phishing sites between October 2015 and March 2016, while the total number of unique phishing websites observed in Q1 2016 was a record 289,371. They note that keyloggers that have sophisticated tracking components to target specific information were specifically on the rise in 2016.


Security Section Sponsored by
StrongAuth, Inc.



Back to Top

Leaders Roundtable


Addressing Insider Threats, Cyber Attacks & Data Security


Accellion - http://www.accellion.com
Read Yorgen H. Edholm's comments:


Allied Solutions - http://www.alliedsolutions.net
Read Ann D. Davidson's comments:


Alloya Corporate FCU - http://www.alloyacorp.org
Read Teresa Brent's comments:



Cummins Allison - http://www.cumminsallison.com
Read Dean Theodore's comments:



Easy Solutions - http://www.easysol.net
Read Daniel Ingevaldson's comments:


EnableSoft - http://www.enablesoft.com
Read Richard Milam's comments:


Horsetail Technologies - http://www.horsetailtech.com
Read Mark Berman's comments:


IMM - http://www.immonline.com  
Read John A. Levy's comments:


Info@Risk - http://www.infoatrisk.com
Read David Trepp's comments:
https://www.cunews.com/This email address is being protected from spambots. You need JavaScript enabled to view it.


InfoSight - http://www.infosightinc.com
Read Brian Smith's comments:


KnowBe4 - http://www.knowbe4.com
Read Stu Sjouwerman's comments:


Millennial Vision - http://www.mviusa.com
Read Scott Cowan's comments:


Nintex - http://www.nintex.com
Read Mike Fitzmaurice's comments:


Onbase by Hyland Software - http://www.onbase.com
Read Steve Comer's comments:


Pwnie Express - http://www.pwnieexpress.com
Read Paul Paget's comments:


Securonix - http://www.securonix.com
Read Chris Inglis' comments:


SentinelOne - http://www.sentinelone.com
Read Scott Gainey's comments:


StrongAuth, Inc. - http://www.strongauth.com
Read Arshad Noor's comments:


TruShield - http://www.trushieldinc.com
Read Paul Caiazzo's comments:


Venminder - http://www.venminder.com
Read Aaron Kirkpatrick's comments:


Back to Top

Technology and Marketing

Credit card advocates love to use their cards to obtain rewards, plus they like the deferred payment aspect and the fact that they offer a built-in line of defense from fraud. Some of these proponents think that credit card-issuing credit unions should work harder to reinforce these three advantages, especially to convert debit card users to credit cards. For those members that are nervous about hefty late fees, a robust alerting system can go a long way towards assuaging the common fears that many members may have about forgetting to pay their credit card bill on time and incurring hefty fees. The rewards for the credit union can be greater interchange revenues when credit card volumes go up, while simultaneously possibly saving on cash handling and ATM processing costs.


Back to Top

Online Banking/E-Commerce/Website Design

According to Cisco, there are billions of dollars of "Digital Value at Stake" that financial institutions must create a road map for capturing. Digital solutions that they recommend implementing include video-based advisors, workforce transformation, mobile payments, virtual tellers, information-based consulting, white-label services, and connected ads. Some other digital initiatives potentially include omnichannel capabilities, wealth management and asset transfers, mobile banking and mobile payment capabilities, self-service and virtualized delivery models. However they note that security concerns abound around virtually all of these digital initiatives that often cause them to be delayed or not implemented.

Research firm Aite is predicting a major rise, and then subsequent fall, in US counterfeit card fraud through 2020. Specifically, they anticipate that when the EMV migration is completed in 2020 that counterfeit card will drop from a peak of $4.5 billion to approximately $900 million. The report, entitled “EMV: Issuance Trajectory and Impact on Account Takeover and CNP,” also found that account takeover losses for financial institutions -- when a fraudster poses as a genuine customer, gains control of an account and then makes unauthorized transactions -- will increase from $644 million in 2015 to more than $1 billion by 2020 in the U.S.


Back to Top

Internet Access

Tempered Networks Identity-Defined Network (IDN) solution cloaks and hides your perimeter and transient resources which they say provides baked-in security, micro-segmentation, and resiliency. Their goal is to shift the network trust model from spoofable IP addresses to embedded cryptographic identities. Tempered Networks creates groups of hosts that are allowed to communicate, independently of where or on what LAN the hosts connect, or on how the hosts are interconnected. Hosts can simultaneously be in multiple groups. They call these groups and their trusted communications ‘Identity-Defined Networks` which is an encrypted overlay network that transcends traditional segregation mechanisms, like VLANs, VPNs, MPLS, and addressing schemes, and spans across firewalls, NATs, ISPs, WANs, cellular, etc.

MetTel announced the launch of its enhanced multi-carrier SD-WAN solution that allows organizations with active MPLS networks locked in contracts to access the benefits of SD-WAN through their layer 3 backbone network connections, when normally they would have to wait until end of contract to benefit from this new technology. They claim that their platform increases bandwidth by up to 400%, and includes these benefits as well:

- helps eliminate downtime

- gains faster access to the cloud

- helps improve voice quality

- combines bandwidth such as DSL, Cable and 4G LTE into a single connection

- simplifies branch deployments with cloud-based gateway provisioning based on pre-defined policies

- saves money


Back to Top

Call Centers

VoicePIN announced its new Software-as-a-Service model for its voice-based authentication technology. The Polish startup calls their solution the first, off-the-shelf, voice biometrics service available for smaller organizations. Their technology helps secure call centers by recording each authorization attempt, comparing it with previously collected information to make it more resistant to spoofing. In action, a voiceprint is made of user`s voice patterns that are stored in the form of mathematical models. Each time a speaker is being authorized, the recording is verified and matched with all previously collected data guidelines. The company says that their software is sophisticated enough to detect whether the sample is an original or a re-played recording, and that it works even if the user has a head cold or sore throat.