Your source for the latest technology information of interest to credit unions across America.
Subscribe to our weekly e-mail newsletter and/or our monthly newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Biometrics, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.
This Week's News is Sponsored by Better Branches ~
Share One, a leading core provider CUSO, announced a partnership with REDi Enterprise Development to offer REDiVerify and REDiNotify mobile fraud prevention solutions to all clients using Share One’s NSMobile banking application. REDi’s product offering will provide card and fraud controls delivered to credit union members with a wide variety of communication delivery methods.
Jack Henry & Associates' Symitar division announced that Red Canoe Credit Union and Endurance Federal Credit Union have selected the Episys platform. Both credit unions will run Episys in an outsourced environment.
Columbus, Ohio-based Sherpa Technologies announced plans to launch an open payment platform for CUs and other FIs, piggybacking on one of the first new core payments infrastructures built in the US in more than 40 years. It will work on the so-called RTP network developed by payments rail provider The Clearing House, and ACI Worldwide will support the extensible architecture.
Dell Technologies is rolling out new data storage and protection, networking, servers and hyperconverged infrastructures solutions. For data protection, Dell EMC is offering the PowerProtect software platform and PowerProtect X400 appliance. The appliance can be used in a hybrid or all-flash model. A new version of the Integrated Data Protection Appliance DP4400 is aimed at small and midsize businesses, with eight to 24TB of capacity. Meanwhile on the networking side, Dell EMC and VMware rolled out a software-defined WAN platform that combines VMware’s SD-WAN by VeloCloud software purchased via a subscription with Dell EMC hardware.
Understanding how a NGFW performs requires more than looking at a vendor’s specification or running a bit of traffic through it. The author recommends turning on all major functions – including application and user identification, IPS, anti-malware, URL filtering and logging – during testing to see how a firewall will hold up in a production setting. Before committing to a vendor, be sure to run tests with as many different types of traffic as possible and with various types of applications. Important metrics to look at include application throughput, connections per second, maximum sessions for both IPv4 and IPv6, and SSL performance.
With Office 365 Advanced Message Encryption, Microsoft 365 customers will have more controls through which they can automatically expire or disable access to encrypted emails shared externally. Using new data investigation controls, users can probe specific security issues, such as data leakage or phishing incidents. Plus the new Advanced eDiscovery feature now available can help you hold, search, and review data if you need to investigate specific issues.
Microsoft just announced it has added shared computer activation (SCA) for Office to the less-expensive Microsoft 365 Business subscription, giving small- and medium-sized organizations a way for multiple employees to run Office's productivity applications from a single PC. This will help in scenarios where multiple users are connecting to the same remote computer at the same time or where multiple users share the same computer and the users are logging in with their own account.
The author maintains that if we were to move to a completely cashless society, those that heavily rely on cash could be ostracized and isolated, leaving them unable to pay for services such as taxis, caregivers and even their groceries, due to unfamiliar means of payment they don’t feel comfortable using. He insists that cash is important for many reasons beyond pure preference – it provides people with a sense of security and many people still use it to budget their spending.
BS/2, a provider of banking technologies, has announced ATMeye.com, a resource for ATM and POS servicing specialists. For those looking to brush up on their industry knowledge, atmeye.com offers a resources page with state-of-the-industry information on topics such as the use of biometrics in banking, comprehensive monitoring of terminal networks, counteracting the growing number of ATM attacks and optimizing the workflow of the self-service channel.
Here is a chance to learn about real life credit union success stories from various technology vendors through the words of their clients. This week's vendor is:
and their client is:
The rollout of contactless cards in the US should have an overall positive influence on NFC mobile payments adoption in the US, according to a report from the Federal Reserve Bank of Boston — but both consumers and merchants have ongoing adoption issues that remain to be resolved. It claims that once consumers experience the benefits of contactless the move to mobile payments will be more acceptable.
The Cisco Catalyst 9100 family and Meraki MR 45/55 WiFi-6 access points are built on Cisco silicon and communicate via pre-802.1ax protocols. The silicon in these access points now acts a rich sensor providing IT with insights about what is going on the wireless network in real-time, and that enables faster reactions to problems and security concerns, according to the company. The Catalyst APs support uplink speeds of 2.5 Gbps, in addition to 100 Mbps and 1 Gbps.
The MAP App™ is the first network-branded prepaid card exclusively serving credit unions to offer mobile banking -
contact us now to learn more about this market-leading innovation for credit unions:
(866) 598 - 0698
Mobile malware increased substantially in 2018, especially through banking Trojans, according to a report from McAfee. The report also detected an increase in backdoors, cryptomining, and fake apps through the latter half of 2018.
The article has a few recommendations for FIs looking to improve the marketing and IT relationship: 1) Hire and develop tech-savvy marketers; 2) Give IT plenty of lead time via good planning; 3) Communicate the business value of IT requests; and 4) Invest in and manage the martech stack.
Marketing departments are not considered vital cogs when it comes to securing an organization's digital assets—that is, until something happens. The article states that marketers should understand: * What data the business controls; * Where the data is stored; * The relative value of the data; and * Ways in which a cybersecurity incident can occur.
Up to 80% of members at some credit unions are still opting for paper statements. The reasons for this reluctance vary, but some CUs are taking action, such as charging fees for paper statements or highlighting the benefits to the environment of e-statements, or offering cash awards for changing e-statements, to encourage members to go digital.
The central banks of Canada and Singapore have concluded a trial of cross-border payments using blockchain technology and central bank digital currencies. This first of its kind transfer between two central banks was accomplished even though they use two different blockchain networks: R3’s Corda and JPMorgan’s Quorum, respectively.
Virtualizing the network connection with SD-WAN reaps benefits, including offering connectivity a performance and efficiency boost while lowering overall costs. It also can prioritize traffic flow so mission-critical application data jumps to the head of the line. This article covers two FI SD-WAN implementation success stories.
Allied Telesis is headquartered in both Japan and the U.S. and offers intelligent switches and stackable chassis, industrial switches, wireless solutions, firewalls and routers, optics, NICs and media converters—basically end-to-end solutions from edge to core for LAN, WLAN and WAN. This article highlights some interesting innovations that are based on the company’s AlliedWare Plus operating system, a Linux-based next-generation network OS.
Measurement is the key to quality management and continuous improvement. The author states that naturally AHT and Service Levels matter, but the actual drivers that determine how to get to customer satisfaction and effortless experience are training and QA driven. He predicts that speech analytics will allow contact centers to evaluate more customer interactions, with less subjectivity, fewer errors, in less time and at a vastly reduced cost.