With over 100 years of combined knowledge, WealthHub brings together the industry’s best and brightest to deliver an exceptional, cohesive system that can’t be found elsewhere. Our team consists of internationally renowned experts offering insight garnered from the world of technology, trust... Read More
AFS is the global leader in providing real-time, end-to-end commercial lending solutions to the world’s top-tier institutions. Solely dedicated to the financial industry in commercial lending, AFS is uniquely positioned to understand our client’s business and technology objectives, evidenced by... Read More
Intelligent Banking Solutions develops, markets, services and supports CARM-Pro and its companion products to assist financial institutions in the automation of debt collection on delinquent accounts, while providing management a methodology to remain compliant with internal and external rules,... Read More
PRO-TECH allows financial institutions to provide protection against incoming unauthorized ACH transactions to both business and consumer accounts. As ACH transactions arrive, actionable alerts are sent to account holders via their preferred method. Account holders can quickly and easily... Read more »
ACH A.L.E.R.T. allows financial institutions to provide protection against incoming unauthorized ACH transactions to both business and consumer accounts. As ACH transactions arrive, actionable alerts are sent to account holders via their preferred method. Account holders can quickly and easily... Read more »
ACH Dispute Xpress relieves the pain of dealing with unauthorized ACH Disputes for financial institutions and more importantly their customers/members. Instead of coming into a branch to fill out the required form, financial institutions can allow customers/members to securely access a... Read more »
By ACH Alert, LLC
Traditional Protection Strategies Not Enough;
Multi-Dimensional, Preemptive Strategies Needed
Read More
By ACH Alert, LLC
The guidance says layered security is characterized by the use of different controls at different points in a transaction process. Nine specific methods are cited by the guidance as effective controls that may be included in a layered security program. The guidance is clear not to “limit” it to...
Read More
Posted 10/28/2013