Increase revenue while decreasing fraud, with ACH Alert’s patented, highly automated and effective, customer engaging fraud prevention SaaS solutions. We’ve prevent ACH and Wire account takeover and unauthorized ACH debit fraud, while streamlining operational efficiencies and creating new revenue for our financial institutions. No integration required!
Shaw Systems offers software that’s stood the test of time - we’ve specialized in loan servicing software since 1967. We offer an integrated servicing solution for loan and lease, as well as collections and recovery management. We are distinguished by the personal service we offer and our... Read More
Automated Financial Systems, Inc. (AFS) is the industry leader in the straight-through credit process and best practices management solutions for financial institutions. AFS® combines systems, expertise, and management information to benefit its clients through: increasing revenue while reducing...
Vornex is a provider of enterprise software testing solutions. Our flagship product, TimeShiftX, is a date and time simulation software that lets you time travel software applications into the future or past to temporal test all date and time sensitive functionality and code such as end of...
PRO-TECH allows financial institutions to provide protection against incoming unauthorized ACH transactions to both business and consumer accounts. As ACH transactions arrive, actionable alerts are sent to account holders via their preferred method. Account holders can quickly and easily... Read more
ACH A.L.E.R.T. allows financial institutions to provide protection against incoming unauthorized ACH transactions to both business and consumer accounts. As ACH transactions arrive, actionable alerts are sent to account holders via their preferred method. Account holders can quickly and easily... Read more
ACH Dispute Xpress relieves the pain of dealing with unauthorized ACH Disputes for financial institutions and more importantly their customers/members. Instead of coming into a branch to fill out the required form, financial institutions can allow customers/members to securely access a... Read more
The guidance says layered security is characterized by the use of different controls at different points in a transaction process. Nine specific methods are cited by the guidance as effective controls that may be included in a layered security program. The guidance is clear not to “limit” it to... Read more