here - FStech
Transcription
here - FStech
DIGITAL EDITION INSTRUCTIONS FStech (formerly Financial Sector Technology) is one of the leading business titles for IT decision makers in the UK and European financial services sector. The title has an ABC certified circulation of 11,500 IT decision makers from across the continent, within banks, building societies, insurers, trading houses, exchanges and other financial institutions. For best viewing experience open in iBook’s via iPad. • To turn a page swipe either left or right • Gently tap and hold down for a second and release to bring up the menu Swipe Click • At the bottom there’s a menu as well which allows you to easily navigate through the pages • Second button from the top will show all the pages via thumbnail view which you can double tap and open Double tap Hold • Cover and content pages have interactive headers, so that you can jump straight to the article that you want — just double tap. This is the same with any web links or emails throughout the digital publication • All adverts are hyper-linked, just tap and click open FS tech FS tech FS tech FS tech May/June 2012 Formerly FST - the leading audited business title for UK financial services technology decision makers That sinking feeling Customers frustrated as banks continue to struggle with multi-channel strategies Online: www.fstech.co.uk Twitter: @FStechnology Blog: www.fstechnology.blogspot.com Roundtable reviews IT security supplement Trading platforms FStech's recent outsourcing and cloud Network security, data security and Social trading platforms: fad or computing roundtables reviewed cybercrime under the spotlight phenomenon? Join the voice recording company that’s going places. Officially. Never let it be said that Red Box Recorders is boastful, but we’re really chuffed to be in the Sunday Times Microsoft Tech Track 100. This elite league table is based on sustained sales growth. But we’ve also got there by making voice recording easier for everyone, especially mobile phone recording. In fact, our success is based on the ten guarantees below. These are guarantees that we know customers and resellers appreciate, and benefit from every day. To join us as a customer or reseller, get in touch at www.redboxrecorders.com/tt100 or call 0845 262 5005. 10 Ten ways we make voice recording easy S I M P L E R Simplest licensing Fastest user readiness, with great training Lowest parity pricing for mobile recording Fairest update charges – there aren’t any* Easiest answer to compliance Clearest options – on-site or hosted Smallest physical & environmental footprint Strongest support and advice Quickest installation Friendliest most accessible people S M A R T E R *With maintenance contract V O I C E Red Box Recorders Limited Tel: 0845 262 5005 [email protected] www.redboxrecorders.com CONTENTS CONTACTS Editor Scott Thompson Email: [email protected] contents features... 14 That sinking feeling Contributing Writers Paul Golden, Amanda Hall-Davis, Graham Jarvis, Liz Morrell, Hannah Prevett, Andrew Williams Amanda Hall-Davis finds that many banks are not keeping up with their customers’ needs and wishes when it comes to the High Street branch, mobile, social media and online Design & Production Jason Tucker 16 Good thinking Advertising Manager Sonia Patel Email: [email protected] Graham Jarvis looks at how technology can help financial institutions as they create and implement risk management strategies Deputy Advertising Manager Emma Stokes Email: [email protected] 18 A social affair The traditional world of stock markets and trading is colliding with social networks. Will this be a marriage made in heaven or a quick fling? Hannah Prevett investigates Circulation Manager Joel Whitefoot Circulation General enquiries - 0208 950 9117 [email protected] IT security supplement... Subscriptions Paid Subscriptions queries 020 7562 2420 [email protected] 40 Get the message As the threat of network attacks intensifies and changes, network managers are attempting to up their games. But, asks Andrew Williams, is the message hitting home at board level? £149 p.a. in the UK £179 p.a. elsewhere Cheques must be made payable to Perspective Publishing Limited and addressed to the Circulation Department 42 Security aware Reprints Permission for reprints may be applied for by contacting the publisher Paul Golden looks at how the financial services sector is coping in the face of internal and external data security threats 44 The big fight Contact Details: Editorial: 020 7562 2401 Advertising: 020 7562 2400 Advertising Fax: 020 7374 2701 Circulation: 020 8950 9117 Website: www.fstech.co.uk Managing Director John Woods Publishing Director Mark Evans 11,500 average net circulation for the period 1 Jan to 31 Dec 2011 All rights reserved. The publishers do not necessarily agree with the views expressed in this journal. Printed by Warners (Midlands) plc. All rights reserved. Liz Morrell casts an eye over an intensifying cat and mouse game between financial services companies and cyber criminals regulars... 06 News at a glance 28/48/52 Comment 10 Europe news 30 12 Payments news 50 Letters to the Editor 20/34 Roundtable reviews 51 Profile 26 Appointments 59 Signing off Talking heads Whitepapers at www.fstech.co.uk FStech now has whitepapers available to download on the home page of our website. Please click on the whitepapers button at www.fstech.co.uk in order to see a full list of whitepapers Currently available Dragging Banks into the 21st Century – The Future of Banking Are We There Yet? Zero-Wait BI for Everyone Mobility Is Exploding: Are You Ready? Single Customer View in Financial Services TATA Consultancy Services - Cloud Computing Research Study: The Revolution in Self-Service Channels in the Financial Services Sector Genesys. Staffing and Workload Management Genesys. Sustained Management: Changing the Game with Genesys iWD Genesys. Staffing and Workload Management Genesys. The Importance of Proper Hiring, Training, Career Path Development, Skilling, and Routing Genesys. Rethinking Contact Centre and Back Office Processes Whitepaper Downloads In order to DOWNLOAD WHITEPAPERS for FREE, please visit: www.fstech.co.uk/whitepapers EDITOR’S COMMENT Ambitious vision Cash to be a thing of the past by 2020, according to a new study. Whilst research, undertaken by SCAN COIN among a sample of 200 people in the 16-24, 25-45 and over 45 categories, shows that two thirds believe notes and coins will never disappear within any reasonable timescale. Who to believe, then? R egular readers of this column (there are some of you out there, I’m sure of it!) will know that I used to be Editor of FStech’s sister title, Retail Systems. I recently had lunch with a contact from my retail days and somewhat inevitably the conversation turned to retail technology vs financial sector technology. “I’d imagine there is a lot less innovation in the financial services sector than there is in retail,” said the contact, his logic being that, with many of the big financial institutions, it’s a case of throwing large amounts of cash at legacy transformation projects. Retailers, on the other hand, have less money to play with and so sweat the small stuff, which is where true innovation lies. Regular readers will also know that the 2012 FStech Awards took place in March. It was my first awards and it was interesting to compare the entries to those received during my time as head of the Retail Systems Awards judging panel. There were indeed a number of entries detailing projects which were immense in scale but not particularly innovative. But at the same time, there were lots of examples of how financial institutions are making groundbreaking use of technology in such areas as social media, mobile banking, payments, cloud computing and green IT. RBS, for instance, won in the Best Use of Technology in Customer Service category for its m-banking and payment apps, developed with Monitise. We are seeing arguably some of the greatest levels of innovation and technology implementation in mobile payments. After a sluggish start, financial institutions are really pushing products in this area. Take, for example, Barclaycard. Free PayTag stick on credit cards, about a third of the size of a normal card, are being offered to selected UK Visa cardholders, with a roll-out to millions more people set to follow later this year. Customers stick a PayTag to the back of their handset. Once attached, their phones can be used to make payments of £15 and under, rising to £20 in June, when they tap the handset against a retailer’s contactless terminal. Another step, then, towards helping the banks and card schemes achieve their ambitious vision of a cashless society. But there is still a lot of work to be done in terms of winning over the general public. I was interested to see the mainstream media’s take on PayTag. On The Guardian’s website, a news piece attracted a number of reader comments, the majority of them negative. These included railing against a Big Brother society (“soon it will be an RFID chip under your skin”) and wondering if there was any point until all the banks backed contactless. Both valid concerns. And ones that I don’t think the banks and card schemes have done enough to address in their rush to stamp out cash. David Chan, CEO at Barclaycard Consumer Europe, says: “More than half of us say that the item we’re most lost without is our mobile phone, so we’re giving people the option of using them to make easy, convenient, everyday payments without the need to upgrade their current handset.” Which sounds great. But as a friend recently said to me: “So if I lose my mobile, I lose my phone and my money in one fell swoop, right? And what if I want to pay for something just as my battery dies?” According to a recent study conducted by US think-tank Pew Internet, cash and credit cards could be a thing of the past by 2020. The study, which sought the views of 1,000 plus internet experts and users, found that m-payments will gain mainstream acceptance within the next decade. I personally see this process unfolding at a slower rate. Cash isn’t going away any time soon as the research mentioned at the top of this piece highlights. It found that it accounts for 55.2 per cent of all UK transactions and £32.78 in every £100 spent at retail outlets. People prefer to use cash when they are buying low-value items, with 77 per cent still opting for coins for purchases of less than £3. They like and trust cash. And suspect the banks’ motives in wanting rid of it. We’re seeing a high level of innovation, but financial institutions need to prove themselves equally as adept in the communication department to have any chance of winning out. As a friend recently said to me: “So if I lose my mobile, I lose my phone and my money in one fell swoop, right? And what if I want to pay for something just as my battery dies?” Scott Thompson is Editor of FStech. His blog on all things financial services technology-related can be found at: www.fstechnology.blogspot.com. He can be contacted at: [email protected] M AY /J U N E 2 0 1 2 PAG E 0 5 NEWS OVERVIEW news overview need to know M AY /J U N E 2 0 1 2 per cent on the latter. Corporate targeted at twice the national average Insight has been keeping track of rate. Whilst the instances of fraud developments since its research ended across all financial products remained and reports that the trend towards at a constant level between 2010 and Twitter shows no signs of slowing. In 2011 (six in every 10,000 applications the period from January to 10 March, were found to be fraudulent), there 19 new FS social media properties was a surge in identity theft via cur- were launched, 17 of which were rent accounts and mortgages during Twitter accounts. this period, with rates doubling (from six to 14 in every 10,000 applications) Co-operative Bank emerged as the and quadrupling (from one to four in best and Santander by far the worst in every 10,000) respectively. Identity terms of the performance of UK fraud attempts on credit cards fell banks’ websites, according to research from 17 to four in every 10,000 from Compuware Corporation. The applications. company’s UK Banking Account Details Business Process report ranks The banks and credit card providers how well banks have performed, rela- might wish it otherwise, but cash is tive to one another, in a multi-step still king. According to a report from APRIL transaction (login, account summary, cash management outfit, SCAN COIN, O2 launched its long-awaited mobile logout). It uses Gomez benchmarks it accounts for 55.2 per cent of all UK wallet, under an interim e-money across three key metrics: response transactions and £32.78 in every £100 licence from IDT Financial Services. time; availability; and consistency. spent at retail outlets. People prefer to Long time coming: O2 Wallet. PAG E 0 6 Rounding up the major FS tech-related stories from the last two months The O2 Wallet includes the following During the period 1 March to 1 use cash when they are buying low- functions: transfer money to any UK April, Co-operative Bank came top for value items, with 77 per cent of peo- mobile phone number by sending a response time and consistency and ple still opting for coins for purchases text; shop by mobile and receive daily second for availability (where Smile of less than £3. The research, under- deals and discounts via the My Offers placed first). Santander lagged far taken for SCAN COIN by Fieldworks icon; load money into the wallet behind as did first direct, Bank of Marketing among a sample of 200 account via a debit card, by receiving Scotland and Yorkshire Bank. people in the 16-24, 25-45 and over a Money Message or with cash at 45 categories, shows that two-thirds MAY believe notes and coins will never dis- Consumers will also soon be able to It’s best known as the home of BBC appear within any reasonable times- use it to top-up mobile airtime and sitcom The Office and the place that cale, despite the growth of cards and buy train tickets. The product was ini- inspired some cutting verse by John mobile phones. tially due to launch last year, but this Betjeman. But now Slough has a new was delayed as O2 partnered with a claim to fame. It has overtaken Seventy five per cent of European number of companies to fine tune it. London identity banks are still using outdated core fraud capital of the UK. Research banking systems, affecting their ability Twitter overtook Facebook to become released by Experian showed that the to accelerate growth. A new survey the top social network for FS firms, Berkshire town recorded 25 identity from Ovum, commissioned by Infosys, according to analysis from Corporate fraud attempts for every 10,000 covered 65 C-level executives across Insight. The company covered 90 households, with residents targeted European financial institutions. Eighty companies in its Social Media Leaders at around four times the UK national per cent of the banks said that report, 57 per cent of which used average (seven households in every outdated core banking systems were Facebook in 2010 and 51 per cent 10,000). London, causing them to struggle to bring new Twitter. But by the end of 2011, 88 Gravesend, Luton, products to market quickly. Three- per cent were on the former and 92 Manchester and Leicester were also quarters face difficulties getting access more than 30,000 locations. to become Residents the of Birmingham, NEWS to timely data, and close to two-thirds top of their agendas, with 51 per cent Metro Bank’s social media policy was feel that existing systems do not and 46 per cent claiming these as top put severely to the test during May. support regulatory change. Fifty five technology concerns respectively. The Comedian Al Murray took to Twitter per cent are focusing on increasing research also indicated that organisa- to blast the bank over the opening of wallet share within the existing client tions are getting better at squeezing its 12th branch in Chiswick. Murray base, with only 20 per cent trying to additional value out of the contact tweeted: ’I have actually crossed the achieve growth through new custom- centre through customer interaction. road to avoid the toe curling god er acquisition; 79 per cent said that Only 17 per cent of contact centres awful pisspoor balloon waving music the complexity of IT, combined with currently use voice analytics, although blaring launch of my local Metro insufficient a further 13 per cent are planning to bank.’ Posting a pic of the opening implement it. celebrations, he added: ’I love it when expertise within the business, was a major barrier to core system replacement. cretins treat the rest of us like morons.’ An IT hardware failure meant some He then invited his followers to use a Contact centres operating in the UK HSBC customers were left unable rather unflattering hashtag, which we consumer FS industry are planning to to make card payments or withdraw won’t repeat lest any children are win the customer experience/cost cash from ATMs on Sunday, 20 May. reading (unlikely we know but hey battle customer Services were hit during the afternoon ho). Metro Bank initially stayed out of engagement and self-service. Aspect with the glitch fixed by late evening, the debate, but decided to respond surveyed 150 senior business and IT according to the HSBC UK press office when a few days later, Murray was at decision makers in financial services. Twitter account. ’Sorry again for the it again, tweeting. ’Metro Bank: Many of the organisations surveyed problems this evening. An IT hardware Another ”reason for joining - no stu- see improving the customer experi- failure affected some ATM and card pid bank rules”. Um isn’t that what ence as a primary business goal (56 transactions. All services available landed us all in it?’ per cent), while most also want to now,’ it tweeted. The bank came back with ’Hi Al. We’d with web-based OVERVIEW reduce cost by implementing new love to welcome you into our Chiswick technology (68 per cent), but are Random photo opportunity ahoy (see store and explain what we’re all blocked by CAPEX investments (60 opposite). Bank Machine launched about. When are you free?’ ’That’s per cent cited this as the biggest the 500th of its fiver-only ATMs in very kind but very busy at the barrier to adoption). With tighter Wolverhampton moment,’ came the comic’s reply. budgets, however, has come more trumpeters played a variety of ’Fiver intelligent contact centres responding Fanfares’ in full regalia to announce to the changing communications the installation of the new machine. habits of consumers, with one in five Whilst an old lady looked on, a tad organisations surveyed planning to confused. The launch came just a few implement instant messaging/web weeks after the news from the Bank chat (19 per cent) and/or online of England that nearly 10 times as self-service (19 per cent) in 2013. city centre. Two There’s no pleasing some people... many £5 notes were being dispensed With the customer experience in from cash machines than in the sum- mind, organisations are also keeping mer of 2010. Some £200 million of compliance and data security at the fivers are now dispensed a month. Lend us a fiver! FROM FROM 9999 £1049 £1049 ex VAT ex VAT EXPERIENCE EXPERIENCE THE THEULTIMATE. ULTIMATE.THE THE VAIO VAIOZ ZSERIES. SERIES. Do Do more, more, hold hold lessless Maximise Maximise productivity productivity Advanced Advanced docking docking Travel Travel lightlight withwith the the slimslim line line carbon carbon fibrefibre casing. casing. StayStay in touch in touch withwith up to up14 tohours 14 hours of battery of battery life*life* andand VAIO VAIO everywair everywair 3G. 3G. Power Power through through every every tasktask withwith ® ® TM Core CoreTM 2nd2nd generation generation IntelIntel processors processors andand super-fast super-fast Connect Connect to the to the advanced advanced docking docking station station for lightning for lightning fast fast graphics, graphics, optical optical discdisc drive drive andand a range a range of of interfaces. interfaces. Dock Dock included. included. SSDSSD flashflash drives. drives. *with*with the smart the smart sheetsheet battery battery (optional (optional extra). extra). ‘Sony’, ‘Sony’, ‘make.believe’, ‘make.believe’, ‘VAIO’‘VAIO’ and their and logos their logos are registered are registered trademarks trademarks or trademarks or trademarks of Sony of Sony Corporation. Corporation. All other All other logoslogos are the areproperty the property of their of respective their respective owners. owners. uk.insight.com uk.insight.com 0800 0800 333 333 333 333 NEWS IN BRIEF • SAP is to work with Citi and RBS on a cloud-based services platform. A combination of SAP’s experience in ERP, treasury management software and new cloud services technologies is driving the solution development, which aims to seamlessly integrate banks with their corporate customers. • HSBC has launched its long awaited personal banking iPhone app. The Fast Balance iPhone app enables customers to obtain details of their current account balance and last six transactions. An Android version is in the works. Developed by Monitise, which has a three year development deal with HSBC, it also lets customers top up their pre-paid mobile phones. • Halifax has launched an iPhone app aimed at UK house hunters. The Home Finder app, which Halifax says is a first in the UK, makes use of augmented reality technology to provide a one stop shop for customers. They can use it to bring up information on properties for sale in their area. In addition, it provides mortgage affordability calculators, local area information and property buyers’ guides. • Allianz Insurance is implementing web self-service technology from Transversal. The company hopes this new way of helping customers quickly resolve questions will reduce calls to its contact centres by up to 20 per cent. Transversal’s solution was implemented over a 12 week period and has recently been made live on the Allianz Your Cover website. Customers have been able to reply ‘yes’, ‘no’ or ‘partly’ in response to how helpful the answer has been, with the feedback being used to improve the quality of answers given. PAG E 0 8 M AY /J U N E 2 0 1 2 The place to be Scott Thompson reviews Infosecurity Europe 2012, which took place in April at Earls Court, London I t was April, torrential rain was the order of the day and the tubes were on the blink, which could only mean one thing: it was time for security professionals and hacks to make their way to Earls Court for Infosecurity Europe; 12,959 of them to be exact, a 24 per cent increase on 2011. I have a confession to make. I’m an Infosecurity Europe virgin. I took over as Editor of FStech a few weeks after last year’s event and wasn’t sure what to expect, having been told by work colleagues that it was “a great show” and “much of a muchness, too bloody big!” Whilst it proved to be enjoyable and informative, I could relate to the latter comment. The huge number of vendors in attendance and vast array of seminars and conference sessions made it a somewhat overwhelming experience. Some of the stands were among the biggest and most elaborate you could wish to see at a trade show. Whilst this made for an impressive spectacle, the downside is that the bigger companies threatened to drown out the smaller players, many of whom had innovative solutions on display. The first morning of the show saw Neelie Kroes, vice president of the European Commission & European digital agenda commissioner, European Commission, tackle internet security. “Given that internet attacks have such a wide mix of sources and impact, the solution is not simple. Internet security cannot be left to the traditional instruments of national security, as if cyberspace was just another military theatre. We need a comprehensive response that covers all. That is why we need a new vision,” she said. This new vision looks set to be realised in the third quarter of this year. “Internet security is not a problem that is going to go away. But by building response networks, a decent governance structure, the right incentives for the private sector, a vibrant internal market and an international outlook, we can deliver an internet that is safe and secure for everyone,” she added. Kroes was followed by the official launch of the 2012 Information Security Breaches Survey. The results were revealed in full following a keynote speech by Business, Innovation and Skills minister, David Willetts, who commented: “The internet has opened up huge opportunities for businesses, and the UK is a world leader in doing business online. This survey showing the changing nature of the threats in cyberspace is a timely reminder for UK businesses to make sure their information systems are protected so they can take full advantage of the online world. The survey demonstrates why the Government is right to be investing £650 million to improve cyber security and make the UK one of the safest places to do business in cyberspace. We will use the findings to help design a new annual survey of cyber security breaches beginning next year.” A key finding of the survey, written by PwC in conjunction with Infosecurity Europe and supported by the department for Business, Innovation and Skills, was that organisations large and small are failing to respond to the culture of employees using their own mobile devices for work. As such, they are opening up their systems to security risks. Eighty two per cent of large organisations reported security breaches caused by staff, including 47 per cent who lost or leaked confidential information. Fifty four per cent of small businesses (38 per cent of large organisations) don’t have a security awareness programme. Some 75 per cent of large organisations (and 61 per cent of small businesses) allow staff to use smartphones and tablets to connect to their corporate systems and yet only 39 per cent (24 per cent of small businesses) apply data encryption on the devices. The mobile minefield somewhat unsurprisingly dominated the show. Scores of vendors were demonstrating solutions that can help organisations navigate their way through increasingly challenging territory. Whilst the Keynote Theatre agenda included discussions NEWS IN on BYO policies and smart devices - are we providing smart enough security? And Trend Micro highlighted new research, in conjunction with Forrester, which revealed a lack of management commitment to BYOD programmes. While the majority of companies surveyed (86 per cent) involve their IT department in the development of BYOD programmes, only 46 per cent have the support of senior management. In addition, the number of surveyed enterprises seeking input into the development of a BYOD strategy from non-IT departments ranges from low (25 per cent involved the finance department, 21 per cent of them the legal department) to the practically non-existent (just two per cent involved their HR department, for instance). Say what you see...Roy Walker at Infosecurity Europe. On the floor When hitting the exhibition floor, I had childhood flashbacks upon discovering that the man, the legend Roy Walker was on the SafeNet stand. Roy had dusted off Mr Chips and was inviting visitors to play classic 80s gameshow Catchphrase, with two games in the morning, two in the afternoon and the four winners then going head to head to play Super Catchphrase. All together now: “It’s good, but it’s not right.” SafeNet also used the occasion to showcase its authentication product portfolio and encryption, key management and cloud security solutions, and performed live hacking demonstrations to boot. There were also a large number of technology launches at the show, including CORE Security unveiling Insight Enterprise 2.0. The latest enhancements to the company’s security intelligence solution means that it now offers a comprehensive set of vulnerability management capabilities, including integrated network and web application vulnerability scanning; attack planning and simulation; threat replication; dashboards and reporting; and vulnerability remediation, on a single platform. Cryptzone introduced the latest release of its policy management software, addressing the problem (oft heard during the course of the show) that employee awareness is frequently the weakest link in an organisation’s security strategy. NETconsent Compliance Suite ensures that a company’s increasingly mobile workforce are aware of policies, educated on the reasons why they are important and tested to see if they understand their responsibilities. New features include: documents delivered through NETconsent can now be accessed and signed up to from tablets at the point of use; content can be categorised by any standards relating to it; Alerter can be used to notify users of policy updates and other urgent documentation not just at start up. G Data launched G Data BankGuard. This patent pending technology offers protection against banking trojans, providing a detection rate of over 99 per cent, according to G Data. The product is compatible with all antivirus solutions and is available for £19.95. “Antivirus solutions usually do not detect new banking trojans until it is too late, since a corresponding signature is required for protection. This means that it is almost impossible to protect computers fully against current banking trojans using previous security technologies,” said Eddy Willems, G Data’s security evangelist. “With G Data BankGuard we have managed to develop a product that protects bank customers from this malware in real-time. Our technology is completely signature-independent and is fully integrated into the browser. Hence manipulations by banking trojans are detected instantly and stopped automatically.” Deep Discovery was pitched as the most comprehensive solution of its kind engineered specifically to help firms neutralise the growing menace of APTs. The company behind it, Trend Micro, said it was different to rival offerings as it provides the tools to detect zero day malware and tell-tale malicious human activity across the entire network and all phases of the attack, but it has also been designed to offer in-depth analysis so firms can prevent similar attacks in the future. BRIEF • Savvis, which counts a number of global investment banks as clients, has announced the availability of L03, its new datacentre in London Docklands. This complements the cloud and hosted IT solutions and infrastructure provider’s existing European locations in the London area – Slough and Reading – and Frankfurt, Germany. • Endsleigh is to utilise IBM’s Coremetrics Web Analytics offering, delivered as a cloud service. The insurance provider is hoping to gain greater visibility of online customer behaviour, improve usability of its website and increase conversion rates. IBM’s solution tracks how long people spend on pages, which pages they prefer and how effective the application process is. • Following a trial period, Amscreen has signed an agreement with Halifax that will see its screens installed in over 200 branches. The bespoke network advertises Halifax own products and services. Lord Sugar (owner of Amscreen) comments: “Customer engagement is absolutely paramount to a financial institution like Halifax and their investment in this technology is testament to the power of the screens and their ability to engage with customers.” • Aldermore Bank has signed a £1.8 million extension to a data and analytics deal agreed with Experian in 2011. This will extend its use of the TransactSM application processing system and Hunter fraud prevention software. It will also start using Experian’s Delphi for Customer Management service to monitor changes in the credit risk profile of existing customers and to identify opportunities for up-selling additional products. M AY /J U N E 2 0 1 2 PAG E 0 9 EUROPE IN NEWS BRIEF • Société Générale has gone live on the ASP version of Misys’s Summit FT SaaS solution. The solution offers broad cross-asset coverage including OTC derivatives, fixed income, commodities, foreign exchange, equities and structured products. • HP has signed a 15 year payroll operations and HR technology deal with Italy’s UniCredit. The banking organisation is to migrate its current multiple human resources/ERP platforms to a standard, unified enterprise model running SAP solutions. In addition to transformation and modernisation services, HP will also host UniCredit’s new platform from its datacentres. • Bankhaus Main has implemented Temenos’ Triple’A Plus portfolio management system back to frontoffice. The German bank now has comprehensive portfolio management functionality, complex analysis tools and high-quality reporting, enabling it to perform more detailed evaluations of cash flow, revenue and performance, and consolidate this information in in-depth client reports. Leaping up the table T h NCC Group has released its Origin of Hacks report for the first quarter of 2012. The UK has entered the top 10 for the first time, while the proportion of worldwide hacks coming from Russia and the Netherlands has also increased. The UK now occupies seventh place, being responsible for 2.4 per cent of the world’s hacking attempts over the last quarter. This is double the proportion of the findings from the previous report, and sees the country move eight places up the table. Russia has also shown a large increase, with over 12 per cent of global hacks originating there, compared to just 3.5 per cent in the previous findings. This has cemented its position in third, behind the United States and China. As for the Netherlands, it’s up from 3.1 per cent to over 11 per cent, moving it into fourth place in the hacking chart. Overall, the top 10 has changed a great deal over just three months, with Italy, France and India all dropping out. Taking their places are Ukraine in fifth, South Korea in ninth and the UK. Rob Cotton, NCC Group’s chief executive, comments: “Cybercrime is perpetually evolving. The dramatic increase of hacks from certain countries over a three month period just goes to show the fluidity and quick-changing nature of the issue. Because cybercrime develops and alters on a daily basis, so too must the countermeasures. We need greater agility and collaboration on an international scale.” • Neolane has announced Ikano Bank as its latest financial services customer in Europe. It will Worldwide hacks at a glance. implement the company’s platform to help it boost the effectiveness of its marketing communications through closer, more personalised relationships with its customers and enabling it to manage cross-channel Most read at fstech.co.uk marketing campaigns. • ABN AMRO, Banco Galicia, UBS Most clicked stories at www.fstech.co.uk during May... and the French publisher of integrated software packages, SAB, are the latest members to join the Banking Industry Architecture Network (BIAN) network, collaborating on standards for SOA in the banking industry. PAG E 10 M AY /J U N E 2 0 1 2 Sluggish FS sector not happy with tech IPL rolls out Multi-Channel Framework UK leaps up hacking league table BIAN swells its ranks VocaLink to manage Moneycorp ATM estate BYOD brings benefits plus security concerns PAYMENTS IN NEWS BRIEF • Bank of America Merrill Lynch has selected Sentenial to offer Origix Corporate to its clients. The solution enables the migration of legacy mandates to SEPA Direct Debit, Payments conference returns The second FStech/Retail Systems Payments Technology Conference will take place on Thursday, 1 November ongoing mandate management, document handling and the generation of payment instructions. BofAML says that its clients will be able to benefit from the solution with minimal changes to their existing processes. • HSBC is to follow the likes of NatWest and Barclays and roll-out contactless cards. With one eye on the 2012 London Olympics, the plan is to replace those debit cards which The conference made a hugely successful debut last year. are due to expire from May onwards T with new cards containing contactless technology. • The fourth State of the European Payments Marketplace survey, with over 350 participants from 53 countries, shows an increasing expectation of success for SEPA. Conducted by the Financial Services Club and sponsored by European Banking Authority and Logica, it also highlights the growth in real-time payments across the board. Nearly 70 per cent of respondents believed the Euro would not survive in its current form, although overall sentiment with regards to the Euro and SEPA was more positive. • Temenos is to develop a new payments system, built in conjunction with ABN AMRO Bank N.V. This will be based upon the Temenos Enterprise Frameworks Architecture (TEFA), which provides the platform for the company’s T24 core banking software. The new system will be implemented at all of ABN AMRO’s international locations. It will also be available as a standalone solution, operating in real-time with any core banking or checking accounts system. PAG E 12 M AY /J U N E 2 0 1 2 he event, to be held at the IoD Hub, London, will bring together leading figures from retail and the financial services sector to network and discuss cards and payments services, the present and future. This year, there will be a particular focus on mobile banking and payments. Senior figures from across the retail, financial services, technology vendor and telco sectors will come together to debate the key issues, innovations and barriers to the mass-market deployment of mobile. Chaired by Vendorcom chairman, Paul Rodgers, the conference, a mixture of speaker presentations and discussion panels, will also showcase the latest developments and services and products in such areas as: contactless cards; self-service technologies, SEPA, payment security, online payments, the future of cash and cheques and social payments. Free to retailers and financial institutions, it made a hugely successful debut in 2011 as FStech teamed with sister title Retail Systems to put together what we believe is a unique event. Looking at the payments sector from the perspective of both the retail and financial services sectors, the conference pulled in close to 200 delegates and attracted speakers and panellists from such organisations as PayPal, Lloyds Banking Group, VeriFone, Barclaycard, Citi, Clinton Cards, HSBC, Bank Machine and O2 Money. For further information on the 2012 event, visit: www.fstech.co.uk/payments 2011 conference highlights... Payments evolution over the next five years challenges and opportunities: Tim Decker, European Head of E-Channels, Payments and Cash Management, HSBC. Payments in a multi-channel world: Carl-Olav Scheible, UK Managing Director, PayPal. Cash vs contactless, long live the king: Simon Austin, Commercial Director, Bank Machine. Panel discussion: Cash vs cards, featuring Ben Snowman, Director, Simon-Kucher & Partners; Mark Silverstein, Deputy Head-Legal-Global Transaction Services, EMEA, Citibank; Dave Wills, Head of Merchant Services, Cardnet Merchant Services, Lloyds TSB Cardnet; Rob Brown, Group EPoS Systems Manager, Clinton Cards. Panel discussion: NFC/mobile payments, featuring Giles Hingston, Global Product Manager, Global Transactional Services, HSBC; Alan Moss, Marketing Director, Verifone NW Europe, Middle East and Africa; Tom Gregory, Head of Digital Payments, Barclaycard. The mobile wallet: driving m-commerce and closing the transactional loop: Phil Edwards, Head of Business Development, O2 Money. VIDEO INTERVIEW Data challenges Tony Fisher, CEO and President of DataFlux, discusses master data management as a technology and how it affects and benefits financial institutions FStech: What is MDM? TF: It's not really a technology, it's more of a methodology, a process to ensure an organisation has data that's fit for purpose for their business. There are technology components to it but equally as important is the consistency in processes and rules. Ultimately, the idea is to ensure that the data reflects the business. go. The other important thing to keep in mind about MDM is that it is evolutionary in its implementation. Organisations that try to do an entire enterprise MDM implementation at once tend to fail more than they succeed as they're biting off more than they can chew. The most successful companies start small and grow out from there. FStech: What are the benefits? TF: Primarily the emphasis for MDM is to get good, consistent data across the organisation. It's really not fair to define it as a technology or methodology to get better data. The idea is to improve your business and so the ultimate goal is that you use the data to increase your revenue and decrease your expenses. You mitigate risk and you're in compliance with regulations. FStech: Social media is having a huge impact on MDM programmes. How can DataFlux help organisations address this? TF: It would be wrong to talk about social media data as a master data driver. It is true that one of the big things organisations need to do is incorporate their social data in with their master data. Master data tends to be more structured in nature. Social data is much more unstructured. But the idea is to glean the important points from the social data and to augment and embellish your customer data based on that. And that's the kind of thing DataFlux is doing. We can help you understand the major components of your Twitter feed and map that back into the sentiment of the customer, so you have a good understanding of how customers are interacting with your business. FStech: Why do organisations usually find they need a MDM solution? Is it reactive (e.g. compliance-related) or are they increasingly implementing these solutions to drive a single view of the customer? TF: The drivers tend to be external influences, oddly enough. What is going to motivate a company this year or next is going to be different. If you look at things within a temporal context, when the economy is strong, organisations tend to focus on that single view of the customer. When they are experiencing recession, the drivers are different - you tend to regroup and make more out of what you have, operational efficiency - e.g. looking at product data or financial data. FStech: Is there a one size fits all approach? TF: No, there isn't. Every organisation has a slightly different reason for doing MDM. Therefore there is a certain dependency on what the business drivers are. There are certainly similarities from implementation to implementation. And as a vendor we can provide a jump start that gets an organisation in the direction they want to FStech: I'll put the same question to you in relation to cloud computing. TF: Cloud has a life outside of MDM and vice versa. It's important to understand that cloud computing is going to be an essential part of infrastructure for IT organisations moving forward and one of the things inhibiting larger organisations from moving more rapidly to the cloud is the data integration problem. We can get multiple applications to run in the cloud but then you get to the point where that application is running in isolation to everything else you're doing. And this becomes a difficult thing for organisations to tackle. The success of integrating organisations in to the cloud is ultimately going to come back to their ability to Scott Thompson talks to Tony Fisher, CEO and president, DataFlux integrate the data within cloud applications, both on and off premise applications. FStech: And also Big Data. TF: Yes, I guess we have to hit all the big buzzwords, don't we? Big Data has a lot of the same characteristics as social data. It's true that across all industries we've been very good at producing massive amounts of data, what we haven't been good at is consuming that data. When you look at new techologies like Big Data, they allow organisations to consume much more data and make more sense of it. So it becomes an important part of a data management strategy. You need to understand the characteristics of the data and cross germinate your structured data environment with your unstructured. Again, it opens up a lot of potential for understanding your organisation. FStech: What would be your recommendations to those thinking about starting a MDM project? TF: It's often that first step which is the most difficult. Start with a manageable sized project and build out from there. I can't emphasise enough, it's fine to think across the enterprise but as you start it needs to be with something you can succeed at. Success breeds success. A lot of organisations need to think differently, they have been very application focused in the past, but now more forward thinking companies are viewing it along the lines of, data first, applications second. For the full interview, visit: www. fstech.co.uk M U LT I -CHANNEL BANKING That sinking feeling Amanda Hall-Davis finds that many banks are not keeping up with their customers’ needs and wishes when it comes to the High Street branch, mobile, social media and online A s a new storm gathers on the banking horizon now that the UK has hit a double-dip recession, these already bruised financial institutions remain vulnerable. With the UK banks still reeling over the shock of the Eurozone crisis, increased regulation and high inflation, the continuing financial problems pose a serious threat, the Bank of England has warned. The silver lining among the dark clouds is the increase in the uptake of digital banking solutions. Multi-channel banking in itself presents a completely new set of tough challenges to financial institutions but how are they progressing in terms of strategies? What are the future technology solutions with regard to multi-channel banking? Consumers want multi-channel interactions with financial services companies to feel local and personal, according to a recent study by BT and Avaya. This found that banking customers are cautious of social media and prefer personalised services to be at the centre of their relationship when dealing with personal PAG E 14 M AY /J U N E 2 0 1 2 finance matters. It showed that around 73 per cent of UK banking customers view their local branch as the ’most vital link with their bank in the future’. Although it also revealed that customers are interested in new ways of dealing with their finances and ’expect web-chat, co-browsing and video-chat with their financial services provider to grow.’ Banks face the demanding challenges of satisfying customer needs and those that build in multi-channel capabilities, which meet these criteria, will enjoy economic growth. David Kohn, banking consultant at CSC, IT and technology services, believes strategic teething problems are inevitable: “Banks have been modernising their electronic channels, with updates to internet banking services, new apps for smartphones and tablets, and new payment services,“ he says. “However, integration and consistency between the channels is still patchy. Telephone banking is, for many banks, the problem child, with high customer dissatisfaction with waiting times, clunky security procedures and insufficiently skilled or knowledgeable staff. The ATM, still the primary source of bank interaction for many customers, has received little investment recently and branches are to be avoided by anyone with a busy life. Banks are aware of the need to engage with the social media revolution but many of their efforts to date have been ineffectual.” Leading banks are continuing to progress in terms of improving their multi-channel strategies and deliver the consistent service needed to engage customers. Commenting on the advancement of multi-channel strategies and the use of digital technologies, Chris Popple, managing director of digital channels at NatWest and RBS, says: “It has let us put our brochures up on the web, and the second big thing is to make basic banking more accessible. That’s what core online banking is. We worked very hard on two things: exposing the banking functionality into a mobile phone, but we need to think about how easy it is to use. How can the customer transfer money intuitively and be easy to use. Relative to online banking the growth of mobile banking is higher than the initial uptake of online. At the beginning of 2012 we had 1.2 million active customers using mobile.“ He adds: “We see our customers actively using our digital channels with over 50 per cent actively using digital channels. Digital is a powerful way to glue together all the channels. We have something called Ideas Bank – a forum whereby we monitor and listen to our customers in a different way to Twitter.” Whilst adding new facilities to the core of traditional banking, true multi-channel banking should aim to add an abundant set of services and products to customers in a seamless and always available manner across all channels, thus providing a consistent experience. However, there are flaws in current multi-channel banking strategies which need to be addressed as Kohn observes: “Inconsistent branding and user experience across the channels is a constant feature, although some banks fare better than others in this respect. Banks are adding new channels without either identifying a new revenue stream or retiring/reducing the cost of existing channels. This means that total distribution costs continue to rise, which is just what banks don’t need with their present cost/income ratios.” Digital solutions It is undoubtedly a tough time for the banks in the current economic climate and multi-channel presents an opportunity to strengthen trust and build upon relationships with customers by delivering a personalised service. Digital innovations are a means to help the sector achieve this through every channel it has. Whether it be remote channels such as online or mobile banking, technologies now exist that can link its customers to the right people and the right information in a cost-effective manner. “A true multi-channel solution is a convergence of multiple technological solutions, which include an integrated back end systems, an enterprise service bus or middle ware, a multi- channel framework, which exposes services that can be reused across channels, integrated sales and marketing, alert services, business intelligence, data management, security solutions and compliance solutions. Leading financial services providers are starting to offer a true multi-channel solution,“ says Haragopal Mangipudi, global head at Finacle. “Banks are also focussing their attention on cross channel support, unified login and layered analytics. Having a 360 degree view of the existing customer offering gives better insights into existing relationships and helps in improving cross-sell revenue per customer.“ Innovative products and tools that proactively offer assistance such as live online chat, money management tools and bill pay features are all options that can assist in increasing customer lifetime value, reduce the churn rate plus enhance and meet customer needs. However, what are the practical digital solutions that lay the foundations, which banks need in place in order to achieve their objective of true multi-channel functionality? Kohn observes: “A proper, integrated multi-channel architecture that can cope with rapid change and experimentation without distorting the architecture.” In order to achieve the much sought after ’single customer view’, data consolidation and improved management of customer information are key precursors to achieve a bank’s business objectives. In essence, information is the practical side of their ’strategy coin’. What are the future challenges to address in order to move forward with multi-channel strategies in the long-term and what new digital solutions are on the horizon? Mangipudi says banks need to undergo a major transformation to meet the future challenges of offering a true multi-channel service: “They require a major transformation programme in terms of upgradation of legacy systems, business process re-engineering and consolidation of data in order to climb the multi-channel curve. We also believe technologies such as cloud computing will act as an important enabler for these strategies.” But CSC’s Kohn says the sector must address rising costs and simplify its strategies: “They must address the challenge of everrising distribution costs and complexity. They particularly need to get their data (information) into structures that enable, rather than hinder (as now), their business objectives.” Mangipudi believes digital solutions need to incorporate a number of key factors in the future: “In addition from general enterprise and infrastructure perspective cloud-based services, virtualisation, open banking platforms, Big Data management will have a big impact on the multi-channel landscape. In addition, banks would also want to have better risk management, greater regulatory compliance and unified fraud management.” The consumerisation revolution and the rapid rate of IT change have left many financial institutions struggling to keep up. Multichannel strategies are suffering as a result, with the customer experience across channels often patchy. Some organisations are rising to the challenge but it appears that the majority remain hamstrung by legacy thinking. M AY /J U N E 2 0 1 2 PAG E 15 RISK MANAGEMENT SOFTWARE Good thinking Graham Jarvis looks at how technology can help financial institutions as they create and implement risk management strategies L ife is full of risks and attempts to balance them with rewards. Those risks range from just simply crossing the road to calculating how much return on equity you’ll receive if you invest your money in a certain commercial project or investment scheme. Yet the financial crisis that began in 2008 occurred because well known financial institutions like Fannie Mae and Lehman Brothers, as well as many others like the Royal Bank of Scotland (RBS), accepted a lack of equilibrium between these two factors. This led to the circus tiger of risk eating its master, and with it fell the belief that taking ever greater risks would naturally lead to even greater rewards. PAG E 16 M AY /J U N E 2 0 1 2 So the tiger needed taming with regulation, a new attitude to risk-taking and its management to reduce the chances of such a dramatic collapse in the global financial markets and system, which has led us all to the current recession, happening again. Of course, it could still befall us, and regulation and regulatory compliance isn’t enough to prevent such a catastrophe from happening again. Risk management therefore has to become an integral part of a financial institution’s culture, people and processes at all levels of the enterprise. That includes ending such activities as rewarding individuals for failure whenever a risk too far has been taken. “Basically risk and reward aren’t sufficient to deliver a risk management strategy; we still need to choose your risk appetite and once you have that you will need to identify, measure and model to understand what the weak spots are,” explains Michael Mathias, director of capital markets at Tata Consulting Services (TCS). Banks therefore need to understand how they can create a margin of safety, which includes the provision of cash flow and capital cushions. This, however, is problematic because the bigger these cushions become, the smaller the return on equity. Once a risk management strategy has been created, the next step is to successfully implement it. Before that can begin there is a need to consider whether the bank has some standardised processes across its branches. Fragmentation will occur if there aren’t any. For example, Mathias illustrates this by providing an example of two trading desks: one residing in New York and the other being situated in Tokyo, but the two offices are revaluing their trades differently. “The data may be granular, but when it puts processes through the system, the data becomes aggregated and so you need to look at how the nuts and bolts work,” explains Mathias. Fragmented processes are key here, but the problem is also worsened when the two offices within the organisation are running disparate IT systems and duplicate organisations are running the same processes. All of the risk factors therefore need to be thought through clearly before the goals and objectives of any risk management strategy can be achieved. To rush in would be like running into the hungry tiger’s cage, and the outcome could be failure rather than success. So the two different parties of the organisation need to have a common risk culture and understanding of the risk factors involved to ensure that the desk in New York and Tokyo use the same risk vocabulary. “Risk management is not just about ensuring that you comply with regulations, it is primarily about managing achievement and organisational objectives, and this could be the risk of not making the desired profits or the risk of failing to meet compliance requirements,” adds Mike McDonagh, an enterprise risk management content strategist at Wolters Kluwers Financial Services. He believes that it’s important for enterprise-level business objectives to be localised and interpreted at all echelons of the business. This approach enables each part of the organisation to have their own objectives and linked to these are risks that may prevent them from achieving them. Staff also play a role in mitigating both the identified and unidentified risks. He says this can be as simple as whether they have read a policy or run a control, and they can also help to identify and assess risks – particularly if they are the ones on the trading desk taking chances with the investments made by the bank overall each and every day for the benefit of its investment banking clients. Much depends on the creation of the right risk culture, and how the bank or another financial services organisation goes about establishing risk management best practices to embed it within its very being. “The process of embedding a risk should therefore emphasise the benefits not just to the organisation as a whole but also to the individual employee,” says Andrew Mosely, chief operating officer at Metapraxis. Benefits of technology “For example risk management technology can introduce timesavings, enabling front-line staff to improve their performance and generate additional revenues; and it can make cost-savings,” he says. So by tackling the uncertainty that is created by the very nature of risk, it is possible for an organisation to use risk management as a way of reducing ambiguity to enable managers to have a system and structure that offers them the ability to make faster and more effective decisions. They should also be open to learning from the pharmaceutical, mining, oil and gas, defence, construction and other industries where risk management is often a matter of life or death. That’s because they are known to have some very focused risk practices to reduce death or serious injury. Software like that offered by SunGuard and SAS, can therefore be used to establish common best practices and processes to increase the certainty that a certain strategy will lead to some element of achievement or reward as opposed to failure. “The real benefit is that you don’t spend time producing numbers, and instead you can spend it on analysing the data and on decisionmaking,” says Markus Gujer, SunGuard Ambit Risk and Performance’s head of product management. The software could be used, for example, to understand certain risk scenarios and to create a systemic and structured approach to managing known or anticipated risks. His colleague David Renz, SunGuard’s risk advisory director for banking, adds that it’s not the software itself that helps, but “it forces them to re-think their risk infrastructure to upgrade what they do in risk management.” The software enables the banking or financial services organisation to think about what it is going to do as time progresses, and it permits them to go beyond compliance and best practice. But to a degree best practice is defined by the regulator. Yet effective risk management is not just about software. There are many factors to consider, including how risk is measured. The most common metric is value-added risk (VAR), but Renz claims that it has in the past exacerbated the turmoil in the market, and he says it contributed to the financial crisis. It affected everyone in the market because they were all following the same trading rules and this in itself made the market very volatile. It’s therefore crucial to tailor an organisation’s risk model to its own business model. “Think of the banks being asked to lend more and have more liquidity; they have to re-think their business models, and they have to find out at what level of capital they can operate with going forward to move towards other risk analysis methodologies,” he explains. “For instance, what happened in the wake of the crisis was that the banks moved from 99.9 per cent VAR to a 95 per cent VAR, which is very unreliable as a gauge of risk because if you move to a lower percentile the bank gains confidence and it can do more analysis to consider the outcomes in the tail – such as using deterministic analysis,” he adds. But risk management software can also be both the hero and the villain in the same way that certain metrics can provide a clearer picture of the reality landscapes than others can. That’s because there may be a huge amount of money being spent by the bank on software that just ends up lying dormant, and which then becomes outdated. “The fact is that the software in use must be integrated into the systems used by the organisation’s employees in their day-today activities,” says Andrew Bale, CEO at Resilient Networks. With this in mind Mosely is right in concluding that the road to successfully implementing risk management strategies and software is never straightforward as there are a number of factors, variables and scenarios to consider. Firms also face a number of challenges, ranging from their ability to get support form their boards to a lack of resources and risk managers can suffer from overly ambitious implementation timescales that they have been given to analyse and assess emerging risks. They will also have to adapt their risk management technology to keep up with an ever changing regulatory environment, and this is not something that risk management software can enable them to overcome. As shown by the financial crisis, the human aspect of risk management and the risk and reward culture it instils can be either a catalyst for success or failure. Poorly trained staff, for example, might end up implementing a process in a detrimental way and so prevention is likely to be better than a cure. That requires the appointment of a chief risk officer (CRO) to take responsibility for embedding, developing and implementing an effective risk management framework. This will also tame the tiger to the point that he becomes more of a valued asset than a dangerous risk. M AY /J U N E 2 0 1 2 P A G E 17 TRADING PLATFORMS The traditional world of stock markets and trading is colliding with social networks. Will this be a marriage made in heaven or a quick fling? Hannah Prevett investigates T rading floors are frenetic, fast-paced environments where the onus is on technology to provide top quality, real-time information to inform decision-making. Meanwhile, the biggest phenomenon to hit the technology world in the past decade has been social, from early contenders like Bebo and MySpace to current must-haves Facebook, Twitter and LinkedIn. The two are now mid-collision, but can the traditional world of trading embrace the social revolution? PAG E 18 M AY /J U N E 2 0 1 2 A social affair Social trading is a somewhat murky term, and there seem to be two definitions in our midst: the first is sentiment analysis of tweets and data on social networks to predict the stock market. Vagelis Hristidis, an academic at UC Riverside in California, recently conducted research into the relationship between tweets and the financial markets to see what sort of influence one might have on the other. And sure enough, he found a correlation between Twitter activity about a company one day and the volume of trading of that company’s stock the next day. Furthermore, he also found that the relationship extended to stock price, meaning Twitter traffic one day tended to mean higher stock prices the next. It is no coincidence of course that companies such as Dell have begun posting their earnings to StockTwits before releasing them to mainstream news sources. And secondly, and of most relevance to this feature, is social trading as a ‘follow the crowd’ mentality, where traders are using a social experience, or network, by which to observe and emulate other people’s trading patterns. Making headlines One of the most high-profile companies to enter the fray is eToro. The Cyprus-based company has made the news (sometimes for the wrong reasons) in the last two years thanks to its OpenBook solution. It has a flashy, sexy interface, where it runs a live stream showing which traders are winning and which are losing in real-time, as well as trade-specific information such as how often, and how much they’ve put up. Users can follow top traders or ‘gurus’ and the system will allow them to copy trades automatically, as they sit back and wait for the cash to roll in. Sound too good to be true? IDC’s Alex Kwiatkowski believes so. “Because it’s got the word ‘social’ in it, people jump on the bandwagon. They think it must be a gold mine. But just because it’s got social in its description, it doesn’t mean it’s automatically going to be a success.” Kwiatkowski is also sceptical about the concept of following the site’s ‘gurus’. “It feels like you’re risking your capital to follow someone and you don’t really know who they are.” He may have a point there. The gurus are selected by other users of the site, so the more followers they have, the higher up the guru rankings they climb. They will be monitored for consistency of behaviour, but eToro doesn’t conduct any in-depth background checks, for example. The gurus will post information about themselves on their page, but it’s a question of trust at this point, as it’s impossible to know if the person pertaining to be behind the computer screen tallies with the reality. But social trading isn’t all about copy trading; there’s the social network part of the equation too. “There is definitely an appetite for this,” says Dr John Bates, SVP and CTO at Progress Software. “Ask yourself why Bloomberg is so successful. It’s because it was one of the original social networks. It was ahead of its time.” One company that has really focused on the social network component is Tradeo. Unlike eToro, which hopes to attract professionals and non-professionals alike, Tradeo admits it is focused on the retail customer, not those in the trading room. “We started by building a full social network where users and traders could meet and chat to one another,” says Jonathan Adest, founder and CEO at Tradeo. “Then we added financial information such as charts and quotes, news aggregation, a calendar, and social trading, which means we read in real-time and historically all of our users’ trading activities.” Social trading is a difficult concept for stalwarts of the trading world to get their heads around. Until the concept surfaced about four years ago, much of the investment process ostensibly went on behind closed doors, conducted in smoke-filled rooms by men in suits, with clients paying many thousands to have their portfolios managed by teams of financial advisors, hedge funds, guru traders and so on. Questioned about the notoriously secretive nature of the City, Adest says that it is only a matter of time before the banking community acknowledges the social revolution: “Social is taking over the world. Who knew we’d be sharing every picture on Instagram or every location on foursquare 10 years ago?” Unsurprisingly, Yoni Assia, founder and CEO at eToro agrees. “A decade ago nobody would share photos of their family online. Now the standard is to have a Facebook account and share every photo online,” he argues. “The world is changing and we’re embracing it. I think our users are probably the smartest traders there are because they’re embracing something new that’s harnessing the wisdom of the crowds. The older ‘professional’ traders might be so late to the game they lose all of the profits in copy trading.” Assia’s certainly presents a strong case for copy trading, and, indeed, eToro. Despite some negative press, (Assia says he loves it when detractors say eToro is “too good to be true”) the company has more than two million users signed up. But for the most part, these are retail customers. Whether or not this is likely to be adopted by the banks and professional traders remains to be seen. A few commentators have likened the effect of social trading on the banking and investment worlds to the impact of the birth of online brokerages in the 1990s. But others are a little more cautious. “I don’t see any evidence of that yet,” says Dr Bates. “These social networks are going to continue to grow and there’s going to be lots of innovation. But can people be comfortable with the combination of transparency and money? The jury’s still out.” M AY /J U N E 2 0 1 2 PAG E 19 ROUNDTABLE Driving opportunities FStech brings you highlights from its outsourcing roundtable, held in London during May, in association with niu that. First thing’s first, let’s try and come up with a definition of outsourcing in the 21st century. Any thoughts bearing in mind the vast array of cloud computing providers? Rob Handicott: I would say it’s a service or a process that’s happening somewhere remotely to your office and you can simply buy in that service from a distance and forget about doing the management of IT in-house. Customers are being sold on having their personal data stored in a cloud environment so it’s coming down to everyday users as well as big companies. “Cloud to me is simply another delivery model.” Andy Rogers: Phil, as the sponsor perhaps you could kick things off by telling us what niu are looking to take from this roundtable? niu: We’re hoping to get an external view on the market in which we operate. We have a few on outsourcing, managed services, the cloud, or whatever you want to call it. We’re looking to get the views of you guys around the table on the lengths to which you want to go down that path and the best way to go about it. AR: Thanks. We always think about outsourcing and the cloud as infrastructure but really it’s the applications that drive the business. What are the critical applications for your organisation? It will be interesting if Glenn from London & Capital can pinpoint Attendees: Andy Rogers, Board Member, National Outsourcing Association Phil Clark, Marketing and Channel Development Director, niu Simon Mitchinson, Business Development Director, niu US bank representative niu: A question I would raise is, often with the cloud, the person providing it is doing multi-tenancy - e.g, Microsoft Access in the cloud. But if you said I want my banking application over there, I don’t want anything to do with it, is that cloud or is it a managed service? Paul O’Hare: It depends on how it’s badged by the supplier. Cloud to me is simply another delivery model. It’s marketed as having a number of benefits over and above those offered by more traditional delivery models, particularly when you go to the public cloud. You can also have a private cloud environment, although this will normally have fewer of the benefits associated with a public cloud offering, and will generally be more expensive. AR: Isn’t that a virtual private network? Isn’t that what it used to be called? And is it truly dedicated to you or is it shared with other customers? Mark Evans: Cloud is just a badge. It’s like R&B, it’s a nice term but actually it has been applied to several different types of music down the years. The real definition is around control. The moment you give over your data or applications or processes to someone else, it doesn’t matter how you describe it, fundamentally you can no longer pull the plug. Rob Handicott, Chair, British Computing Society Financial Services Group Glenn Murphy, Head of IT, London and Capital Paul O’Hare, Partner, Head of Outsourcing, Kemp Little Jamie Watters, Programme Manager, HSBC Global Banking and Markets Mark Evans, Publishing Director, FStech PAG E 20 M AY /J U N E 2 0 1 2 Jamie Watters: For me there’s an element of commodisation of IT. This whole space is driving opportunities for small businesses that won’t be afforded to larger businesses. I think it’s largely irrelevant to organisations in investment banking because of the barriers to entry. We won’t have startup competitors due to the regulatory landscape. But in other areas where you have new start ups who can exploit low cost, commotised IT solutions, there are real opportunities and you will see real innovation coming from FTSE 250, AIM type companies. niu: From our perspective it’s interesting as a lot of people are coming to us saying, I want to buy a cloud solution and from our point of view it’s a nightmare as it’s such a broad term. Where we’re trying to get to is how we position ourselves. We aren’t a public cloud provider, we work with another provider to do that. Where we see ourselves as supporting the clients is around the private cloud environment. It’s not really about the cloud, it’s about designing a bespoke solution that meets the client’s requirements. Because of the hype around cloud, are you guys thinking differently about how you should deploy IT? Glenn Murphy: Cloud implementations are continuing to grow, and offer a great deal of value add. Customisation continues to be a key limitation of cloud when interacting with other systems, and that’s also the difficulty that cloud solutions present for shared services. AR: We talk about the SMEs being agile, but if they were about to erode the enterprise organisation’s market I could see the enterprise organisation companies taking measures to address that. JW: There are a lot of misunderstandings and myths in this area. If you’re out of control in one place you don’t move it to another and get control. You have to move something into that space in a controlled fashion. When you move into this you have to do so in a controlled way, ownership, understand the value, your data etc. niu: Are we saying most people think cloud is multi-tenanted, it’s just out there? GM: One of the difficulties for those in the financial services industry is that they have to mitigate the risk. Mitigation of risk is quite easily achieved if a third party resources the audit requirements fully, for example, if they’re a hosted provider then that ticks the compliance boxes with effective controls demonstrated, but if you go out to these cloud service providers and ask them the important questions on how they are compliant, they will fall short on that. For example, I probably only know of three service providers who are fully compliant in offering the full range of hosted, cloud based services. This raises lots of questions marks, however third parties find it very difficult to fulfil the cost and resource requirements of audit, compliance and controls. RH: The ultimate responsibility still lies with the source. Even if you do outsource it you don’t outsource the risk. PO: One of the other barriers to financial service organisations adopting the cloud is the system and control requirements imposed by the FSA and other regulators. Some of those requirements are difficult to satisfy, certainly in a public cloud environment. AR: How much do satisfaction surveys drive the IT decision making process within these banks? GM: It’s a case of the tail wagging the dog if we progress down that route. If IT is very well synched with the business through strategy alignment the two should work hand in hand. niu: As an outsourced or hosting provider if you can enter a market and say, we’ve been through FSA compliance a number of times, we’ve got several clients who have done this, I think it depends how you define the service boundaries. JW: The fact is no one trusts standards. They can be meaningless. And that’s where there should be a focus right now. We’ve got a world that has gone crazy with controls and we’re putting a huge tax on the supply chain. There’s a whole department, a cottage industry asking these questions. And at the other end we’re being a bit disingenuous. There needs to be a trusted, middle organisation you can rely upon. It would take a lot of cost out of the supply chain and ultimately a lot of cost out of the customer end of things. US bank representative: Is it not that same aversion to risk that prevents anyone stepping into that space? JW: Yes, I think it’s time for us to be more thoughtful. And that’s by working together and agreeing something meaningful. The economies we could make are absolutely huge. AR: So it would be a case of the banks working together for a common goal in sourcing and quality standards? JW: We actually do work together on a lot of these areas. But it’s more that independent view of suppliers we’re looking for. AR: Can the suppliers do some of that standardisation and consolidation in the market? M AY /J U N E 2 0 1 2 PAG E 21 ROUNDTABLE AR: From a cloud service management perspective, I know for a fact that the media and news industry are actually doing that. They use Remedy in the cloud. The news organisations are very keen on that. I know some of the big players like HP are looking to get in on that space. In that multi-sourced environment, who is pulling together the innovation and strategy? “Is there such a thing as a bad service provider?” niu: It would have to be a high tier of supplier to start doing that. We could give it a go. But I would say it needs to be done from industry down rather than supplier up. GM: In terms of the standards and the expectations around the integration between different service providers, questions arise in how that integration is occurring, where it’s being managed, where the data is being held. That affects how your service providers are being seen. The market naturally takes control at that point, the bad service providers fail, clearing the way for a super service provider. AR: Is there such a thing as a bad service provider and has the single sourced model gone? Personally, I think it has. Are you seeing that in any of the deals you’re doing, Paul? PO: At a basic level, the service integrator model is very common in that in a prime/subcontractor model, the prime contractor is acting as the service integrator. But the key difference between the traditional prime/subcontractor model and a genuine service integrator model in a multi-sourcing environment is that the customer is actually saying, we’ll pick the supply chain and you, as service integrator, have to step in, manage, and be accountable for, the other service providers in the multi-source environment. That’s where you start to run into difficulties. Often, customers will be told they’re buying a genuine service integrator model but when you get down to the detail in the contract, you realise that’s often not the case, certainly from a contractual standpoint. niu: That’s an interesting point. As a client you pick a provider and expect someone else to take responsibility for that, but it can be conflicting. Realistically you need to find a service integration supplier who has relationships with providers already in place, who can meet all of your requirements functionally, that’s the right answer. Where there are legacy applications in an organisation, it’s very difficult for a provider such as us to take responsibility for the situation. Regulatory landscape AR: Let’s look a bit more at the regulatory process and how that impacts upon what we’re discussing this evening. PO: The vast majority of deals we’re seeing are multi-sourced. niu: Is there a market for a services integrator? You buy your bits from different vendors as they all have their own specialist functions but have an entity that sits above that? JW: I’d say, yes, but it’s something you have to do slowly. It will definitely be something there’s a market for a few years down the road when things have calmed down a bit. The risk has to be measured in-house. RH: I would imagine there would be quite a lot of demand for such a one stop shop for clients. To roll-out this kind of approach just needs an agreement on how the different standards are going to be managed together. PAG E 22 M AY /J U N E 2 0 1 2 GM: One of the difficult challenges from an IT perspective is that the front office doesn’t see it as an investment, it’s seen as a cost, potentially it can also limit innovation. Naturally that also leads to outsourcing. If you’re good at what you do, you want to look at the internal costs. Especially around change initiatives, these bring in a lot of cost and you might want to bring in external forces to help make that change happen. That’s quite natural. RH: In terms of the compliance part of it, where data is, there is a bit of uncertainty about where responsibility lies. From the customer side of things, when you’re taking a hosted service, if the compliance can be with the hosted service that can be easier to identify. The worry is if the customer is trying to be compliant about where the data is and yet they don’t actually hold it themselves. think it’s a great idea, you have to test it first for five years. You can’t be as flexible as some other industries. ME: It might not be in existing banks’ interests to do this or encourage it, as compliance is a barrier to new entrants. JW: What we’re seeing is more and more investment in governance and control. It’s beyond platinum. We just do it, not with an understanding of the bigger picture, we just do it. But another problem we have is that the regulators all operate to different agendas. JW: In practical terms the only way that would happen if the outsourcer was a bank. Essentially you’re talking about white labelling financial services. niu: The Catch 22 situation is that they want a platinum contracted service but they want to pay plasterboard prices. Good management understands the dynamic that there has to be value in it for them and you. AR: A question for Phil and Simon, are financial services organisations being unreasonable in wanting their cake and eating it? niu: It’s not just financial services. It’s often the buyer. If you said to a buyer, go and buy me a car and I want it to be a nice one. His interpretation of that would be different to your’s. That car delivered to you has got four wheels, four doors, it’s blue but then you differ. JW: What’s happened is they’ve taken understanding, reason and sense out of the equation and replaced it with a bunch of KPIs so they’re measuring on performance with a bunch of metrics. What you get is performance that meets a metric but what you don’t get is long-term service and value and also the intangibles like really good relationships. Is there a bad supplier? I would say there are bad account managers. AR: For global organisations you need global suppliers. How do you feel on the nearshore, offshore role with regard to what’s going on in the world today, for example, cybercrime? US bank representative: I’m not sure it’s just to do with the location of the supplier, it’s much more to do with a maturing perception of risk. Recent years have seen incredible upheavals and, as lessons have been drawn from those upheavals, everyone has become much more risk-averse. Hence the perceived shift to platinum standards that has been mentioned already. AR: What about the personnel of suppliers? How strictly do you manage and control those? US bank representative: Where we do use third parties we’re taking significant steps to ensure they are adhering to the same standards and controls we would have internally. We are very careful about which function we allow to be done in which jurisdiction. For example, there are many client-facing aspects we won’t offshore where this could put relationships at risk. And, to touch on the cloud issue again, there may be parts of a company’s activities that can be put in the public domain, but you need to understand how it’s set up before you do that. AR: Jamie, because of the financial crisis pushing out major savings, how has that impacted some of the decisions within the bank? JW: What we have is a clear understanding of what’s soft and hard. What’s hard is the regulatory space, there is absolutely no appetite for risk in that space. You don’t want to incur the wrath of the regulator, not because you have something to hide. If you want to engage them it’s such a huge cost. We’re a global business so we’re not regulated by the FSA, we’re regulated by a global network of regulators. We have a minimum standard which is the highest watermark and we adhere to that globally. niu: And you can’t take a punt on something, can you? If you “Are FS organisations being unreasonable in wanting their cake and eating it?” M AY /J U N E 2 0 1 2 PAG E 23 ROUNDTABLE obligations down to its subcontractors and supply chain. Zurich also had the right to go in and check that those security requirements were being followed, but they didn’t do that. The requirements weren’t being followed, one of the service provider’s subcontractors lost an unencrypted data tape, and the regulator hit the customer, not the supplier. RH: To a certain extent, when the contract is very closed it doesn’t give any room for innovation on the supplier’s side or give them room for movement. You don’t want to suck suppliers into something too rigid. AR: How many of the consumer side here actually outsource their critical infrastructure? “There are a lot of concerns but also there is a lot of enablement in having a mobile workforce.” Business continuity AR: I’m going to ask the lawyer about business continuity. Can it be insured and managed under a contract? PO: I don’t think business continuity can be guaranteed under a contract. No matter how robust your business continuity procedures are, its extremely difficult, if not impossible, to eliminate completely the risk of business disruption. You can certainly capture the business continuity obligations in the contract and hold the suppliers’ feet to the fire if those obligations aren’t adhered to. You can take huge steps to mitigate the risks but there’s likely to remain a possibility, however remote, that your prime and back up site suffer an outage at the same time. GM: It’s less of a legal issue and more of a practical one. It’s basic stuff, how do you get an assurance that it works and will continue to work? The contract can be key to that but you need the correct approach to resilience and risk management. PO: By and large, well-drafted contracts will contain all the requirements and obligations needed to ensure robust security and business continuity processes. The problem is that, quite often, the contract terms are not followed by the parties. One of the biggest fines the FSA has handed out in the context of an outsourcing arrangement was to Zurich Financial Services in 2010. The contract with their service provider contained all the necessary obligations in relation to data security and encryption, including an obligation on the service provider to flow these PAG E 24 M AY /J U N E 2 0 1 2 GM: That’s a challenging one to realise. It goes back a lot to the contract management for core critical services, both for infrastructure and application availability. Many companies I’ve worked for haven’t taken that leap fully. Partly also because it goes back to the data, and all importantly, where is that data located. AR: Moving onto trends that we’re seeing, such as Bring Your Own Device (BYOD). GM: When it comes to BYOD, there are two perspectives, the end user and the client and then there’s the internal perspective, the staff who bring in their iPhones etc. You almost can’t permit it, the number of controls in place necessitate a barrier that prevents people to take the data offsite in any way shape or form. But if you look at it from a customer facing perspective, for sales staff having an iPad it becomes more acceptable. Naturally, home workers become slightly limited as the remote access function needs to prevent data loss too. RH: There are a lot of concerns but also there is a lot of enablement in having a mobile workforce. You just need the right controls in place. niu: The financial services sector knows it has an issue. So many other industries, particularly the unregulated ones, don’t even know they have a problem. You say, that guy’s got an iPad, is he connected to your WiFi? They have no idea. GM: There will come a point where technology catches up with the devices allowing the controls to be mitigated. Ultimately, protection of reputation and data security is a big issue in the financial services sector so BYOD is still some time away. Efficiency has a new name. So many services, one new name – SIX Multipay, SIX Pay, SIX Card Solutions, SIX Paynet, and SIX Interbank Clearing become SIX Payment Services. We provide nancial institutions and retail customers with secure and innovative solutions for cashless payments, setting industry standards in terms of exibility and customer focus. With over 1000 employees and 13 ofce locations, SIX Payment Services partners with customers in 33 countries, which makes us one of the largest subsidiaries of SIX. In the elds of securities trading and settlement as well as nancial information and payment transactions SIX offers rst-rate services worldwide. www.six-payment-services.com APPOINTMENTS People on the move David Polen Fidessa, a provider of trading, investment management and information solutions, has announced the appointment of David Polen as head of business development. A Fidessa veteran, having spent 13 years at the company in various roles, Polen will be responsible for its strategic development efforts in the US. Andy Morgan Grant Thornton has appointed Andy Morgan as a partner in its London corporate finance team to help accelerate the growth of the business and strengthen the firm’s technology expertise. Morgan has over 17 years’ experience in mid-market M&A and joins from PwC where he led its UK TMT sector team. Massimo Sirolla Auriga, an Italian provider of software/solutions for the banking industry, has entered the UK market. It has opened a London office and appointed Massimo Sirolla, head of international sales, to front it. Auriga manages over 60 per cent of the Italian ATM network (25,000-plus machines) and provides internet banking services to around 600,000 customers in the country. John Jessop Speakerbus, which specialises in trader voice management solutions, has appointed John Jessop as strategic advisor to the Board of Directors. Jessop has over 40 years of financial markets experience, including positions at Telerate Systems and Bridge Information Systems. He is currently a business consultant, based in London, specialising in corporate restructuring. PAG E 26 M AY /J U N E 2 0 1 2 Emma Smeaton Emma Smeaton has joined financial outsourcer HML to head up the development of its forecasting models and meet client and industry demand for increased certainty over the risks and liabilities within their existing lending portfolios. She joins from Santander, where she developed expertise in several areas within credit risk. Simon Barrows Simon Barrows has been appointed head of financial services at Glue Reply, the technology consultancy specialising in enterprise architecture, integration and data. He joins from Lloyds Banking Group, where he was chief architect/CTO for the UK Consumer Banking business for the last five years. Prior to that he was at PA Consulting Group and Detica. Gottfried Leibbrandt SWIFT CEO Lázaro Campos has quit the company. He will be succeeded by Gottfried Leibbrandt, currently head of marketing. Prior to joining SWIFT, Leibbrandt was a partner at McKinsey & Company. “The company has never been in better shape and I feel very privileged to be able to lead it forward at a time of great opportunity,” he comments. K Duker Michael Stumm, co-founder of retail forex trading outfit OANDA, is to be succeeded as CEO by K Duker. Duker’s CV includes heading up Deutsche Bank’s eFX business in Asia Pacific and for the past four years he has served as managing director for OANDA’s Asia Pacific division. Stumm will remain a member of the OANDA Board. 18th-21st June Edinburgh Leeds Birmingham London People and Information Working Together AIIM ROADSHOW 2012 The UK’s FREE Independent Forum for Information Management The race is on! In today’s fiercely competitive environment, the race will always be won by the team with the most efficient processes. To avoid losing ground to your competitors, you need to connect colleagues, suppliers, partners and customers with the information they need, when they need it and where they need it – using strong document and records management coupled with enterprisestrength search, web-friendly collaboration and agile business process tools. At the AIIM Roadshow 2012 you can learn how the latest innovations and best practice in Enterprise Content Management (ECM) can help your organisation to save money, improve services, optimise business processes, get to grips with compliance, ease restructuring and keep up with the leaders in your market. Choose from one of four convenient locations: • 18th June 2012 - Edinburgh • 19th June 2012 - Leeds • 20th June 2012 - Birmingham • 21st June 2012 - London Register now for your FREE place at www.aiimroadshow.org.uk COMMENT Shaken to the core Sandeep Bagaria, head of core banking and card management, banking, SunGard, looks at core banking strategies in these post-crisis times T he global financial crisis redefined many parts of the banking landscape as the waves of economic uncertainty shook banks to their core. The plethora of challenges that the crisis brought with it crushed Return on Equity from above 25 per cent to four to six per cent, forcing banks to reevaluate and in some cases rebuild their operational models in pursuit of renewed profitability. This reevaluation is running right through the heart of the bank which in the case of small-mid tier institutions is the core banking system. In Europe and beyond the core system is viewed by many as the operational lifeblood of the bank, a critical element to supporting customer management, transaction processing, product management and reporting. But do today’s core banking systems provide the required information and transparency to successfully manage the bank post-crisis? For many banks, the core system is the main, sometimes only, transactional and account processing engine and therefore the primary provider of data into the risk management systems. But the integration between the core banking and risk management systems does not always enable complete transparency of the bank’s true risk profile. Integration architectures with multiple layers of extraction, transformation and aggregation remove data integrity, leading to inaccurate and often incomplete information. This lack of visibility is significantly impacting bank management’s ability to steer the organisation through new, post-crisis market dynamics. The core banking system is also the primary system used by staff across the enterprise to conduct front-middle and back-office servicing of customer financial transactions and accounts, and is therefore home to many of the daily processes which need to adapt to provide a new level of responsiveness and agility. As executive management and risk practitioners develop response strategies during times of crisis or indeed in times of ongoing market volatility, the ability to operationalise these strategies throughout the organisation and its processing systems has become a pre-requisite in order to ensure the ongoing stability and safety of the bank. Today, many banks are finding that their core systems are not up to the challenge of supporting these response strategies because the visibility, accuracy and availability of information is simply not where it should be. This is placing the core system increasingly under the spotlight. In March 2012, Michael Versace, research director at IDC Financial Insights, said: “The disciplines of risk and the role of analytics are quickly becoming the new core in banking, redefining in some sense what is “core” in banking.” PAG E 28 M AY /J U N E 2 0 1 2 In response to more rigourous risk management practices, increased regulation and a renewed emphasis on the health and stability of the bank’s single most important asset, its balance sheet, core banking systems must now evolve to support greater assimilation with balance sheet management tools and risk systems in a two-way flow of data and integration of processes. In doing this, the core banking system begins to provide greater levels of efficiency to support strategic cost and customer management, risk adjusted pricing and enterprise risk management. All this helps the bank optimise its balance sheet profile, develop a strategic balance sheet management framework and operationalise learning. So while the requirements of today’s core banking system are clear, this exposes the flaws in legacy architectures, which will hinder a bank’s ability to integrate risk management at the core of the business. This will lead banks to evolve their core renewal strategies, with an increased focus on progressive upgrades. Historically, one of the benefits of the core banking platform was the single, fully integrated platform approach. This model has obvious efficiency gains but banks with large legacy architectures cannot undertake the risk and cost of a systems overhaul or core replacement. A movement towards componentised core banking solutions responds to banks’ desire for modern, advanced functionality in a way that can be implemented piece by piece and run comfortably alongside the bank’s existing architecture. So while the banking world faces continual change post-crisis, the fundamental factor to the future health and success of each and every financial institution is its balance sheet. Banks that re-engineer their operational strategies with risk management at the core will emerge as the winners in the pursuit for future success and profitability. Those that continue to look at core banking strategies through a rear view mirror will pose a serious risk to the future health of the balance sheet. The banking world faces continual change post-crisis. ADVERTORIAL Headsets provide flexible working solution ecoms headsets and detects unsafe audio levels and compresses the signal within milliseconds. ActiveGard doesn’t just reduce, but rather removes dangerous energy from an acoustic burst, eliminating the distortion from an excessive incoming signal and keeping the volume of a sound peak at a safe and comfortable level to protect the user’s hearing. Wearing comfort is another critical consideration, particularly in financial sector environments where workers may be wearing the headset for eight hours a day or more. Sennheiser has undertaken extensive ergonomic research to ensure that the design of its professional headsets are optimised to provide R ecent years have seen a huge growth in flexible working patterns with more and more staff working remotely from the office for all or part of the week. New technology has meant that so called ‘Martini working’ (any place, anytime, anywhere) is now a practical alternative to office based working with substantial productivity benefits for both the enterprise and the employee. As most people find that they get more work done at home, away from the distractions of a busy office, employers benefit from an uplift in productivity. With less workers going to a conventional office building, businesses can also reduce the size of their premises, with substantial cost savings. Unified Communications (UC) technology which brings together all forms of electronic communications in one solution is the facilitator of these changes in working patterns. Increasingly users are connecting to the UC system using softphone client apps via their PCs, notebooks, tablets and other preferred terminal devices. When staff ‘hot desk’ in the office this has the additional benefit of ridding the desk space of phone handset, an increasingly unnecessary device. In industries such as financial services, where desk space in the City of London can be at a premium, this is a real benefit. As a consequence headset attach rates have increased as users need privacy to chat via their smart phone, notebook, tablet or other device. For business use a headset is also the preferred option because it allows the user to write, or type while talking. Sennheiser has a legacy of 65 years as experts in acoustics and audio technology. The German company has a global reputation for high quality headsets and microphones used in professional broadcasting, music industry and aviation all of which demand high quality speech and audio. Using Sennheiser professional grade headsets avoids compatibility issues with existing equipment, reduces operator fatigue and diminishes the potential for confusion between the caller and operator. Sennheiser professional headsets have some unique design features that provide significant advantages for staff. ActiveGard technology is embedded in all Sennheiser tel- all day wearing comfort. Sennheiser recently introduced the CIRCLE Line series of wired headsets for professional workplace use which incorporate important design and safety features. To withstand the stresses and strains of a busy workplace environment CIRCLE line headsets are fitted with a reinforced metal headband designed to last for years. Productivity features include a noise cancelling microphone to filter out ambient noise for optimum speech clarity, and Sennheiser HD Voice Clarity wideband sound to ensure a more natural sounding experience. Office Equipment News magazine has already been awarded the CIRCLE Line series an ‘Office Oscar’ and reported that “Sennheiser headsets excel in sound quality, durability and comfort which are essential in any environment where the user will have medium to heavy call usage.” The CIRCLE Line series has also won the coveted ‘Editor’s Choice’ Award from Business Info magazine. Business Info is a widely respected independent magazine reporting on the business technology market and the magazine’s ‘Editor’s Choice’ Award recognises outstanding achievement. Many workers will benefit from mobility solutions which allow them to answer and participate in calls on their desk phone when away from their desk. Sennheiser’s DW Series of wireless headsets are the perfect solution, offering 180 metre range (line of sight), twelve hours of talk time and fast charging, with four hours talk time in just ten minutes and full charge in one hour. The DW family also supports both desk phone and softphone connection, with simple switching between both at the press of a button. The DW wireless headphone series, offer integration with UC telephony solutions such as Microsoft Lync 2010, IBM Sametime and Cisco Communicator. Sennheiser headsets are available in a choice of monaural (single sided), binaural (double sided) headband and single sided ear-loop wearing styles to suit the needs of all users. Sennheiser has also invested heavily in research and development to ensure that headsets are optimised for simple installation and are simple and intuitive to use. Free trials of Sennheiser headsets can be arranged for financial sector organisations. To know more call 0800 1303955, or [email protected] or visit www.sennheiser.co.uk Q &A Talking heads Stephen Dunnigan, UK country manager, MicroStrategy FStech: How did you get into the sector? Stephen Dunnigan: I got in at the ground floor. I had a love of computers as child – the difference between the computers then and now is mind-boggling – and then went on to study computer science at University. Back in the 80s computing was in its infancy and it looked like an exciting sector to work in and so it has proved. I’ve been in business intelligence and data for a number of years now, first at IBM and now in my current role at MicroStrategy. Data and its use in helping to make informed business decisions has never been more topical and I’m loving every minute. FStech: Who has been the biggest influence on your career? SD: There have been many but one that particularly stands out is a sales person that I worked with back in my time working in sales support. He taught me about the importance of relationships with customers and prospects and also about the confidence customers have in you and how difficult that is to get back once it is lost. Those are ideas that have stayed with me and even now I would say that ensuring our customers are happy is an important part of my role. FStech: Who in the sector inspires you and why? SD: Within IT and business intelligence I would say hand-onheart, that it is Michael Saylor – he is a visionary and an innovator, exactly the type of person that appeals to me. Within financial services it is the people that really make a difference to the customer experience. I find that customer service in financial services can be pretty varied and the people that go the extra mile to resolve your issue or add value really make my day. FStech: Which IT professional do you most admire? SD: A popular choice for many in the industry I know, but without a doubt it would be Steve Jobs. What he did with Apple is astonishing, to re-invent the company was an achievement in itself but the iPad is one of the greatest PAG E 3 0 M AY /J U N E 2 0 1 2 innovations we have ever seen. It is an amazing consumer device but is changing the business world too and it is one of the areas of technology that has changed what we do in business intelligence. FStech: Is there anything that you dislike or that frustrates you about the sector? SD: There is an inherent conservatism with financial services when it comes to mobile and there is no real reason that mobile couldn’t be as well-deployed within financial services as it is in other industries. People are aware of the possibility of mobile but financial constraints and being overly-cautious are holding innovation back. FStech: What technology can’t you live without? SD: As you may have guessed, I am a bit of an Apple-head! So I really couldn’t live without my iPhone. I use it for everything from personal stuff like Facebook and communicating with the kids, to admin such as banking and trading stocks, as well as being an essential work tool, for email, web and more. FStech: How do you relax? SD: ‘Relax’ might not be the best term to describe spending time with my three young boys, but I do love it. As you’d expect they are a bundle of non-stop energy and much of my relaxing time is spent taking them to various sporting assignments or playing sport with them myself. I do, however, get the occasional meal out and moment of peace with my wife. FStech: What was your last banking experience both online and on the High Street and were they positive experiences? SD: Additional services that now come as part of accounts are great, so using my bank for insurance was something I did for the first time recently. It was quick, efficient and competitive and an entirely positive experience. Call for entries – deadline: 8 June 2012 TO E E R F R ENTE The 3rd annual Risk Management Awards are designed to emphasise the importance of risk management as a key driver in business and to acknowledge and reward the specialists working within the sector, from small companies to large multinational organisations. There are 18 categories which you can view at the dedicated Awards website. The winners will be announced at the Awards Gala Dinner and Ceremony at the Lancaster London Hotel on Wednesday 14 November 2012. Queries relating to categories and Queries relating to awards Gala Dinner judging should be directed to: logistics should be directed to: Mark Evans Hayley Kempen [email protected] Hayley.Kempen @cirmagazine.com +44 (0)20 7562 2418 +44 (0)20 7562 2414 Queries relating to sponsorship Queries relating to media partners or should be directed to: marketing should be directed to: Graeme McQueen Sarah Whittington [email protected] [email protected] +44 (0)20 7562 2434 +44 (0)20 7562 2426 Enter online now at: www.cirmagazine.com/riskmanagementawards In association with: Awards Gala Dinner and Ceremony Lancaster London Hotel Wednesday 14 November 2012 Innovation: a way of looking at the world and seeing it differently than anyone else At BT we’ve been looking at financial services for 30+ years and seeing what others haven’t AWARDS 2012 We looked at electronic trading. Where others saw circuits, we designed a global, low-latency fabric that interconnects a financial services community of more than 15,000 locations around the world. WINNER Cloud Computing Innovation of the Year BT Unified Trading over BT Radianz Cloud We looked at voice trading. Where others saw multi-line phones, we created a collaboration environment for the trading floor that integrates e-mail, instant messaging, social media, video, and client management. We looked at post-trade messaging. Where others saw a replacement for faxes, we developed a secure, reliable, non-repudiable connectivity and messaging service that improves the efficiency and reduces the costs of electronic trading. We looked at cloud technology. Where others saw networks and servers, BT provides access to cloud-based products and services for every function and every step in the trading environment. We spend a lot of time getting to know our customers and industry in order to create innovative products and services that improve communications for the financial community, and we’re proud when BT is recognized for this innovation. Today, we’re especially proud to accept the FStech 2012 Cloud Computing Innovation of the Year Award for BT Unified Trading over the BT Radianz Cloud. 2010 From the trading floor to the back office. From market data and pre-trade messaging to clearing and settlement. BT delivers a complete, cloud-based communications and connectivity solution for financial services. Bringing it all together bt.com / GBFM AWARDS 2011 WINNER awards Tenth Anniversary Innovation of the Year CLOUD COMPUTING WINNER Nationwide: Cabling & Networking Service Innovation in the Cloud: a broader perspective Howard Boville, Managing Director Unified Trading & V.P. Financial Markets, speaks about the BT Radianz Cloud and capturing FSTech’s Cloud Computing Innovation of the Year Award Congratulations on winning FSTech’s Cloud Computing Innovation of the Year Award for BT Unified Trading over the BT Radianz Cloud. We see and hear about cloud all the time, but is the walk matching the talk? It absolutely is. Of course, the internet is a very general example that everyone can relate to since it seems to play into every aspect of our lives today. However, in the world of financial services, cloud technologies are actually very specialised tools for enabling the trade process. A cloud platform can provide a trading firm with every aspect of market connectivity needed to facilitate the trade process from low-latency connectivity to markets supporting high-frequency trading, to digital voice facilitating trading and relationships, to batch processing of end-of-day net asset valuations. You rarely find discussion of such diverse aspects of trading as low-latency, voice, and batch processing in one conversation. What’s different about the way BT views the cloud compared to the way others see it? Our view is from a larger perspective. We’re not trying to solve a single problem with a single product. We look at financial firms and the financial services industry holistically. We envisage not a specific network technology, but a closely interwoven fabric in which the global financial markets operate. This “market fabric” creates a unified financial community consisting of buy-side and sell-side firms, banks, exchanges, market data providers, and clearing and settlement, and payments facilities. Market fabric is an unfamiliar term. Can you elaborate on that? Market fabric is to cloud what information is to data. The concept of market fabric recognises the value BT brings to our implementation of a financial services cloud. BT’s market fabric gives access to a range of services that enable trading, most obviously, network connectivity to pre-trade, trade execution, and post-trade financial services providers. The market fabric allows trading firms to access these services quickly and simply. However, it goes beyond connectivity to include other inthe-cloud services such as voice, data communications and collaboration. Users have access to market centres at points within the fabric, to enable hosting of collocated or proximity services for low-latency access to electronic markets. As such, it provides the foundation firms require to go to market in the most flexible and efficient way, at any point in the business process. FSTech 2012 Cloud Computing Innovation of the Year Award: BT Unified Trading over the BT Radianz Cloud We look at financial firms and the financial services industry holistically. We envisage not a specific network technology, but a closely interwoven fabric in which the global financial markets operate. - Howard Boville, BT for Financial Services This view of the world seems very complex. The issues facing the industry can, in fact, be very complex; however the model is actually quite elegant in its simplicity. The cloud links a firm with its clients, counterparties and service providers in a flexible, unified, multi-media environment. This creates a unified approach to trading infrastructure that promotes internal efficiency, improves client relations, and facilitates regulatory compliance. Can you give an example of how this works in a trading firm? While the majority of trades today are automated, not every trade is executed through an algorithmic engine. More importantly, there aren’t algorithms for building and maintaining client relationships. Because of this, firms recognize the need to integrate their voice-based trading and relationship management with their automated trading, order management and post-trade systems. Added to this is the burden of managing ever increasing volumes of internal and external data as well as the expanding regulatory compliance requirements. Being able to access the community of customers, counterparties and service providers, in an easy and cost-effective way, is vital to the firm’s success. The cloud brings simplicity, flexibility, enabling firms to work smarter. Let’s talk about the award. What were the reasons for BT’s winning this award? The BT Radianz Cloud has been a pioneering platform that provides low-latency connectivity, hosting services, and secure messaging technologies creating the world’s largest secure, networked financial community. The breadth of this community spans trading operations from market data services, to trade execution facilities, to governance, risk and compliance applications. Now we’ve integrated BT Unified Trading to incorporate voice, video, and other multimedia as an application that can be integrated into a firm’s business processes as readily and naturally as any other data applications. This allows traders to monitor their algorithms while remaining in constant communication with customer through voice, video, e-mail, IM, etc. At the same time, the cloud can link remote trading floors via high-definition video to give traders a qualitative assessment of the global trading environment. bt.com/radianz bt.com / unifiedtrading ROUNDTABLE Risks and rewards On Thursday, 15 May, FStech (in association with sponsor Adapt) gathered together leading players in the FS sector to discuss the pros and cons of cloud services. Scott Thompson rounds up the highlights Simon Barrows: In terms of where to start, a recurring issue, one of the big challenges from an industry point of view, from a supplier perspective and a challenge from a risk point of view for end users, is cloud security. It’s a case of, convince me that the whole cloud computing paradigm is secure and I can trust it. And in the FS sector you have the added consideration of regulation over and above good business practice. industry but in other ones, whereby a company will use three or four cloud services which they integrate into their own infrastructure. You effectively get the best-of-breed of each service, you cherry pick your best cloud. That’s one of the problems with the cloud, there are lots of woolly definitions. Public, private and hybrid are fine but there are too many people jumping on the hype. That’s one of the negative sides. Philippe Chaput: First thing’s first, there are two types of cloud, the public cloud and the private. So I guess before we go into that discussion we need to define which one we’re talking about. Steven Murgatroyd: And you have the distinction between what is now called cloud but 10 years ago was called outsourcing. SB: Yes, maybe we should spend a few minutes on the various definitions of the cloud - public, private, hybrid etc? James Carnie: Public cloud generally means a multi-tenanted environment or “shared”, private cloud is a dedicated platform and a hybrid model is a mixture of the two. Within the definitions of cloud there are then the commonly known categories of IaaS, Paas, SaaS and BPaaS, which often form the service providers portfolio offerings. For example, Adapt play in the IaaS and PaaS space with a range of platforms across private, public and hybrid clouds utilising a mix of shared and dedicated environments. Keith Bucknall: One thing we’ve seen is hyper hybrid, not in this Attendees: Simon Barrows, Head of Financial Services, Glue Reply (chairman) SB: It’s a spectrum of things, from the traditional IT outsourcing definition at one end through to the public cloud at the other end. Henry McKeon: To give MoneyCorp’s take on it, we’re a 600-plus people organisation built up over 30 or so years. Infrastructure wise, we suffered from a major outage after a flood. We did everything we could to resolve the situation but that accelerated the move to proper hosting. We took a big decision to make a large investment, looked at several companies to partner with and over time we decided Adapt were the right partner. We’ve been doing a lot of testing and, in terms of the design of the solution, storage was very important for us so we looked at several different designs, speed, resiliency and now we’re making moves to that environment. For me, Adapt are a good partner. In terms of the cloud, a lot of people are hesitant but for me it’s about having that availability out there. Keith Bucknall, IT Technical Architect, Equity Insurance Group Philippe Chaput, IT security professional Mark Child, Partner - Technology Risk Management, Kingston Smith SB: From an internal stakeholder point of view, if there was initial resistance how did you overcome that? Consulting IT security expert Anjdeep Gumani, IT security professional Robert Marshall, Director of Finance and Accounts, Trident Insurance Henry McKeon, Head of IT, Moneycorp Steven Murgatroyd, British Computing Society Financial Services Group HM: One of the biggest hurdles was the size of the investment. It was a large sum. It was a case of looking at the growth plans and strategising. It really was necessary to go to the cloud and buy solutions to help us accelerate growth, working with Adapt to make sure we made the right choices. It’s not fully in use yet but we’re starting to move our core systems over. Richard Norris, IT Director, Cullum Capital Ventures Tim Holman, President, ISSA-UK Stewart Smythe, CEO, Adapt James Carnie, Head of Solution Architecture, Adapt PAG E 34 M AY /J U N E 2 0 1 2 SB: You mentioned the process you went through in terms of choosing a partner. What were the key things that swung it in favour of Adapt? HM: Price was important obviously but also the enthusiasm, the flexibility and the willingness to go places others might not. Stewart Smythe: Where would you place security? HM: Security played an important role. We deal with cards so we have to comply with PCI standards. When we were building this we wanted a hardened environment. In terms of data security, we run lots of different end points protection and again we talked these things through with the architects at Adapt. Mark Child: Can I throw in the first curveball? It brings a smile to my face when I hear the term “zero risk strategies.” There is no such thing as a zero risk strategy in the cloud and I’d go as far to say there is no such thing as a secure cloud. We have reviewed numerous organisations and very rarely do you find a cloud computing contract that is legally permissible. Certainly within the PCI space we spend a great deal of time considering mitigating controls because the Data Security Standard (in my opinion) doesn’t give enough consideration to all aspects of virtualisation. When we’ve performed audits of virtual estates, we have yet to come across a cloud provider, whereby we haven’t identified significant security and/or regulatory failings. We spend a great deal of time trying to educate clients as to the associated risks with virtualisation and cloud computing in general. SS: By that you mean a shared environment? MC: No, even in a private environment. Typically we find ourselves “punching holes” through the logical security arrangements. Organisations struggle to understand their data and its respective components; invariably we find that they are unable to advise us as to where all instances are. SS: In your experience, do you see a different level of understanding and appreciation of security risk from an in-house environment relative to a service provider? Is there more maturity in-house on these security issues? SM: It’s interesting you say that. Of the cloud presentations I’ve been to over the last 12 months, the majority of them have been presented by lawyers on the basis that most of the technical stuff can be taken care of but that’s not the case with the legal/ contractual aspects. MC: Can I just come back to Adapt? How much in terms of due diligence would you typically expect an organisation to perform when seeking to enter into an arrangement with you? JC: It depends on the sort of organisation you’re dealing with. A FS organisation will typically have a very mature approach to audit. Even for a public domain platform, a large banking team’s audit function will crawl all over you. Audits typically comprise of a series of conference calls, sharing design schematics of the platform, followed by a long security questionnaire usually based on ISO 27001. A site visit to datacentres usually follows which includes inspections of physical security controls. SS: I’d say we get a pretty rigourous technical audit and a pretty weak cultural audit. PC: How many of your customers have said they wanted to use your services for non-critical data? I believe you have a market for that out there. SM: One of the traditional outsourcing tasks that the banking industry has been doing for years is statements printed by an outside supplier. How does the information get to the supplier? Do they put it in the mail or on a disc? It’s still customer data and it can get lost. PC: Once you understand the data, then you have the processes and following on from that you know how you want to manage and distribute that data in one system or another. Because not everything is about technology, know what you have and manage it according to what you need. MC: It varies, in that in-house staff tend to have a better understanding of their environment; that said, their appreciation of the emerging risks/technologies in the logical security space is often somewhat lacking, it’s not uncommon to find a CISO in denial. It’s essential that the vendors need to better understand the regulatory environment and how it affects their clients. MC: This is the issue we invariably encounter and end up spending a disproportionate amount of time trying to unravel. We are engaged by organisations who have entered into what on the face of it is a pretty reasonable agreement, then we look at the data and say, you do realise your cloud provider is managing data that transfers or resides in multiple jurisdictions and therefore you’re probably in breach with one or more data protection directives. SS: OK, so you are breaking security down to a technical aspect, a regulatory aspect and a cultural business aspect KB: We have offshore manual processing on certain claims processes and it’s a case of, what due diligence have you done M AY /J U N E 2 0 1 2 PAG E 3 5 ROUNDTABLE there? As a technology department you need to go to the business and walk them through the data process because they think data is a technology issue when it’s not. PC: Exactly. It’s not against the business. It’s a culture change. I see myself as a security ambassador as I try and explain this to the business. And in fact they know more than they think they do. Technology is only there as a support medium, to send the data, it’s still the business’s data. SB: If we go back to the definitions (traditional outsourcing through to private, public and hybrid cloud), I’d be interested to hear about the limit to which people have gone. Who has gone the furthest in terms of leveraging the various opportunities of the cloud as well as managing the associated risks? KB: SaaS for us, that’s as far as we’ve gone. We’ve just finished a three year technology strategy where we brainstormed various ideas, but we stayed away from the cloud even though you could say the size of the organisation is well suited to it. SaaS for various types of services, one in particular being email archiving. Another one would be some sort of internet security. SB: Is that a true public or private cloud offering? KB: Email archiving is more of a public cloud service. Anjdeep Gumani: We are increasing the number of SaaS that we have. We have various projects where everything is provided as a SaaS by private companies. It becomes quite difficult because sometimes the business doesn’t understand the data. Technical controls are not enough, it needs a change in mindset. IT security expert: It used to be that, to get into a complex outsourcing arrangement, our lawyers would sit down with their lawyers and spend a small fortune producing a 30 page document neither side was particularly happy with. Now some guy in marketing with a company card and a few clicks on the internet can place you in a complex outsourcing arrangement. There was some interesting research recently which highlighted that 80 per cent of organisations who thought they weren’t in the cloud were in fact in the cloud, thanks to some guy buying in a service or hosting something out there because it was cheaper and faster to do that and bypass the IT department. MC: I like to ask, how many of you are on Facebook or LinkedIn? Do you ever share any work based discussions via these forums? Yes, we do! So there is a risk that you are discussing and therefore providing access to proprietary information in a cloud-based environment. It comes back to my earlier point, of organisations and individuals not understanding their data estates and not having appropriate cloud strategies. SS: It sounds like, at a board level, the security issue is not a dominating factor, even in financial institutions? MC: I’ve worked in information security for a large part of my career and only come across one organisation (GE) where information security is flagged as the number one risk to the whole corporation. KB: What are the execs doing though, with their iPads and mobility? IT security expert: But that’s not proper. Take non executive directors, people who are entitled to your most confidential data but are not employees or bound by any of the rules you can attach to employees. The strategy in most of the firms I’ve worked in is, let’s print out our most confidential data and post it to them. As opposed to building some kind of platform where you can host it with a certain level of security. That’s considered risky compared to the traditional way of doing it. Tim Holman: Post is insured, isn’t it? In the cloud you lose something you don’t get anything back. IT security expert: With post you’ve transferred all the risk. Richard Norris: Are the cloud service providers’ security any better or worse than what most people have in their local environments or is it just comparable? MC: I think that in many cases it’s probably comparable; that said I go back to my earlier point that you can “punch a hole” in anything if you really want to. RN: So therefore is it even worth debating it, to a certain degree? KB: Dare I say Dropbox. IT security expert: When people say, I have nothing in the private cloud, I think, how did you work that one out? PAG E 3 6 M AY /J U N E 2 0 1 2 MC: To an extent, other than you have numerous regulators and the subsequent fines and/or reputational risk you have to provision for. The challenge as I see it is that it’s becoming impossible to keep pace with the hackers. Technology is advancing at such a pace that many organisations simply can’t keep up, but are under immense pressure to provide their staff and clients with the latest technology. RN: Knowledge is their USP, isn’t it? MC: I’ve just been at the US Embassy and they said they are seeing on average 450 new malware variations a day, all of which either have been, or have the potential to be, exploited. On that basis, how do you advise a client on what’s good and bad in terms of information security? KB: On the other side, I was at a presentation at the Cloud Computing Forum and the point being made by one particular company was, you can rely upon a cloud provider that probably has 10/15 security experts, some of whom are ex-hackers. MC: The reality is that if you have the correct policies and procedures and have effectively defined your respective data classifications, there is not a lot of data within an organisation you really need to protect. As such, assuming there is an underlying strategy I am actually fairly supportive of the cloud. I often find myself asking organisations as to why they are concerned about putting non-critical applications into the cloud. SB: Does anyone have a business critical application in the cloud? Robert Marshall: People are certainly heading that way. But it begs the question, who is regulating the regulators? Who is managing what they do? We’re all going down this road and no one is saying, stop and think, is it to the benefit of anyone? SM: Basel II operational risk requirements are that you have a 99.5 per cent confidence. Well, even UK power stations don’t have that. They shouldn’t say, we want you to be as competent as x because they don’t know who x is. It’s totally unrealistic but, as far as I can see, no one is pushing back on this stuff. PC: It’s about showing a maturity in your approach to managing information. They can’t tell you you are wrong if you do that. MC: In relation to the EU Data Protection Directive proposals, whilst the sentiment is applauded, some of the proposals are simply unworkable and we have already seen a number of objections raised. Implying that organisations will be fined two per cent of their annual global revenues for a breach, will have every major corporation considering the possibility of a dedicated information security department. Introducing a “right to be forgotten” requirement is admirable but largely unenforceable given how data proliferates across the internet. Having to immediately advise of breaches, when invariably these take time to come to light and/or in many cases you would want to investigate and mitigate/remediate prior to notification is likely to present many organisations with some challenging questions. It’s about demonstrating appropriate controls. KB: In a scenario, say you’re in the cloud, IaaS, PaaS, do you guys have exit strategies? You’ve given all your data over to a provider, how do you actually get that back? That’s perhaps one thing a lot of people don’t think about. JC: Yes, it’s data lifecycle management from start to finish. To come back to an earlier point, it was said, did anyone put business critical systems out in the cloud? Pretty much every customer we’ve got would say the platform we look after has business critical aspects. We have customers processing millions of pounds of transactions through platforms that we host and manage. Not every FS company is that brave, but there are organisations who will outsource significant critical part of their estate. SB: That’s the key. I’ve not heard anything so far this evening from a security or regulatory point of view saying you cannot or should not do this. Much of it is about perception and interpretation. There doesn’t seem to be any inherent reason once you strip away all the myth and the nay saying, so what’s stopping people from taking that leap and when will we reach that tipping point? JC: When we look at our FS customers pretty much every one of them bar a few internal IT delivers back end processing, typically my customer is not IT but the marketing department; typically the security guys don’t get involved until someone says, “Should we involve them?” as they haven’t been involved in vendor selection. Security may not be the marketing department primary focus. HM: We went live in January with a customer facing payments and FX platform, which isn’t hosted with Adapt at present but we will be moving to them. It basically allows customers to access all their history, make card payments, to deal online and receive premium rates, the architecture behind what we built over the last three years was the intelligence system, we then exposed those services to a web facing application. So the data’s not actually hosted where the customer facing part is, we specifically built it that way. But there are risks, nothing’s ever totally secure. M AY /J U N E 2 0 1 2 PAG E 37 ROUNDTABLE IT security expert: If you put locks and bars on your doors and windows at home, you’re not going to keep out that hypothetical super cat burglar, but the message you are sending is, my neighbour is a softer target. That’s the nature of what we do. SB: What are the key points you will take away from this evening and how far do you think the cloud paradigm will go? RM: Mark made some interesting points about regulation. You need some kind of regulation that keeps pace with technology, which is changing by the week, and until you have that people will err on the side of caution. JC: We are going to get a point where not only people are looking to outsource, but will also look at the world differently. I predict that we won’t even consider purchasing physical hardware from the likes of Dell or HP but you will rent resource on a purely utility basis. The challenge for us as service providers is to move with that model, provide a secure service wrap around those utility services that is customised to our customer’s needs. TH: If business is moving to the cloud it saves them a hell of a lot of money and data protection can be an afterthought. Also, mobile technology is moving forward so quickly any business who wants to have a mobile optimised website, for instance, will have to turn to a cloud provider to help them out. Watch the space from a mobile front. Finally, also watch Microsoft’s vision of cloud computing. With Office 365 they are making clear moves to put everything in the cloud. MC: I love the concept of one big infrastructure centre; hackers will have a field day! Perhaps we are unduly concerned about security; let’s face it the younger generation could even be considered blasé, seeming to be willing to share their most intimate details in very public forums. You can basically get into any system if you are desperate enough and have the required resources. Technology will continue to evolve and who’s to say that in five year’s time cloud computing may be old hat. I expect we will continue to see technology consolidated and the younger generation having been exposed to whatever “pain” may ensue after a generation of sharing everything, are likely to want security back at the top of the agenda. AG: For me the key point would be when my users are going for the cloud they need to understand what information they are going to put out there. I would want to see more awareness of the impact of that and also some sort of standard of the cloud, clear measures and controls in place, to certify the cloud to, something like regular independent reviews. PAG E 3 8 M AY /J U N E 2 0 1 2 IT security expert: The technology’s not new, what is new is process, the idea that my marketing guy can get himself into a complex outsourcing arrangement, that’s the bit that is tricky and fast moving. The big problems are not technology problems, they’re process, human resources, control problems. PC: As I said earlier, know what you have. There’s a very strong marketing push behind cloud but, as you noted, it’s not new. Know what you need and address it in the way you need it, don’t be worried about following the flow of everyone else. If the cloud can provide a level of security, guaranteeing that my data will not go anywhere, that will give me a level of assurance to deliver more of my critical data. At the moment, once it’s out there you’ve lost it and right now I don’t feel there are enough assurances around that. HM: It’s inevitable that stuff will start to move out to the cloud. Data is key and protecting your data as well as process and control. I expect Adapt to be better than the other guys and I expect us to be better than the other guys and in that way you deter people from coming in and attacking you. Having solutions and a provider who can help protect you from that and bring some expertise, that’s what we need from a partner. SS: As a service provider, I am looking at servicing two requirements. Moneycorp’s problem statement as Henry articulated is my core market – expensive, poor, legacy infrastructure driving too much business risk. I have to prove that I have better infrastructure than you guys, strategically invest in it through time and have a technical and operational capability that is better suited to managing it. A leading security focus throughout Adapt’s offering will continue to build confidence in this market. In terms of additional security requirements specific to the financial sector, I have learnt that it is for a subset (ten per cent) of your data. In order to meet these requirements we need to demonstrate our appreciation of the regulation you face and open our business up to allow you to see how deeply embedded security themes are in Adapt’s culture. We also have to work together on building processes that allow us to adhere to your specific security standards. SB: Generally, do you see people with a clear strategy of what they want to do? SS: Definitely. No question about that. Most of our customers are today only offering up a subset of their requirements to service providers as they build confidence in this way of working and increasing their business with us as this trust grows. FS tech IT Constant target SECURITY SUPPLEMENT Features 40 Get the message As the threat of network attacks intensifies and changes, network managers are attempting to up their games. But, asks Andrew Williams, is the message hitting home at board level? 42 Security aware Paul Golden looks at how the financial services sector is coping in the face of internal and external data security threats 44 The big fight Liz Morrell casts an eye over an intensifying cat and mouse game between financial services companies and cyber criminals NETWORK SECURITY Get the message As the threat of network attacks intensifies and changes, network managers are attempting to up their games. But, asks Andrew Williams, is the message hitting home at board level? T he financial sector has long been at the forefront of best practice in combating network security. But the fact remains that if hackers want to get into an organisation and are determined enough, they will find a way. So, how is the threat of network attacks changing? What are the latest solutions designed to stop them? And are the important messages about network security getting through to senior managers within the financial sector? Network attacks have increased both in numbers and in sophistication in recent years, representing a growing threat to financial institutions. However, in spite of the existence of increasingly sophisticated techniques, Vaughan Jones, regional director financial services and insurance at McAfee, explains that many recent attacks on banks have also been ‘rather low-brow,’ public distributed denial of service (DDoS) attacks. Although these aren’t very technical, they are still effective, and have resulted in a push to build ‘real solutions’ for how companies deal with DDoS. “It’s also forced the security industry to up their game. Most basic DDoS attacks should not be a huge problem these days given the solutions that have come out of these attacks,” says PAG E 4 0 M AY /J U N E 2 0 1 2 Jones. “As long as banks have money, people will continue to target them. It’s just that now, they have a million ways to do it with little physical risk to themselves. There’s no need for guns and masks when the infrastructure is connected to the internet. The threats themselves haven’t changed, just their prevalence and complexity,” he adds. Ron Gula, CEO at Tenable Network Security, agrees, pointing out that the threat of attack has increased because there are more people who want to steal information, steal money and ‘make political statements. In his view, although there are always vulnerabilities and risks with any technology, what has changed in the past 10 years is a dramatic growth in the number of different types of ‘bad guys’ that want to perform ‘insidious and harmful actions. Meanwhile, Mark Child, partner at Kingston Smith Consulting, highlights the fact that the threat is continually increasing and evolving. As technology develops, so ‘new holes in the armour’ are produced. “Not that long ago, mobile phones were simply used for making calls. Now they hold lots of corporate information, which is always valuable to someone – and that someone will find a way to abstract it. The key threats today are memory scraping the increase, however, is the use of social networking tools (like) Facebook and Twitter to trick users. It has been noted that scammers are sending out bogus invitations and message notifications to LinkedIn users that contain links to compromised websites,” he adds. malware, weaknesses in cloud security and mobile devices being used to access financial accounts,” he says. Hacktivism The rise in so-called hacktivism has attracted a great deal of attention in the last couple of years and is a driving force behind a number of attacks. Large financial institutions, in particular, are often the target of attacks because they support some law, policy or activity that offends the hacktivists. According to Jones, while many people will argue that hacktivism is nothing new, it has never been witnessed at such scales and with such a ‘flagrant disregard’ for legal action. “Despite plenty of warning in some cases, many targets fell prey. I think we have learned that when someone says they are going to attack you, don’t ignore it. This is also changing how companies think about their image. Some of our clients have expressed concern that they have recently tried to elevate their public image, but realise they may have made themselves a target,” he says. In contrast, although Child agrees that hacktivist attacks have been increasing, his view is that they are ‘not generally targeted’ towards the financial sector. He also points out that they often tend to be more intent on publicising political messages rather than penetrating networks for gain. “What is on The weakest link In facing up to the threat of network attacks, Jones’s view is that managers need to start looking at their environment ‘from the ground up.’ For him, a full assessment of networks, applications, malware and incident management capability is crucial. “Many companies often execute security policies without strategy, and forget the basics with a barrage of ‘new’ solutions appearing on the horizon. Even if you have a world-class, highly intelligent team in place, it’s good to validate that the security solutions you are deploying work like you expect,” he says. Child believes that ‘by far the most important action’ is to dramatically increase staff security awareness training. “You can have all the hi-tech security solutions in place you like, but the weakest link is always human and that is most frequently the initial route used to gain the knowledge to facilitate an attack,” he argues. He also stresses that Chief Information Security Officers (CISO) must be far more proactive, highlighting the fact that all too often they are ‘in denial’ or not willing to relay concerns to the executive. “I have recently come across some really good tools, such as FireEye, demonstrating that security vendors are rapidly catching up with the criminals in terms of effective counter measures. Unfortunately, more often than not there appears to be a reluctance on the part of the CISO to go ‘cap in hand’ to the executive requesting yet more funds to combat what is an extremely difficult moving target,” he says. So, broadly speaking, is the message getting across to senior management? According to Jones, awareness has been elevated recently because so many household names have been ‘publicly embarrassed.’ “We can all go back to what we were doing before and hope it won’t happen to us, but that’s a poor risk mitigation strategy. The time to do something is when you aren’t under duress, but proactive security is less popular because it requires an increased amount of investment,” he says. Child agrees, rueing the fact that it generally takes a serious incident to bring home the vulnerabilities that most organisations face on a daily basis. Until then, he says, there always seem to be ‘more pressing concerns.’ Meanwhile, although Gula believes that network managers are well aware of the risk, he is far less confident that the message is getting through to end users and corporate executives. He highlights the fact that network security managers often need to spend a lot of time justifying security initiatives and asking for more monitoring. “A more general understanding of how attackers target organisations and users without causing a panic would be good,” he says. M AY /J U N E 2 0 1 2 PAG E 41 DATA SECURITY Security aware Paul Golden looks at how the financial services sector is coping in the face of internal and external data security threats T here have been some high profile lapses, but it is clear that financial institutions are going to ever-greater lengths to prevent loss of sensitive data. Deloitte’s most recent global financial services security survey (published in 2010) referred to a ‘turning point’ in attitudes to security as the majority of respondents moved from reacting to threats to embracing new systems and processes. The consulting firm also found that lack of resources was the least important barrier to ensuring information security and that security spend was protected at a time when many other areas of expenditure were being cut. The financial services sector has been particularly active in collaborating internally and with external parties to ensure they cut through the large amount of data that exists and have the right information in place, according to Greg Day, security CTO at Symantec. Andrew Yeomans, board member of information security group The Jericho Forum and head of security engineering for a major international bank says larger financial services companies can draw on considerable in-house security knowledge PAG E 42 M AY /J U N E 2 0 1 2 and expertise and that there are many firms providing support and information services to the sector. “The threat from both internal and external security breaches is carefully considered. There have been increasing occurrences of malware (software designed to gain unauthorised access to computer systems) targeted at retail bank customers, which can also target internal users and could be used for accessing data remotely.” The most severe - if not always the most frequent – breaches are conducted by cyber criminals who can execute targeted attacks against financial institutions, usually beginning with a ‘spear phishing’ message to trick an employee into downloading malware and hence gaining a foothold in the financial institution’s network, explains Andre Stewart, international president at Corero Network Security. Staff are often described as the weakest link in security processes. However, Yeomans says that in his experience, employees of financial services companies are encouraged to flag up concerns and generally have a good understanding of potential threats. “More training would always be welcome, but information is made available,” he adds. The power of ‘security aware’ users should not be underestimated, reckons Dani Briscoe, research services manager at the Corporate IT Forum.“Companies now acknowledge that people are the backbone of the organisation and they are no different when guarding and protecting the data. Visual branding continues to sell the message to users and provides a daily reminder of what they are dealing with. Complacency can lead to accidental leaks and apathy toward the value of the data that is worked on.” She refers to “effective lines of communication up, down and across the business” as being important to promoting the message at all levels as well as keeping the IT security department approachable. According to Michael Paisley, head of operational risk at Santander, maintaining high levels of technical expertise in-house and continually monitoring external developments in the threat environment is equally important. “Collaboration between vendors/system integrators and clients varies by vendor and product type. There is greater collaboration with the more specialist products.” All financial institutions are subject to risk exposures originating externally or from within the organisation, he continues.“However, the frequency and severity of these risks are dependent on the context within which the financial institution is operating. It is therefore critical that appropriate risk assessments are conducted.” Paisley explains that the FSA has carried out a thematic review on data security, which makes clear the expectations that it has of larger financial institutions - for example, implementing technical controls that ensure data is only written to authorised portable storage devices and is encrypted. Yeomans describes the penalties for failing to protect sensitive data as a sufficient deterrent to institutions who might be tempted to cut corners. “Fines generate negative headlines. Even at the sevenfigure level they are not unaffordable, but reputational damage is a major consideration.” There are several reasons why financial institutions are unable to take shortcuts when it comes to data security says Paisley, a point taken up by Corero Network Security’s Stewart. “Penalties are not the prime motivation, though they are a factor. The actual losses associated with a data breach are far more significant. These direct and indirect costs can include investigative and remediation costs; downtime; customer notification and follow-up services; brand damage caused by breaches; and loss of customers.” For penalties to be taken seriously they must be enforced, adds Symantec’s Day. “Forthcoming EU disclosure legislation will help increase the visibility of incidents where data has been exposed through malpractice, which will be a positive step towards discouraging organisations from making similar mistakes. We must then start to clearly validate and enforce penalties where controls were significantly below the standard that should be expected. However, it is also important to differentiate between breaches that have occurred due to poor security controls and those that happened even when the right controls were in place.” BYOD: security threat One of the challenges for those charged with securing data in the financial services sector is that they are effectively trying to secure a moving target. No sooner do they address one potential threat than another emerges, one of the more recent being the use of personal devices at work. In a whitepaper on communications security within financial services organisations published in April, Avaya highlighted the trend toward BYOD or ‘bring your own device’, which has forced IT managers in financial institutions to adapt to the growing requirements of mobile and remote workers. A survey conducted by the Corporate IT Forum in July 2011 found financial sector respondents felt that the impacts from allowing personal devices on to the network were potential data loss and data theft versus increased employee satisfaction. Authentication methods are predominantly hardware-based and often take the form of a small device or token that provides a one-time password the employee uses to access secure applications and services. Thomas Bostrøm Jørgenson, CEO at authentication software developer Encap, claims hardware tokens are expensive for financial institutions and cumbersome for employees and that software-based authentication using smart device technology is a cost-effective alternative. Stewart recommends that personally owned devices should be treated as external to the institution and access to financial information and other sensitive data restricted accordingly. “Mobile device management, network access control and mobile security tools should be used to exercise control over the use of these devices based on policy.” Financial institutions have discussed the potential security threat from personal devices, says The Jericho Forum’s Yeomans. “One solution is to ensure sensitive data cannot be stored on these devices and therefore cannot be lost if the device is misplaced. Where data has to be processed there are products that allow information to be sandboxed, although there is some trade-off between usability and data security. However, these products will improve and I expect more security features to be built into personal devices over the next few years.” Simon Rice, principal policy adviser for technology at the Information Commissioner’s Office (ICO), describes training and raising awareness as two key components of a data protection strategy the ICO would expect to see in place at any financial services organisation. “We would expect any responsible organisation handling personal data in a heavily regulated industry to be able to address the risks to personal data posed by mobile devices,” he concludes. M AY /J U N E 2 0 1 2 PAG E 43 COMBATING CYBERCRIME The big fight Liz Morrell casts an eye over an intensifying cat and mouse game between financial services companies and cyber criminals C ybercrime is an increasing risk to any business but throw in the potential immediate wins from attacking financial services companies and it’s little surprise that the sector is one of the most vulnerable. Indeed according to PWC’s Global Economic Crime Survey, published last November, cybercrime ranks as one of the top four economic crimes, coming only behind asset misappropriation, accounting fraud and bribery and corruption with risks that include damage to both reputation and company wallet. And it’s a similar concern for the World Economic Forum which identified cybercrime as a major risk to the financial services industry in its annual Global Risks report for 2012. No-one argues cybercrime is big business but, with attacks largely undisclosed, judging the scale of the problem is tough. “In financial services we see very few security breaches reported but we know that are under constant attack and that some of those attacks are getting through,” says David Spinks, CSIRS chairman. In the PWC survey half of respondents in the financial services industry felt that the risk of cybercrime had increased in the past 12 months compared with 36 per cent for other industries surveyed. John Yeo, director at Trustwave SpiderLabs EMEA, says this has prompted a change in thinking. “There has been a philosophical mindshift in that it’s no longer ‘I’m confident we’re secured against attack’. The smart ones are saying what do we do when we are attacked and so are geared up to respond.” Motivations have changed as criminals have realised the wins. “We have recently witnessed a clear shift from a for-fun environment, where hacking and attacks were primarily carried out to show the hacker outside-the-box thinking aptitude, to a context driven by profit,” says Dr Lorenzo Cavallaro, professor of systems security at Royal Holloway Information Security Group. Nick Staib, security specialist at HSBC and First Direct, also notes that cyber criminals mean business. “What has changed in the last five years is we have seen online fraudsters are not just very organised but are also increasingly clever. Our job is to stay one step ahead. We don’t see cybercrime as a problem but a challenge to be met head on.” Expanding landscape Companies are increasingly exposed to the threat of cybercrime because their public arena is now so much wider than ever before. “In part, the risk of cybercrime is growing due to the expanding landscape of how organisations conduct business and PAG E 44 M AY /J U N E 2 0 1 2 engage with customers online, e.g. the rush to mobile applications to increase online commerce, and in part because of easier access to tools and techniques used by cyber criminals. This combination results in low risk, high reward opportunities for fraudsters, who can be located anywhere in the world with internet access,” says Kris McConkey, PwC’s forensic technology lead on cyber security. The increasing adoption of multiple channels of access is also widening risk. Mobile and social media are two of the most recent to increase risk with social media particularly allowing criminals to change tactics. “The sophistication of attacks is increasing. Where previously you would have someone getting through via the firewall now the trend is on collection of data and identity theft,” says Spinks. This means social media is particularly a problem because of the rich personal data it can contain. The extent of the risk to mobile is debatable. Some say it’s a channel that is not yet being targeted. “Mobile hasn’t been attacked yet and at the moment apps are limited to people you have paid before so for the fraudster it is of little interest,” Staib notes. Indeed, he argues that checking balances and other services via mobile rather than the internet is actually safer because the individual is not in the online environment where attacks normally happen. Cavallaro observes that mobile malware is on the increase and the channel seems vulnerable as it opens up because the same protection that PCs share is not available on mobile devices. “The threat is there. If you look at one of the challenges it is that the operating system vendors don’t have the understanding of financial services so the systems aren’t there for protecting them,” says Thomas Bostrom Jorgensen, CEO at Encap who argues that multi-factor authentication is a must. McConkey says financial services companies must get to grips with the risks. “The pace of mobile adoption has been very attractive to businesses, but the understanding of risks associated with the mobile platforms has struggled to keep pace.” Mobile devices are also opening financial services companies up to the risk of security breaches amongst employees. “Mobile devices may generally store a mix of user and company data, exposing the latter to potential leaks that are not under the company control anymore,” says Cavallaro. Yeo agrees: “There is a lot more to be done from a due diligence point of view looking at how you are storing data, how it is moving around the environment and whether people have had unauthorised access”. He highlights his research which suggests it takes an average of six months for data breaches to be discovered. Financial services companies are working hard to combat cybercrime and to some extent it is working but many describe it as a cat and mouse game. Typical defence tactics include a shift towards 24x7 transaction monitoring, browser protection services, security certificates, malware detecting software and anti-phishing solutions as well as authentication measures such as 3D Secure for online shopping and dynamic passwords, SMS passwords, tokens, DAP/CAP technology and transaction signing for accessing online/mobile banking. Increasingly customer behaviour is being analysed to discover anomalies in account use. “We have a fraud engine that is checking transactions and detects anomalies in behaviour – that then goes into a fraud queue to be checked,” says Staib. Response is then key and calls for a managed security provider or departments that are 24/7. However, according to McConkey a frightening number don’t have such access. “More than a third of UK respondents to our survey said that they have no access, internally or externally, to forensic technology investigators to provide the rapid response required when dealing with a cybercrime incident. Having this ‘hotline’ and being able to respond quickly is critical to successfully mitigating and remediating incidents.” As well as technology solutions financial services companies must consider their own business processes too - from training (of both staff and customers), access controls to monitoring and reporting – all of which often see a varying level of focus, according to McConkey. An important key to beating cybercrime lies in collaboration – sharing risks, threats and knowledge between banks and financial services companies. Staib says most banks do work together well on this. Yet McConkey argues such collaborative approaches must be evident within the business too. “Big leaps forward can be made if organisational silos can be broken down. For example, marketing teams often have sophisticated tools to monitor social media trends and customer engagement. Security teams would benefit from being able to apply the same technology in their role.” Financial services companies must also be very aware of the risk of insiders within their businesses. “Nearly all successfully executed cybercrime involves an insider threat. That is most worrying because I can put all the barbed wire I want around my building and spend billions of pounds on security but if one of my employees has the keys to the IT system and gives them to someone else then all my defences have been breached,” comments Cavallaro. Of course, the harder the challenge the more likely cyber criminals will divert their attentions elsewhere and this means that financial services companies should pay particular attention to weaker links in their supply chain and running due diligence on third party suppliers. “The PwC survey shows that cybercrime and fraud more generally is on the rise at small and mid size companies,” says McConkey. Yeo adds: “Across our caseloads we looked at who was responsible for systems administration of those breached and in the majority of cases (76 per cent) it was a third party that was compromised,” he says, suggesting that the trend to cloud computing may further the risk. Cybercrime is big business and its perpetrators operate in a parallel industry of their own. “There is no question that cybercrime activity has become increasingly organised, innovative and focused,” says McConkey. “Advanced cyber threat groups are patient, they invest heavily in the research and development of custom malicious code and clever means to exfiltrate data. They have internal hierarchies, technical training and target lists in much the same way that large enterprises do, and they are methodical and persistent.” Cavallaro backs this up: “It’s like managing a real-world legitimate business. You have exploit kits to make up for the technical skills you may miss out and, if someone doesn’t have the in-house knowledge to develop a service (e.g., infecting hosts, writing sophisticated malware), than, this can be purchased on the internet by other cyber crooks.” Cybercrime is constantly evolving. In the same way that technology advances are reshaping how the financial services industry operates and the services it offers to customers, so increasing computer power is also opening up the ability for attack. It seems the cat and mouse game between the two parallel worlds will continue for some time yet. M AY /J U N E 2 0 1 2 PAG E 4 5 DIARY Coming up 04-05 July: TradeTech DACH 23-25 April 2013: Infosecurity Europe 2013 Location: Germany Website: www.wbresearch.com/tradetechdach/ Location: London W: www.infosec.co.uk 24-26 September: Business Analysis Conference Europe 2012 FStech roundtables Location: London Website: www.irmuk.co.uk/ba2012 26 September: FStech Social Media Roundtable Location: London Website: www.fstech.co.uk 17 October: FStech Retail Banking Roundtable Location: London Website: www.fstech.co.uk 24 October: 2012 Retail Systems Awards FStech hosts a number of exclusive roundtables throughout the year, attended by leading industry figures. Past topics have included payments, IT security, mobile, fraud and datacentres. The roundtable discussions last for 90 minutes and are followed by a three course meal and networking opportunities. They also receive editorial coverage in FStech, both in the magazine and online. For enquiries about attending our roundtables, please contact Hayley Kempen at: [email protected]. Or on: 020 7562 2414. For sponsorship enquiries, contact Sonia Patel at: sonia.patel@ fstech.co.uk. Or on: 020 7562 2430. Location: London Website: www.retail-systems.com/awards 29 October - 01 November: Sibos 2012 Location: London Website: www.sibos.com/osaka.page 01 November 2012: FStech/RS Payments Conference Location: London W: www.fstech.co.uk/payments 28 March 2013: 2013 FStech Awards Location: London W: www.fstech.co.uk/awards 16-18 April 2013: TradeTech FS tech FS tech Location: London Website: www.wbresearch.com/tradetecheurope/Home.aspx Got an event to publicise? Send the details to Scott Thompson, Editor, FStech at: [email protected] Further information on industry events at www.fstech.co.uk/events Now available: Free FStech iPhone app Featuring The latest financial technology news; FStech features looking in depth at key issues; Whitepapers on new and emerging technologies Just search for ‘FStech’ in the app store awards 2011 Keep up to date with the latest issues affecting the financial services technology sector with FStech magazine. Every edition of FStech looks at the issues that you should be considering, with unrivalled news and comment on the regulations, trends and technologies affecting your business. So don't miss out – subscribe today to ensure you receive every issue! Simply complete the form below or call 020 7562 2424. DONT MISS AN ISSUE! Invoice Details: I would like an annual subscription to FStech Name ....................................................................................................... rPlease invoice me Job title ................................................................................................... rPlease find enclosed a cheque for Company Name .................................................................................... Address..................................................................................................... £149 (UK)/£179 (Rest of world) rPlease debit my Visa/Mastercard/Switch (Amex not accepted) .................................................................................................................... .................................................................................................................... r£149 (UK) r£179 (Rest of world) Postcode ................................................................................................. Tel .......................................Fax................................................................ Card no.................................................. .................................................................................................................... Expiry.................................................. Email ........................................................................................................ Valid from...................Issue no (Switch only) .......................................... Delivery Details: Signed ...................................................Date.................................................. Name ........................................................................................................ Job title ................................................................................................... Please return your completed form to: Company Name ..................................................................................... Address..................................................................................................... FStech Subscriptions .................................................................................................................... Perspective Publishing .................................................................................................................... Sixth Floor Postcode ................................................................................................. 3 London Wall Buildings Tel .......................................Fax................................................................ London, EC2M 5PD Email ........................................................................................................ or call 020 7562 2424 COMMENT Spotlight on SEPA Majid Moujane, payments specialist, Callataÿ & Wouters, discusses the latest SEPA developments T o avoid regulation in payments, the European banks represented by the European Payments Council (EPC) developed the Single Euro Payments Area schemes (SEPA), starting the SEPA Credit Transfers services (SCT) in 2008 and SEPA Direct Debits services (SDD) in 2009. The European legislator supported the initiative by creating the harmonised legal environment through the Payment Services Directive 2007/64 (PSD) and regulation 924/2009 on cross-border payments. Facing the slow adoption of the EPC schemes and standards, the payment stakeholders asked legislators to give clarity to the project by setting an end date to the usage of existing national schemes for credit transfers and direct debits in Euro in the SEPA area. This resulted in the introduction of the regulation 260/2012 in the European Union official journal. The regulation sets an end date but also establishes technical and business requirements for unionwide credit transfers and direct debits in Europe. Many European countries have now migrated a critical mass of their credit transfers to SEPA, however the changes required for direct debits are larger and more complicated. I fear that corporates could delay as they may feel that the SDD products are not mature enough and will still evolve in the coming years. So where do the key differences in SCT and SDD lie? With credit transfers the EPC scheme is compatible with the new regulation except for the (BIC) Bank Identifier Codes. EPC SCT rulebook requires that Payment Service Users (PSU) must give IBAN and BIC, whereas in the new regulation only the IBAN would be required from the PSUs. Early movers having already collected IBANs and BICs for the accounts they pay to, or the accounts they collect money from, can continue using them until the EPC takes a decision and makes eventual changes to the rulebooks and implementation guidelines. For direct debits, the requirements from the European legislator as expressed in the PSD and the new 260/2012 regulation do not exactly match with the EPC SEPA direct debit schemes. The PSD stipulates that the debtor has the right to refund if the authorisation didn’t specify the exact amount of the payment transaction and the amount collected exceeds the amount the payer could reasonably have expected, taking into account his previous spending pattern. The SDD Core scheme foresees a no-questions-asked refund procedure available within eight weeks of the debit date. Regulation 260/2012 gives the debtor the rights to unconditional refunds and adds some supplementary rights to protect the debtor. With the new regulation the payer received the following additional rights: Right to instruct its PAG E 4 8 M AY /J U N E 2 0 1 2 Payment Service Provider (PSP) to limit a direct debit collection to a certain amount or periodicity or both; Right to block any direct debits to the payer’s account; Right to block any direct debits initiated by one or more specified payees; Right to authorise direct debits only initiated by one or more specified payees. In the current official versions of the EPC SEPA rulebooks it is not possible to specify the amount and or the periodicity and only the first right of the list mentioned above is foreseen: the SDD scheme stipulates that a debtor has the right to instruct the debtor bank to prohibit any direct debits from his account. In the near future (no later than 1 November) a proposal for revision of the PSD will be announced by the legislator and we can expect it will take into account the rights and obligations set in the new 260/2012 regulation and the prevailing market situation. We can also expect changes to the EPC SDD core scheme or the release of an additional SDD scheme to cater for the non-covered requirements of the new regulation 260/2012. Two years before the end date of legacy credit transfers and direct debits in Europe and four years after the go live of SEPA we are still facing changes both from the legal point of view and from the banking payments schemes’ definitions. The new regulation clarified the necessity to move to union-wide European payments but at the same time introduced additional business requirements that will bring changes to the SEPA schemes. The expected changes may have an impact on corporates, banks and payment clearing and settlement infrastructures. The challenge for the payment industry is to adapt the rules and the systems and accelerate the transition to SEPA payments by designing attractive, secure and cost-effective payment products for payees and payers. Success relies on the capability of banks to offer services that take the legal requirements as a minimal set of rules to comply with and not as the final aim of their payment services and products. Above the core activities of credit transfers and direct debits processing, banks need to offer additional optional services that improve the consumer and the enterprise experience. Adequate payment products meeting customers’ needs and standardised at the level of the European single market are the two conditions that will allow the SEPA countries to reap the expected benefits and give Europe the lead it aims to have in the payments field. Some countries are already proposing additional improvements to payment instruments and payments solutions which suggests this will be the next focus amongst banks and legislators, as they begin to assess whether regulation is required to ensure more creativity and consumer protection. FS tech FS tech Don’t miss out To be kept up-to-date with the latest news, views and issues affecting financial services technology, sign up for our FREE weekly email news alert straight to your desktop. Sign up at: www.fstech.co.uk letters to the editor LETTERS PAG E 5 0 M AY /J U N E 2 0 1 2 PAPERLESS THE WAY TO GO suffering cash flow issues, this near real-time payment As the cost of postage soars, businesses need to be model is compelling. There is no need to worry that thinking carefully about how much post the finance the cash will not be available to fulfil the payment in department is mailing out. Too many organisations are three days; or to hope that customers’ payments will still reliant on print, photocopy, post and manual filing have arrived in time. The payment can be authorised of paper documents. Yet with Britain now officially in based on current funds. It also provides an excellent a double-dip recession, businesses need to realise that disaster recovery solution. If an organisation’s Bacs a paperless strategy in the finance department can payment fails for any reason, having the Faster deliver significant savings. Electronic creation, delivery, Payments option ensures payments will still be made authorisation, storage, management and processing of on time, avoiding the dangers of negative publicity, financial documents will not only significantly reduce disgruntled employees and disenfranchised suppliers. business postage costs, but it will also eliminate Of course, Faster Payments is more expensive per manually-intensive admin tasks whilst freeing-up filing transaction than Bacs. Organisations will continue to cabinet space and supporting environmental policies. use Bacs for predictable payments such as accounts The reduction in manual intervention and streamlined payable and permanent payroll. The key is to ensure authorisation will enable businesses to focus attention the business can alternate between payment just on exceptions, minimising time spent answering mechanisms as appropriate to support business needs queries, searching for invoices and tracking from a single platform. The ability to move between authorisation across the organisation. By tightly Bacs, Faster Payments, international payments and integrating document management technologies with even cheques from a single platform using the same financial systems, organisations have the ability to security, workflow and validation controls delivers a reduce their postage costs, transform business new level of payment flexibility to UK businesses that effectiveness, impose far greater control and, typically, could prove critical. achieve ROI within six months. Richard Ransom, Bottomline Technologies Gary Waylett, Eclipse Group SECURING MOBILE BANKING THE FASTER PAYMENTS OPTION Many banks have responded to the threat of fraud by As organisations, especially SMEs, struggle with introducing technological security measures while escalating payment delays and poor access to capital, protecting customer accounts. The past decade has payment flexibility is becoming critical. The ability to seen a massive rise in internet banking and mobile exploit multiple payment options, including Faster banking is now hot on its heels. While mobile is not Payments, is becoming a key tool in improving cash without its own set of security challenges, it is also flow and minimising business risk. Faster Payments has providing new opportunities when it comes to seen significant growth amongst consumers since it securing internet banking – used correctly, these was launched in 2008. In 2010, 426 million payments measures can maintain or enhance the customer were processed with a total value of £164.2 billion. experience and are readily accepted by the consumer. However, with no bulk facility, the Faster Payments Two factor authentification is increasingly common, service has had limited corporate appeal, being used however many customers are finding the need to use as an occasional one off payment mechanism to a separate standalone device, which can be a address a specific issue. Now, with one bank in the UK significant inconvenience. In order to combat this, offering the service specifically designed for corporate surely the obvious approach is to provide an app for a customers there is a chance for businesses to leverage mobile device which can act as a ’secure key’? This this payment method to improve control and maximise would be significantly more convenient as most cash flow. The key difference with this corporate people are more likely to carry their mobile with them. service is the ability to make bulk payments in the An alternative approach is to utilise mobile banking to same way organisations use the Bacs payment service. authorise the internet banking transaction. As well as However, in contrast to Bacs, which has a three day being convenient, this provides additional security lag between sending a payment request and the benefits. The use of a mobile app could help maintain payment being made, Faster Payments occur within security, while improving customer acceptance of two hours. And, unlike Bacs, the service provides security measures by providing an alternative to the organisations with a complete reconciliation of the established two factor authentification methods. payment file within 30 minutes. For any business Jason Woodfield, IPL Letters to the Editor should be emailed to: [email protected] PROFILE Keeping control Scott Thompson meets ExactTrak’s Norman Shaw and discusses his company’s “unique” USB memory key, Security Guardian A ccording to the latest Internet Security Threat Report released by Symantec, lost or stolen devices (USB sticks, laptops, smartphones and tablets) accounted for 34.3 per cent of global data breaches, making it the largest category. Theft or loss of these devices accounted for 18.5 million exposed identities. For financial institutions, the implications are far reaching, including the threat of hefty fines and reputational damage. Step forward ExactTrak, which has developed Security Guardian, pitched as the only USB stick that provides the ability to control the use of data and securely delete it remotely. After four years of research, development and piloting schemes, the product, available with either 16 or 32GB storage, became commercially available earlier this year and managing director, Norman Shaw, believes it is perfect for the heavily regulated financial services sector. ExactTrak, of course, is not the only outfit operating in this area. Let us not forget the heavyweight partnership of Imation and IronKey, announced last year. But Shaw argues that his company has found a niche. ”IronKey have a good product, so why produce a rival one when you can take it to the next level? This is completely unique,” he says. The press release for Security Guardian sells it as the ‘Fort Knox of USB memory sticks’ although there is more to it than that. The tracking element is also hugely important. No access to the internet is required for this. Security Guardian has integrated GPS and GSM, allowing for accurate position information in the case of loss. Supporting the remote units is a cloud-based management console, hosted on Fujitsu’s Global Cloud Platform, that provides a verifiable audit trail of how, when and where the data is accessed as well as all necessary information to satisfy the most stringent data security legislation. And for those users who become uneasy at the thought of a Big Brother society, ”you can turn it off if you don’t want people to know where you’re going.” Shaw adds: ”It’s not a glorified tracking device, however. It’s designed around the data, not tracking. It also enables organisations to set location-specific policies governing their operation.” And that’s why he feels the product could make waves in the financial services sector, with Shaw claiming interest from several companies who have to stay compliant with data handling regulations and need to prove they remain fully in control of their data, even when it is not in their immediate proximity. Up until this point, many of the high profile data breaches have come courtesy of the public sector, but, as Shaw points out, ”they have to report it, the private sector doesn’t.” That’s all about to change, though, as mandatory disclosure for the financial services sector is set to start at the end of the year. With EU Data Protection Directive proposals looking to drive a more data-centric approach to information security, the time could be right for a product such as Security Guardian. It’s sold as a service, however, not a product, the aforementioned partnership with Fujitsu meaning its Global Cloud Platform hosts the back-end infrastructure. It weighs in at £300 a year per device for the first year, with the price dropping in the second year. Add ons, such as location-based services, cost extra. As his company doesn’t sell directly, Shaw is on the lookout for resellers. ”Companies like Fujitsu who provide that managed service. It probably wouldn’t be attractive to the smaller reseller.” BYOD challenges So, where to next? The product is moving beyond proof of concept trials, which have involved a leading global bank, an oil company, two Formula 1 teams, a system integrator for the defence sector as well as central and local government services. Although he is currently unable to reveal names, Shaw talks of ”extremely positive” feedback and interest from financial services companies. ExactTrak has also developed a BYOD version of the stick which ensures that corporate data and private data are held separately. This only allows the user to access the corporate network via a secure portal. Although implementing a clear policy around workers using personal devices for work-related purposes, including compulsory password protection, is a good idea, it still has weaknesses as it does not account for workers losing their device, and many companies simply do not know how many devices are being used to access corporate data, as the enterprises are so large. Security Guardian uses GPS so that if a loss occurs, location is possible. It is implemented as a service whereby no device will be able to access corporate data unless the Security Guardian key is being used. This ensures that IT managers are aware of exactly how many are accessing the corporate network and no one will be able to access the network without their knowledge. By issuing all staff with a key, IT managers can see where all devices are at all times. You can turn off the data so that if a device and key are lost, the data cannot be accessed. Shaw concludes: ”Essentially Security Guardian removes the biggest threat to data caused by BYOD and that’s human error.” M AY /J U N E 2 0 1 2 PAG E 51 COMMENT Constantly changing The banks’ battle to adopt digital channels is proving to be a double-edged sword. Ken Cregan, financial services principal at Capgemini Consulting UK, looks at the changing relationship between banks and their customers in the UK I n these uncertain times, digital solutions present both an opportunity and a threat for banks. While there is the potential for the sector to develop stronger relationships with its customers through digital channels, it also faces major challenges from the new, more nimble entrants such as Google and PayPal, who are seen to be delivering customer centric mobile solutions at a much faster pace. For customers, banking through digital channels presents the opportunity to manage their money at their convenience, increasingly through mobile devices. This year’s World Retail Banking Report from Capgemini and Efma predicted that mobile would overtake desktop as the primary window through which to view our finances by 2015. The report also identifies services, fees and ease of use as the key drivers for loyalty. Mobile is a key focus area, for all the right reasons. Research has shown that 70 per cent of respondents in a banking survey believe it will increase or significantly increase customer satisfaction. This is in conjunction with the view that it will potentially reduce overall costs by five per cent while increasing revenue by seven per cent. Align this with the predication that mobile will soon overtake desktop as the leading web access point and you see why there is so much effort attention being paid to this space. The move towards digital entails big changes for both banks and customers. Digital will become the primary channel for transactions, and the key window into enabling customers to manage their money, taking away a significant current role for branches. For customers, this gives us the ability to manage our money at our ease, anywhere, anytime. Customers’ expectations of what banking should be like in the digital space are being shaped by their positive experiences with Apple, Amazon and others but frequently not met by the actual experience they are having with their bank. Banks have a number of structural challenges to overcome in order to meet these expectations. Internal systems and operating models restrict their ability to deliver new digital offerings at speed, with timescales of 18-36 months from idea to delivery being normal. In fact, these timescales are being regarded as outstanding in some cases. Almost without exception innovative digital proposition development is a weak area. Innovation and delivery engines need to be created, enabling banks to define new services rapidly in partnership with technology providers and with customers. Sadly their traditional governance and business PAG E 52 M AY /J U N E 2 0 1 2 processes make this very difficult for them to actually achieve. The digital space is constantly changing, with new offerings and technologies emerging daily. Banks are currently playing a dangerous game whereby, because of their inability to innovate at speed they are evoking a ‘fast follower’ strategy and trying to play catch up by creating and launching their own branded version of the innovation. This, of course, assumes that they are geared up and capable of delivering on a fast follower strategy – generally they struggle to do this too. If they are going to be ‘fast followers’ it’s important for banks not to underestimate the capabilities required. To satisfy growing customer expectations they will need to be able to respond rapidly, in digital time, to changing technological advances. There is also the external threat being posed by the entry of non-banking entities. These are seeking to take advantage of mobile’s ubiquity and convenience to offer banking services, and take ownership of the window into the digital banking space, and on services such as payments. The importance of this can’t be underestimated. This is the fight for the customer relationship, and the data associated with their transactions. However, it is not all doom and gloom as changes are underway. New deliver capabilities are being developed (albeit slowly), both internally and through partnerships with niche technology providers and telcos. Banks are launching new solutions. Lloyds Banking Group in the UK, for example, is using near field communication (NFC) to support contactless payments at the 2012 Olympics through special-edition phones commemorating the games. ING Direct, meanwhile, offers mobile payments that occur when individuals tap their phones together via “bump” technology, and Barclay’s offering Pingit allows users to send and receive money using their mobile number. Commonwealth Bank in Australia, meanwhile, is using crowdsourcing to integrate customers into the innovation process. It’s also being acknowledged that the manner in which banks and customers interact is changing with some banks taking the first steps towards repurposing the branch networks to support a more advisory than transactional role. The day when branches support the digital channel may not be that far off. Whether the banks or consumers like it or not, digital banking will drive significant change in how we manage our money. awards Celebrating Innovation Wednesday 24 October 2012 Lancaster London Hotel Now open for entries! Deadline for entries: 27 July 2012 E E R F TO R TE N E The Retail Systems Awards, now in their seventh year look to recognise excellence and innovation in the field of information technology within the UK retail sector. They present an opportunity for organisations to gain the prestige of public acknowledgement as being the leader in their field. The awards are FREE to enter and there are 20 categories to choose from. An extensive panel of independent judges will meet to decide the winners, which will be announced at a black tie awards gala dinner and ceremony on the 24 October 2012 at the prestigious Lancaster London Hotel, a night of networking and celebration. Book your table early to ensure a prime position in the room at the networking event of the year. ENTER ONLINE NOW: www.retail-systems.com/awards Sponsored by CTORY OF chDK EI RYEFS FS tech tech P L AY ERS ch FS tech FS tech ch CALL 0 2 0 7 5 6 2 2 4 3 0 S O N I A . PAT E L @ F S T E C H . C O . U K FA X 0 2 0 7 3 7 4 2 7 0 1 OR 020 7562 2429 [email protected] To make the directory section as easy as possible to use, we have added an index of headings below. These are listed alphabetically in order for you to find the products and services you are looking to source. • • • • • • • • call centre technology and applications core banking and payment solutions data warehousing and data analytics erp / business solutions international address management it infrastructure solutions it security solutions management solutions • • • • • • • mobile voice recording payment efficiency and risk solutions payment efficiency payment solutions retail banking and consumer finance telecoms provider voice over ip CALL CENTRE TECHNOLOGY AND APPLICATIONS Business Systems (UK) Ltd 5th Floor No 3 London Wall Buildings London Wall London EC2M 5PP T: 0800 458 2988 W: www.businesssystemsuk.co.uk E: [email protected] Business Systems provides voice, mobile, screen and VoIP recording and analytics Red Box Recorders Ltd The Coach House Tollerton Hall, Tollerton Nottingham NG12 4GQ Red Box brings simplicity to digital recording, with flexible solutions that are easy to specify, install and manage. We focus on voice and data capture: Red Box software solutions cover everything from storage and event logging, to retrieval, playback and analysis. Our latest products incorporate web-based interfaces for worldwide access to replay, configuration and maintenance. We have over 20 years' experience and a strong reputation for innovation. Little wonder, then, that Red Box solutions are used in over 120 countries. Tel: +44 (0)115 937 7100 Fax: +44 (0)115 937 7494 email: [email protected] www.redboxrecorders.com solutions to financial institutes. These solutions enable regulatory compliance, transaction verification, dispute resolution, fraud and market abuse detection, liability prevention and order confirmation. Founded in 1988 the company has built an impressive 'one-stop-shop' reputation for implementing complex projects on time, offering independent advice and 'best fit' solutions supported by a strong maintenance and service offering. Over 40% of City institutions rely on Business Systems for their voice recording requirements. CORE BANKING AND PAYMENT SOLUTIONS FIS FIS delivers banking and payments technologies to over 14,000 financial institutions in more than 100 countries worldwide. We are proud to provide core banking, card T: +44.1923.710.123 W: www.fisglobal.com E: [email protected] management and transaction processing services to forty of the top fifty global banks, including nine of the top ten. FIS is a member of Standard and Poor's (S&P) 500® Index and is ranked the world’s number one overall financial technology provider in the FinTech 100 rankings. Headquartered in Jacksonville, Florida, FIS employs approximately 30,000 people on a global basis. For more information about FIS, our products and services contact us on +44.1923.710.123, email [email protected] or visit fisglobal.com DATA WAREHOUSING AND DATA ANALYTICS Kognitio Ltd. 3A Waterside Park Cookham Road Bracknell Berkshire RG12 1RB Tel: 01344 300 770 Email: [email protected] Website: Kognitio is at the forefront of Business Intelligence, Data Analytics and Data Warehousing. By coupling high-speed, analytical database technology with industry-leading skills and services Kognitio empowers financial companies to undertake activities such as; customer loyalty, credit and risk management, compliance reporting, competitive edge retention, product pricing and profitability analysis. With their award-winning relational database (WX2) and bespoke technical solutions Kognitio WX2 gives financial organisations the ability to turn their raw data into valuable business insight - fast. D I R ECTO RY O F K EY PLAYE R S CALL ERP / 0 2 0 7 5 6 2 2 4 3 0 S O N I A . PAT E L @ F S T E C H . C O . U K FA X 0 2 0 7 3 7 4 2 7 0 1 OR 020 7562 2429 [email protected] BUSINESS SOLUTIONS DataFlux enables organisations to analyse, improve and control their data through DataFlux Enterprise House 1-2 Hatfields London SE1 9PG an integrated technology platform. With DataFlux enterprise data quality and data integration products, organisations can more effectively and efficiently build a solid information foundation that delivers a unified view of customers, products, suppliers or any other corporate data assets. A wholly owned subsidiary of SAS (www.sas.com), E: [email protected] DataFlux helps customers rapidly assess and improve problematic data, building the foundation for enterprise data governance, compliance and MDM initiatives. To learn more about DataFlux, visit www.dataflux.com. INTERNATIONAL ADDRESS MANAGEMENT Grand Union House 20 Kentish Town Road London NW1 9BB T: F: E: W: +44 (0) 20 7428 1255 + 44 (0) 20 7267 2745 [email protected] www.capscan.com Capscan is a leading supplier of UK and international addressing software. Our addressing solutions enable you to capture, verify and enhance name and address data, and are compatible with solutions from Microsoft, Siebel, Oracle, SAP and Unisys. Capscan's flagship product, Matchcode, is available as a stand-alone programme for data capture, a web-based tool for online data capture and as a tool for batch cleansing of commercial databases. Matchcode can be integrated with Ordnance Survey data sets to allow mapping and logistics rationalisation. Capscan also supply rapid addressing and mailsorting solutions, as well as a competitive bureau service. IT INFRASTRUCTURE SOLUTIONS email: [email protected] telephone: (0)1895 202 781 website: www.axway.com Axway provides industry leading solutions to banks, corporates, ACH's, regulators and service bureaus that enables the exchange of financial data and transaction processing. Axway's Financial Exchange (FEX) solution offers a broad range of functionality, including community management, multi-enterprise collaboration and process management. More than 350 financial institutions now have better visibility, security and control over their financial data exchanges helping improve customer service and operational efficiency and in turn gain competitive edge. Axway has deep expertise in the financial services infrastructure and security arena, having authored or co-authored such protocols as PeSIT, AS2, and Secure Sockets Layer (SSL). Axway's solutions are SWIFT-certified, and are compliant with IS0 20022, SEPA, NACHA IAT, FIX and BAI. IPL Eveleigh House Grove Street Bath BA1 5LR T: +44 (0)1225 475 000 E: [email protected] W: finance.ipl.com IPL – Big Enough to Trust, Small Enough to Care IPL creates competitive advantage for Financial Institutions from Central Banks and National Regulators to the world’s largest Building Society. Put simply, we have an unparalleled pedigree of delivering high quality IT Software and Business Consultancy solutions within the most complex, highly secure and regulated environments. We facilitate advances in organisation’s data lifecycle management strategies by improving data quality, data integration and data governance practices. We have recently delivered Nationwide’s new online banking platform and its underpinning multi-channel framework. IPL – welcome to our world of intelligent business. ORACLE Oracle Corporation UK Ltd., Oracle Parkway, Thames Valley Park (TVP), Reading, Berkshire. RG6 1RA. Tel: 08708 768711 or 01189 240000 Email: [email protected] Wesbite: http:// aHARDWARE AND SOFTWARE ENGINEERED TO WORK TOGETHER Increased regulatory pressures. Complex global operations. Rising demand for innovative customer service. To meet all your business challenges, Oracle for Financial Services delivers a powerful combination of technology and comprehensive, preintegrated business applications, including key functionality built specifically for banking and capital markets organizations. • Oracle is #1 in Financial Services customer relationship management • Oracle is #1 in Financial Services human capital management • 20 of the 20 top banks run Oracle D I R ECTO RY O F K EY PLAYE R S CALL 0 2 0 7 5 6 2 2 4 3 0 S O N I A . PAT E L @ F S T E C H . C O . U K FA X 0 2 0 7 3 7 4 2 7 0 1 OR 020 7562 2429 [email protected] IT SECURITY SOLUTIONS Assuria Ltd Reading Enterprise Centre The University of Reading Earley Gate, Whiteknights Road Reading Berkshire RG6 6BU Tel: 0118 935 7395 Email: [email protected] Web: www.assuria.com Tel: +44 (0)118 953 3000 Email: [email protected] Website: www.entrust.com Assuria provides Cyber Security software solutions which deliver security intelligence and information security control to hundreds of government and commercial organisations in more than 40 countries worldwide. Assuria protective monitoring solutions provide complete visibility of all IT system activity across the enterprise, by controlling and analysing security and audit logs from almost every system, application and device in the entire IT network, as well as providing configuration assurance; in-depth assessment of system configurations, patch states, components, users, privileges, file permissions, standards compliance, status of security controls and potential vulnerabilities. In other words, assurance that systems are in a 'known and trusted state'. With systems correctly configured and security intelligence being gathered, Assuria change monitoring allows automated monitoring for any changes which could introduce new risks. Entrust (NASDAQ: ENTU) secures digital identities and information for consumers, enterprises and governments in more than 1,700 organizations spanning 60 countries. Leveraging a layered security approach to address growing risks, Entrust solutions help secure the most common digital identity and information protection pain points in an organization. These include fraud detection, authentication, SSL, shared data protection and e-mail security. Entrust provides the widest range of cross-channel, multifactor authentication methods available in the market today. In addition, its zero-touch transaction monitoring solution identifies fraudulent behavior and patterns before damage occurs. For more information, please visit http://www.entrust.com/. Pirean Faretec Carnac Court Cams Hall Fareham Web: www.pirean.com Email: [email protected] Telephone: 0845 226 0542 Greg White Head of UK Finance Sector Enterprise Security & Availability Solutions Symantec Corporation www.symantec.com Office: +44 (0) 7795 114333 Email: [email protected] ValidSoft (UK) Ltd 9 Devonshire Square London EC2M 4YF United Kingdom T: +44 (0)20 3170 8125 www.validsoft.com Pirean Access: One - E-Commerce Security Access: One is a comprehensive authentication and fraud detection platform that monitors and authorizes customer activity based on risk levels, policies and customer segmentation. With Access: One you can easily secure customer activity from login to logout. Access: One supports a variety of authentication and authorization technologies to provide: • Transaction authentication and authorization • Challenge questions and Knowledge-based authentication (KBA) • Multi-factor authentication (hardware, software and Out-of-band tokens) • Transaction signing Visit http://www.pirean.com/technology/access-one/. Symantec is a global leader in infrastructure software, enabling Banks and Insurance to protect their information and interactions in a connected world. Symantec provides proactive Security Solutions to help Financial Institutions protect information at all layers of their IT infrastructure from removing the threat of virus attacks up to detecting internal fraud, Symantec covers all IT security aspects like: • Securing end user systems and interactions • Managing Threats and vulnerabilities • Managing Security Incidents • Increasing Internet banking security • Detecting fraud • Managing IT Security Compliance ValidSoft Limited provides the world's leading telecommunications-based authentication solutions. Our cutting-edge technology presents the only integrated product set that provides both card-based and electronic fraud prevention solutions. Validsoft's solutions include real-time proximity-based card fraud detection (VALid-POS®), as well as Internet Out-of-Band Man-in-the-Browser protection, Mobile based transactions and Voice Verification for Telephone Banking through its VALid® solution. It is also the first commercially available four-factor authentication solution through the combination of its own proprietary voice biometric technology coupled with Proximity Correlation Analysis. The solutions are designed for mass markets, in a highly cost effective and secure manner, yet are easy to use, intuitive and leverage the most ubiquitous devices available. ValidSoft is the only security software company in the world to be awarded the European Privacy Seal for their product, VALid-POS®, which certifies its compliance with European Data Protection law. D I R ECTO RY O F K EY PLAYE R S CALL 0 2 0 7 5 6 2 2 4 3 0 S O N I A . PAT E L @ F S T E C H . C O . U K FA X 0 2 0 7 3 7 4 2 7 0 1 OR 020 7562 2429 [email protected] MANAGEMENT SOLUTIONS Pirean Faretec Carnac Court Cams Hall Fareham Web: www.pirean.com Email: [email protected] Telephone: 0845 226 0542 Pirean SMBus - Service Desk Integration SMBus is the industry leading solution for sharing, synchornizing and prioritising workload between Service Desks. For organizations looking to adopt ITIL aligned best practice or outsource core services, SMBUs provides the capability to: • Orchestrate activity across multiple Service Desks. • Implement a Single Point of Visibility and Reporting for all Service Desk activity (internal and outsourced). • Improve and Measure Service Level Agreements. • Reduce ticket volumes. • Provide centralised, enriched KPI Dashboards. • Centralise Service Reporting. Visit http://www.pirean.com/technology/smbus/. MOBILE VOICE RECORDING Business Systems (UK) Ltd 5th Floor No 3 London Wall Buildings London Wall London EC2M 5PP T: 0800 458 2988 W: www.businesssystemsuk.co.uk E: [email protected] Compliant mobile phone recording is now available from Business Systems the leading voice recording and analytics technology experts. Designed to meet the new FSA mobile recording requirements, Vocal Mobile can be delivered as either a hosted solution or utilising an organisation's existing in-house recording system. Both compliance-grade solutions are simple to use, requiring little user intervention or training and calls are available for immediate replay via secure access. The technology is already undergoing deployment in two leading Norwegian banks with UK implementations to follow. Red Box Recorders Ltd The Coach House Tollerton Hall, Tollerton Nottingham NG12 4GQ Red Box brings simplicity to digital recording, with flexible solutions that are easy to specify, install and manage. We focus on voice and data capture: Red Box software solutions cover everything from storage and event logging, to retrieval, playback and analysis. Our latest products incorporate web-based interfaces for worldwide access to replay, configuration and maintenance. We have over 20 years' experience and a strong reputation for innovation. Little wonder, then, that Red Box solutions are used in over 120 countries. Tel: +44 (0)115 937 7100 Fax: +44 (0)115 937 7494 email: [email protected] www.redboxrecorders.com PAYMENT EFFICIENCY AND RISK SOLUTIONS Accuity 1 Quality Court Chancery Lane London WC2A 1HR United Kingdom T: +44 20 7014 3480 F: +44 20 7061 6478 E: [email protected] W: www.AccuitySolutions.com Payments: Improve rates of payment STP, with the Golden Copy of payments data. Business Systems (UK) Ltd 5th Floor No 3 London Wall Buildings London Wall London EC2M 5PP T: 0800 458 2988 W: www.businesssystemsuk.co.uk E: [email protected] Brought to you by recording specialists Business Systems, Market Detect is a cost Compliance: Comply with global AML regulations, including UK Bribery Act, and safeguard your business. Professional Services: Engage with our Payments and Compliance subject matter experts, for any implementation, training, review or project management needs. To learn how our solutions can help your business, and to access a FREE trial or demo, visit: www.AccuitySolutions.com effective, customisable, real time data analytics tool incorporating Complex Event Processing (CEP) technology. Designed to detect market abuse and minimise trading risk whilst ensuring compliance, it intelligently collects and analyses news feeds and organisational data to uncover and present hidden patterns. It's one of the first surveillance systems available on a hosted pay-as-you-go basis or as an on-premise solution implemented onsite. Contact us now for our latest white paper. PAYMENT EFFICIENCY Optitrade 85 London Wall, Ground Floor, London, EC2M 7AD Optitrade was recently formed as an operating division of Singularity Limited. Our focus is to enable financial institutions to operate highly optimised post-trade management solutions – our vision being friction-free Financial Markets. Tel: +44 (0) 20 7496 1760 Fax: +44 (0) 20 7256 8151 E: [email protected] W: • Financial Messaging Applications • Connectivity to Omgeo CTM, Oasys Global, SWIFT, TRAX, CREST and Euroclear CCI • Data Matching Applications • Data Transformation Our current offerings include: D I R ECTO RY O F K EY PLAYE R S CALL 0 2 0 7 5 6 2 2 4 3 0 S O N I A . PAT E L @ F S T E C H . C O . U K FA X 0 2 0 7 3 7 4 2 7 0 1 OR 020 7562 2429 [email protected] PAYMENT EFFICIENCY S1 Culverdon House Abbots Way Chertsey, Surrey KT16 9LE United Kingdom T: +44 (0) 1932 574 700 E: [email protected] W: www.s1.com Leading banks, retailers, and processors need technology that adapts to the complex and challenging needs of their businesses. These organizations want solutions that can respond quickly to changes in the marketplace and help grow their businesses. For more than 20 years, S1 has been a leader in developing software products that offer flexibility and reliability. Over 3,000 organizations worldwide depend on S1 for payments, online banking, mobile banking and branch banking solutions that deliver a competitive advantage. PAYMENT SOLUTIONS Vocalink Drake House Three Rivers Court Homestead Road Rickmansworth Hertfordshire WD3 1FX T: +44(0)870 1650019 E: [email protected] W: www.vocalink.com VocaLink is the transaction specialist. We pioneered electronic payments four decades ago and many of the world’s top banks have been relying on our services ever since. Our automated payment system processes over 80 million transactions per day and has the capacity to handle all of Europe's automated payments. Our switching platform powers the world’s busiest ATM network. The VocaLink €CSM delivers reach for our clients throughout the SEPA and beyond with a range of value-added services that leverage our know-how and technical capabilities. VocaLink is the partner of choice in the transactions business. Find out why at www.vocalink.com RETAIL BANKING AND CONSUMER FINANCE Provenir 4 Park Place London SW1A 1LP United Kingdom Tel +44 (0) 20 7898 9347 Fax +44 (0) 20 7898 9101 Email: [email protected] Website: www.provenir.com Provenir is the leading provider of enterprise software, which enables financial institutions to implement innovative solutions for application processing, customer account management, collections and recovery, compliance and prospecting. Provenir provides an integrated solution for all products, all channels and all phases of the customer lifecycle. Users can visually configure rules, strategies and scorecards that can be utilised by multiple workflows and channels to create composite applications and services that are easily deployed in an SOA. Thinksoft 6th Floor, Fleet House 8-12 New Bridge Street London EC4V 6AL Thinksoft, a specialist in financial software testing, helps global financial and insurance organizations to significantly improve the quality of their applications, software and systems. T: F: E: W: With clients in 23 countries and offices in major financial capitals of the world, Thinksoft helps clients realize ‘business ready software’, compress timelines and reduce software product life cycle costs through domain focused test methodologies, offshore delivery centers and test automation expertise. +44(0)207 822 8620 +44(0)207 822 8626 [email protected] www.thinksoftglobal.com TELECOMS PROVIDER IP Solutions Centurion House 24 Monument Street London EC3R 8AJ IP Solutions are London’s leading Independent Telecoms provider. Based in the heart of the City of London we work with many of the UK’s leading Finance Companies to Provide a wide range of Communication Solutions including: • Unified Communications • FSA Compliant Call Recording Tel: 08000 928 128 W: www.ipsolutions.uk.com • Hosted Telephony • SiP trunking • Mobile Analysis & Review • Data Networks VOICE OVER IP COLT Telecommunications Beaufort House 15 St Botolph Street London EC3A 7QN T: 0800 358 4631 E: [email protected] W: www.colt.net/uk/ipvoice COLT is the leading provider of data, voice and managed services to business customers in Europe. Founded in 1992 to serve London's financial institutions, today its customers include the world's top 25 financial institutions and seven out of Europe's top 10 stock exchanges. COLT is also the strongest SWIFT-approved player in the European market. COLT services are designed to meet key business requirements around areas such as regulatory compliance, network simplification and operational efficiency. They are based around its secure, reliable network providing unrivalled reach across 13 European countries, with direct connections to over 10,000 buildings. For more information: www.colt.net SIGNING ALSO ON OUR RADAR Book review Title: The Apple Experience. Author: Carmine Gallo. Publisher: McGraw-Hill. RRP: £17.99 There has been much talk in recent months about technology giants like Facebook and Apple becoming active in financial services. The former has already moved into the virtual currency arena and the latter has filed a patent for a new iWallet service. It has millions of credit card numbers on file, a hugely loyal customer base and speculation is rife that it may introduce the iWallet along with the next iPhone. A timely release then for Carmine Gallo’s The Apple Experience, which aims to reveal the methods behind Apple’s retail success and show business leaders how to use them to drive growth and profits. It’s an interesting read and provides plenty of insight into the minds of Steve Jobs and his colleagues. ”I’m constantly asking myself, Why Triple Quest does Apple do what it does, what other brands do something similar, and how can I teach these principles to others?” writes Gallo. He adds: ”I don’t bill myself as a ’customer service expert’. I’m a communications coach, speaker and journalist.” Therein lies my one gripe with the book. Gallo has a weakness for communications/ motivational coach speech - e.g. ”Apple touches the lives of its customers only after touching its employees” and ”When a company starts with a vision such as ’enriching lives’, magical things begin to happen.” Ugh. At the same time, however, this has much to recommend it, particularly the opportunity it offers to learn about Apple’s ’Five Steps of Services’ that all customer-facing employees follow to engage customers. It’s certainly exhaustive stuff. The author has conducted extensive interviews, spent hundreds of hours observing the Apple selling floor and researching into the company’s training programmes. The banking sector should take note. Its customer service is often awful and it would do well to learn from the principles which Disney is now employing to reinvent its stores and which former Apple retail chief, Ron Johnson, is using as he undertakes the challenge of revitalising J.C Penney. And another thing... Has Facebook had its day? That was the question I put to my many (ahem) Twitter followers recently. ”Timeline looks clunky and there are only so many pics you wanna see of friends pulling amusing faces in the pub,” I tweeted. It certainly seems to be on the slide in the financial services sector. According to analysis from Corporate Insight, Twitter has overtaken Facebook to be become the top social network for FS firms. It covered 90 companies in its report, 57 per cent of which used Facebook in 2010 and 51 per cent Twitter. But by the end of 2011, 88 per cent were on the former and 92 per cent on the latter. At one point, Facebook could do no wrong, but it’s no longer a media darling. Take, for example, the bemused response to the $1 billion purchase of Instagram, perhaps best summed up by a spoof news piece in the latest Private Eye. Sample quotes: ”Instascam’s business OFF model was founded on the belief that if we had a trendy name and could show that we had no way of generating profit, Facebook would eventually buy us for some ridiculous price.” And: ”Mark Zuckerberg denied he’d overpaid for Instascam saying he’d been impressed by the way the company had generated huge amounts of hype in the past two years.” So, are we witnessing a mere blip or is Zuckerberg’s baby about to go the same way as MySpace and Friends Reunited? Probably not the latter as Facebook has a more compelling business model than those two ventures. But I do think the Corporate Insight analysis points to a definite trend in the FS sector. As always, I’d be interested to hear your thoughts. Drop me a line at the email address below. Kudos to Colin Blears, product development manager, Quest, who is embarking on three personal challenges for charity this year. He’ll start with a skydive on 30 May; a trek up Ben Nevis on 4 June to light a beacon as part of the Queen’s Diamond Jubilee; plus a bungee jump on 13 October. Phew, FStech feels exhausted just thinking about it. To support Colin, visit: www. bmycharity.com/colinblears Knock knock Unified business communications provider Daisy Group has opened the 12 tonne bomb proof door to its Manchester datacentre, part of a £1 million investment programme in the facility, situated within a former Bank of England bullion vault. Interesting tidbit for you. A small gap between the inner and outer walls is rumoured to have been patrolled by guard dogs back in the day. And every Tuesday the surrounding roads were closed off to allow the delivery of gold bullion to the bank. The two Scotts Just months after leaving PayPal for Yahoo, Scott Thompson has stepped down amid accusations he faked a computer science degree on his CV. Readers of FStech will know that our Editor is also called Scott Thompson. News of the Yahoo debacle sent him scurrying to Twitter to make his own CV-related confession. ‘Much like my namesake at Yahoo I also have a fake resume. My CV lists basket weaving, tap dancing and playing the bongos as interests. They’re not,’ he wrote. And on that bombshell, dear Scott Thompson, Editor, FStech. [email protected] readers, we bid you adieu. M AY /J U N E 2 0 1 2 PAG E 5 9 www.fstech.co.uk/payments The 2012 FStech/Retail Systems Payments Technology Conference will be held at the IoD Hub, London and will bring together leading figures from retail and the financial services sector to network and discuss cards and payments services, the present and future. This year there will be a particular focus on mobile banking and payments. Senior figures from across the retail, financial services, technology vendor and telco sectors will come together to debate the key issues, innovations and barriers to the mass-market deployment of mobile. Chaired by Vendorcom chairman, Paul Rodgers, the event, a mixture of speakers and discussion panels, will also showcase the latest developments and services and products in such areas as: contactless cards; self-service technologies, SEPA, payment security, online payments, the future of cash and cheques and social payments. Speakers/panellists confirmed so far include: Roy Ford, IT Controller, SPAR UK; Alex Kwiatkowski, Research Manager EMEA, IDC Financial Insights; Rafael Eile, Counsel, Citi; Simon Barrows, Director of Financial Services, Glue Reply; Simon Burrows, Director – FinTech, PwC. TO ND E A E FR ERS L A AIL NCI NS T RE INA UTIO F IT T S N I Sponsor Association Partners Thursday 01 November 2012 Research Partner The IoD Hub, London 09:00 – 16:30