Skip to main content

Financial Services

FR 2052a

Security Audits and Penetration Testing in Financial Services

Previously, I discussed the cybercrimes of phishing and the signs it’s happening. This blog will highlight security audits and penetration testing. Given the ever-changing landscape of cybersecurity threats, coupled with the dynamic nature of new hardware and software deployments, it is imperative to perform security audits and penetration testing on a regular and frequent basis. […]

retirement services

Drive Company-Wide Solutions in Retirement Services with AI

Previously, I analyzed fraud detection and content management methods, with the assistance of artificial intelligence (AI). In my final post of this blog series, I explain the opportunities artificial intelligence provides to retirement services transformations. For many 401(k) plans, passing ADP/ACP testing can be a very difficult and challenging endeavor, and there can be severe […]

Charles Schwab

The Race Continues: Charles Schwab Is Set to Buy TD Ameritrade

Charles Schwab is set to buy TD Ameritrade for $26 billion, which could create a firm with some $5 trillion in client assets, according to a report from Fox Business. The move comes amid pressure on revenues caused by October’s race to zero commissions. No-commission trades are pressuring brokerage firms’ revenues and further emphasize the […]

Ball

Agile Street Smarts Series: Agile Estimation Levels and Techniques

This blog is part of a series exploring Agile methodologies. Read the last post in the series here. This post will explore Agile estimation and the different estimation techniques. Estimation is more the “art” than the “science” of program management so polish the crystal ball and let’s get started. Agile estimation is fundamentally different from […]

Phishing and Cybercrimes in Financial Services

My last blog discussed the benefits of data encryption and application programming. This blog dives into the cybercrimes of phishing and the signs it’s happening. Phishing is a cybercrime in which a target or targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing […]

fraud detection

Fraud Detection and Content Management Efficiencies with AI

My last blog looked at call center optimization and how artificial intelligence (AI) provides an in-depth look into financial advice. In this blog, I analyze fraud detection and content management methods, with the assistance of AI. Fraud Detection In the online and digital world of financial services, fraud has increased and become harder to detect. […]

checking accounts

Google Is Going to Offer Checking Accounts Next Year

Google is going to offer checking accounts next year. That’s big, and scary, for a lot of banks. A Reuters article provided these salient quotes: “Our approach is going to be to partner deeply with banks and the financial system,” sure thin, general manager and vice-president of payments at Google, told the Wall Street Journal […]

Web API Using Azure

Data Encryption and Application Programming in Financial Services

Previously, I outlined the how and why of server and endpoint protection. This blog will discuss the benefits of data encryption and application programming. Data Encryption All of a firm’s data should be encrypted both at rest (stored on media) and in flight (in transit on the network). This provides the best protection from a […]

Cloud Procurement Approval Management

Cloud Procurement offers a new interface defining approval workflow for Requisitions, Purchase Documents (Order, Blanket, Contract) and Supplier Management. Approval rules are managed in a user friendly interface that integrates back-end Business Process Management (BPM) while keeping a logical and complete setup in front of the user. While relatively simple to define rules in Approval […]

Install, Configure, Deploy FileNet P8 using Ansible

Here is something I’m working on at Perficient to make installing/upgrading, configuring, and deploying IBM FileNet P8 more efficient. It even creates a Domain, and Object Store. All using Ansible. If your organization is looking to implement something like this in your environment, give Perficient a call. We’ll be happy to assist.    For […]

Server and Endpoint Protection in Financial Services

My last blog explored network infrastructure and proactive measures to take to keep the network secure. This blog analyzes the how and why of server and endpoint protection. In a network context, an endpoint is defined as any computing device that communicates with a network to which is it connected. It includes all of a […]

Leonidas

Agile Street Smarts – Creating High Performance Teams

What does it take to create a lean, mean project machine? Many have wrestled with this in the past. How do you get your teams to perform at optimal levels? SEMPERFI Support don’t smother, Empower and trust, Motivate , Put forth – communicate, Energize, Release – deliver, Fail fast, Iterate   Turns out, Marine Seal […]

Load More