Banks have worked hard to manage the different risks across their institutions. It has been (and will remain) costly, time-consuming and a top priority. Celent profiles two award-winning banks who have modelled excellence in their use of risk management technologies across their banks. They demonstrated:
- Degree of innovation
- Degree of difficulty
- Measurable, quantitative business results achieved.
Alfa-Bank – setting standards for basel compliance in Russia
Alfa-Bank built a centralised and robust credit risk platform to implement Basel II and III standards, simultaneously, and under very tight local regulatory deadlines. The bank decided to centralise all corporate credit risk information onto a single platform that connected to front-office systems and processes.
Using Misys FusionRisk, Alfa-Bank was able to implement a central default system with a risk rating and risk-weighted asset calculations engine. The initiative is seen as one of the most important initiatives in the bank’s history.
The successful completion of the project has placed Alfa-Bank at the forefront for setting standards and best practice methodologies for capital management regulations for the Russian banking industry and Central Bank.
USAA: security selfie, native fingerprint, and voice signature
The game-changer for USAA is to deliver flawless, contextual customer application services that are secured through less intrusive authentication options. The use of biometrics (fingerprint, facial and vocal) to access its mobile banking application positions USAA to be able to compete with fintechs across the digital banking ecosystem and offer exceptional service to its military and family members.
USAA worked with Daon Inc to provide biometric solutions paired with its ‘Quick Logon dynamic security token technology, which is embedded in the USAA mobile app for trusted mobile devices. Biometric and token validation focus on who the user is and who the verifiers are, and addresses increasing concerns around the high level of compromise of static usernames, passwords, and predictable security questions from sophisticated phishing attacks, external data breaches, and off-the-shelf credential-stealing malware.
You can find a case study abstract on the Celent website.
– This article is reproduced with kind permission. Some minor changes have been made to reflect BankNXT style considerations. Read more here. Main image: kaprik, Shutterstock.com