11:08 AM
Connect Directly

What do the sixth largest U.S. bank and a small credit union in Oregon have in common?

A scalable lending risk management solution is the secret sauce for some banks, regardless of asset size.

The answer is, both are users of the CreditQuest solution offered by Harland Financial Solutions. I don't think I ever wrote anything in 38 years that compared a giant financial institution with a very small one. And for that matter, a diversified commercial bank with a local credit union. And third, one based in the Northeast where finance and money drive everyone's ambitions and the other in the Northwest where nature and logging are the orders of the day. But the beauty of technology is its adaptability, scalability and high value payoff typical of risk-determination solutions. Clichs abound in a world of anomalies "Don't measure a financial institution's success by its size." "Lending is all about analytics, science, data collection, knowing the borrower, identifying a safety net, and a bit of right timing." "Banking does not live by transaction processing alone." "Decision making is in the mind of the beholder." "Measure twice, cut once."

CreditQuest is a complete commercial credit risk management system that brings origination, portfolio management, financial statement analysis, underwriting, documentation and executive reporting together in a collaborative, streamlined solution. In other words, the mission of the loan review committee is which of two rubber stamps do we use, approved or declined. CreditQuest helps the decision-making process by delivering intelligence.

The first time I heard of CreditQuest was in 2005. That's an important fact because it was prior to the release of the solution. A second important fact is that I didn't hear about it from the vendor, but instead from a young banker who somehow got a bootlegged view of CreditQuest and was so impressed he had to tell me about it. I too was impressed because it wasn't until late 2006 when Harland Financial Solutions announced the availability of CreditQuest, much like the TV commercial featuring Orson Welles telling the world, "No wine before its time."

I have always had a special interest in lending. The main reason for this is that's the way banks earn money. But having worked for a bank, and as a consultant for banks, one discovery that stood out as a disconnect in my mind was the absence of science in a business where risk is costly (losing the entire bank) and binary decisions (approved or declined) depend on substantive investigations which typically were missing.

So especially after the trauma experienced by all banks in the past three years it would seem to me that any tool that provides just an added measure of assurance to the risk of lending would be a smart move.

How interesting that PNC Financial Services ($257 Billion in assets) and Pacific NW Federal Credit Union ($156 Million in assets) know that.

A comment about scalable software I don't believe all software is scalable. For example, in the two banks included in this blog, any idea that they could use the same core system is ludicrous. Billions of transactions per day require industrial strength software. But this blog addresses brainware, and thus software like CreditQuest merely has to serve one brain at a time, and that works well whether it's in a giant bank or a small credit union. Most of you knew that, but I had to cover myself for the others.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Janice, I think I've got a message from the code father!
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.