Blog

Blog

Contact Us

Personal, Passionate and Professional

The Garland Group was founded as DCS, Inc. in 1981 by Henry E. Garland as a privately owned company dedicated to software development and to providing consulting services, specializing in the IBM System 36, System 38 and the IBM AS/400. Since then, we have expanded our consulting services to support Microsoft Windows NT/2000,Citirx Metaframe,

Banktastic

RiskKey

We build applications and services specifically tailored for bankers.

We believe many applications out there today are difficult and time-consuming to understand. We fight against that. We create applications and services that are dead simple to use and that leverage the Web so you can do what you need to, when you need to do it.

RiskKey is a unique and secure web-based risk management

ATM Audits

ATM Networks (PULSE, STAR, NYCE, VISA, etc.) all abide by the American National Standard : X9.8, X9.24 and X3.92 documents. The TG-3 PIN Security and KEY Management Security Review is governed by these Standards.

The ATM review, very simply, looks at the encryption of the PIN at its entry into the system through an ATM or POS. It will analyze

Vulnerability Assessments

Hackers are today’s common thieves. Being a victim of a intrusion attack can not only affect your network but could affect your business. We can conduct rigorous internal and external intrusion tests, analyze the vulnerabilities, and provide you with a report and assurance that your institution is safe and protected. Vulnerability scanning employs

Penetration Testing

The penetration testing is engineered to analyze your presence on the Internet from more than just a Firewall Scan Approach. We review, text and document the presence of all of the Institution’s information in areas other than just the Internet interface. This scope of work characterizes the Institution network and firewall, and identifies

Social Engineering

Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. Some people also call it ‘human hacking’. The term typically applies to trickery for information gathering or computer system access.

We perform social engineering tests on financial institutions based off

FFIEC Technology Audits

The Garland Group uses the specific guidelines set forth by the FFIEC. Below are brief descriptions of each of the twelve FFIEC handbooks The Garland Group will cover for your Information Technology Audit. It will offer some insight about what each booklet consists of and what we will be doing to ensure your financial institution is in compliance.

We provide services that enable you to run your business efficiently with minimal risks.

Risk Assessments

The Garland Group provides a comprehensive and integrated understanding of your processes and technologies and how they impact your business operations. We identify ways to increase your effectiveness and efficiency while reducing your risks.

The Garland Group has developed and customized a software application, RiskKey, that is used to assess

My Bank Should Protect My Identity

In response to Financial Institutions needing to implement an Identity Theft Prevention Program banks should really offer up some type of program with identity theft protection companies. It makes perfect sense to me. Why not have my fraud and credit monitoring associated with my bank account? My bank could be my one stop shop for all my financial

TechMecca Day #2

Hey everybody,

Well after a great week in Vegas we are all back home. It was a GREAT trip and from our perspective the event was a great success. I made some new contacts and believe the conference was a bit of a tipping point for us and our products. We’d like to thank all the people that help put TechMecca together and having us as exhibitors as

TechMecca Day #1

We are in Las Vegas this week for the TechMecca conference and I sit hear in my hotel room getting ready for day 2.

We are in Las Vegas this week for the TechMecca conference and I sit hear in my hotel room getting ready for day 2.

The conference, for us thus far, has been great. Running into alot of familiar faces and meeting many new ones.

My Bank Should Protect My Identity

In response to Financial Institutions needing to implement an Identity Theft Prevention Program banks should really offer up some type of program with identity theft protection companies. It makes perfect sense to me. Why not have my fraud and credit monitoring associated with my bank account? My bank could be my one stop shop for all my financial

TechMecca 2007 - Day 2

Hey everybody,

Well after a great week in Vegas we are all back home. It was a GREAT trip and from our perspective the event was a great success. I made some new contacts and believe the conference was a bit of a tipping point for us and our products. We’d like to thank all the people that help put TechMecca together and having us as exhibitors as

Ideas Meeting

So despite our limited experience and no major plan for the meeting we decided to try it ourselves. We wanted it to be a very open, creative space so we carved out a couple of hours and brought in lunch and off we went!

So ever since Mark and I got back from BarCampBankSeattle and discovered what a ‘BarCamp‘ is all about I have been wanting to