{"id":2638,"date":"2019-06-11T15:22:06","date_gmt":"2019-06-11T12:22:06","guid":{"rendered":"http:\/\/nanodems.mybirer.com\/?page_id=2638"},"modified":"2021-11-08T10:36:37","modified_gmt":"2021-11-08T07:36:37","slug":"banking-finance","status":"publish","type":"page","link":"https:\/\/www.nanodems.com\/security\/banks-and-financial-institutions","title":{"rendered":"Banks and Financial Institutions"},"content":{"rendered":"<p>[vc_row][vc_column][gsf_heading sub_title=&#8221;Align multiple devices, locations and communications with Nanodems NDIS.&#8221; local_subtitle=&#8221;subtitle-bottom&#8221; heading_size=&#8221;large&#8221;]<\/p>\n<h3><strong>Resolving Complex Financial Security Environments With Advanced PSIM Integration Solutions<\/strong><\/h3>\n<p>[\/gsf_heading][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1610470895932{padding-top: 20px !important;padding-bottom: px !important;}&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;.vc_custom_1610385940316{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 0px !important;padding-left: 0px !important;}&#8221;]The security of data, assets, people and infrastructure are the highest priority among financial institutions.\u00a0 But when legacy systems, new technologies, disparate systems, and thousands, if not hundreds of thousands of devices, across multiple locations are in play, how do banks and financial institutions monitor and identify potential threats or fraud?<\/p>\n<p><strong>The simple answer \u2013 They Don\u2019t.<\/strong> Or at the least, not without a lot of manual work and resources. Resources which could be used to focus on other initiatives, if the right technologies, platform or solutions were in place.[\/vc_column_text][vc_separator color=&#8221;custom&#8221; style=&#8221;dotted&#8221; border_width=&#8221;2&#8243; accent_color=&#8221;#f68922&#8243;][vc_custom_heading text=&#8221;Meet Nanodems NDIS, a converged solution for Banks and Large-scale, Multi-Location Financial Institutions&#8221; font_container=&#8221;tag:h2|font_size:20|text_align:center|color:%23423d3b&#8221; google_fonts=&#8221;font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:600%20bold%20italic%3A600%3Aitalic&#8221; css=&#8221;.vc_custom_1636356495732{padding-bottom: 20px !important;}&#8221;][vc_separator color=&#8221;custom&#8221; style=&#8221;dotted&#8221; border_width=&#8221;2&#8243; accent_color=&#8221;#f68922&#8243;][vc_custom_heading text=&#8221;Nanodems NDIS solves the issue of how banks with large numbers of locations, devices and people, handles its physical security information management systems and processes.&#8221; font_container=&#8221;tag:h2|font_size:22|text_align:left&#8221; google_fonts=&#8221;font_family:Oxygen%3A300%2Cregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;.vc_custom_1610390873344{padding-top: 20px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1610471068574{padding-top: 30px !important;}&#8221;]Our user-friendly, dynamic interface allows organizations to centrally and automatically track the following, and more, across multiple locations and channels:[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1610473926419{margin-left: 20px !important;padding-top: 45px !important;}&#8221;][gsf_gallery columns=&#8221;3&#8243; columns_md=&#8221;2&#8243; columns_sm=&#8221;2&#8243; columns_xs=&#8221;1&#8243; columns_mb=&#8221;1&#8243; images=&#8221;4035,4031,3428,3144,4036,4037,3724,3163,3704&#8243;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<ul>\n<li>CCTVs<\/li>\n<li>Money Counting Machines<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<ul>\n<li>ATMs<\/li>\n<li>Alarm Intrusion Panels<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Access Control Systems<\/li>\n<li>Fire Alarm Systems<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Vehicles in Transit<\/li>\n<li>Shooter Detection Systems<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][gsf_button title=&#8221;Request a Demo&#8221; size=&#8221;md&#8221; align=&#8221;center&#8221; link=&#8221;url:https%3A%2F%2Fwww.nanodems.com%2Fsecurity%2Frequest-demo%2F||target:%20_blank|&#8221; css=&#8221;.vc_custom_1610474042541{padding-top: 25px !important;}&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1610390748863{padding-top: 20px !important;}&#8221;][vc_column][gsf_space desktop=&#8221;70&#8243; tablet=&#8221;50&#8243; tablet_portrait=&#8221;50&#8243; mobile_landscape=&#8221;40&#8243; mobile=&#8221;40&#8243;][vc_separator color=&#8221;mulled_wine&#8221; style=&#8221;shadow&#8221; border_width=&#8221;2&#8243;][gsf_space desktop=&#8221;40&#8243; tablet=&#8221;20&#8243; tablet_portrait=&#8221;20&#8243; mobile_landscape=&#8221;10&#8243; mobile=&#8221;10&#8243;][gsf_heading sub_title=&#8221;Our converged vision\u2122 concept brings all these disparate physical security systems together in a user-friendly, easy to use dashboard that allows security personnel to:&#8221; local_subtitle=&#8221;subtitle-bottom&#8221; heading_size=&#8221;large&#8221; css=&#8221;.vc_custom_1610470354558{padding-bottom: 30px !important;}&#8221;][\/gsf_heading][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_cta h2=&#8221;Centrally Track &amp; Monitor Activity&#8221; txt_align=&#8221;center&#8221; color=&#8221;white&#8221; css=&#8221;.vc_custom_1610469836999{background-color: #f68922 !important;}&#8221;][\/vc_cta][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_cta h2=&#8221;Access Real-Time Video &amp; Alerts&#8221; txt_align=&#8221;center&#8221; color=&#8221;white&#8221; css=&#8221;.vc_custom_1610469756508{background-color: #f68922 !important;}&#8221;][\/vc_cta][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_cta h2=&#8221;Mitigate Threats, Risk &amp; Fraud&#8221; txt_align=&#8221;center&#8221; color=&#8221;white&#8221; css=&#8221;.vc_custom_1610469643202{background-color: #f68922 !important;}&#8221;][\/vc_cta][\/vc_column][\/vc_row][vc_row][vc_column][gsf_space desktop=&#8221;90&#8243; tablet=&#8221;70&#8243; tablet_portrait=&#8221;60&#8243; mobile_landscape=&#8221;50&#8243; mobile=&#8221;40&#8243;][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1610386604920{padding-bottom: 60px !important;background-color: #423d3b !important;}&#8221;][vc_column parallax=&#8221;content-moving&#8221; css=&#8221;.vc_custom_1610378854863{padding-top: 30px !important;padding-right: 30px !important;padding-bottom: 0px !important;padding-left: 30px !important;}&#8221;][vc_custom_heading text=&#8221;An intelligent PSIM Solution as flexible and versatile as the organization requires, able to scale when and where their business needs dictate.&#8221; font_container=&#8221;tag:h4|font_size:38|text_align:center|color:%23ffffff|line_height:1.2&#8243; google_fonts=&#8221;font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:800%20bold%20italic%3A800%3Aitalic&#8221; css=&#8221;.vc_custom_1610470389611{padding-bottom: 0px !important;}&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;narrow-row&#8221; css=&#8221;.vc_custom_1582640896591{padding-top: 0px !important;}&#8221;][vc_column][gsf_space desktop=&#8221;90&#8243; tablet=&#8221;70&#8243; tablet_portrait=&#8221;60&#8243; mobile_landscape=&#8221;50&#8243; mobile=&#8221;40&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1610461993480{padding-top: 0px !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;narrow-row&#8221;]<\/p>\n<h2 style=\"text-align: center;\">NDIS is the #1 PSIM Solution for Banks &amp; Financial Institutions Across the EMEA<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;narrow-row&#8221; css=&#8221;.vc_custom_1582026022940{padding-top: 60px !important;padding-bottom: 100px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][gsf_counter icon_font=&#8221;fa fa-ravelry&#8221; end=&#8221;45000&#8243; suffix=&#8221;+&#8221; el_class=&#8221;custom-icon-wrapper,custom-icon-1&#8243; title=&#8221;Locations&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][gsf_counter icon_font=&#8221;fa fa-thermometer-1&#8243; end=&#8221;750000&#8243; suffix=&#8221;+&#8221; el_class=&#8221;custom-icon-wrapper,custom-icon-2&#8243; title=&#8221;Devices&#8221;][\/vc_column][\/vc_row][vc_row parallax=&#8221;content-moving&#8221; css=&#8221;.vc_custom_1610464975603{padding-bottom: 0px !important;background-color: #f4ad6b !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1582642836945{padding-top: 0px !important;padding-right: 60px !important;padding-bottom: 0px !important;padding-left: 0px !important;}&#8221;][gsf_heading sub_title=&#8221;&#8221;]<\/p>\n<h3><b><span data-contrast=\"auto\">Rely on\u00a0Nanodems\u00a0to:<\/span><\/b><\/h3>\n<p>[\/gsf_heading][vc_column_text]<\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Securely m<\/span><span data-contrast=\"auto\">onitor<\/span><span data-contrast=\"auto\"> all <\/span><span data-contrast=\"auto\">security system\u00a0<\/span><span data-contrast=\"auto\">data and reporting<br \/>\n<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Integrate\u00a0<\/span><span data-contrast=\"auto\">and\u00a0<\/span><span data-contrast=\"auto\">standardize<\/span><span data-contrast=\"auto\"> physical security<\/span><span data-contrast=\"auto\">\u00a0systems<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Identify and provide information that allows users to swiftly respond to incidents and threats <\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Centrally and securely, track and monitor access and activity, <\/span><span data-contrast=\"auto\">i<\/span><span data-contrast=\"auto\">n multiple locations,<\/span><span data-contrast=\"auto\"> real-time, <\/span><span data-contrast=\"auto\">preventing fraud\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Grow business by reducing security expansion costs through hardware independence<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Improve efficiency and customer experience while reducing costs, time and human resource demands <\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;3713&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;right-to-left&#8221; css=&#8221;.vc_custom_1610464945240{padding-top: 30px !important;}&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][gsf_space desktop=&#8221;90&#8243; tablet=&#8221;70&#8243; tablet_portrait=&#8221;60&#8243; mobile_landscape=&#8221;50&#8243; mobile=&#8221;40&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][gsf_heading sub_title=&#8221;&#8221; text_align=&#8221;text-center&#8221; css=&#8221;.vc_custom_1610465952793{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h3 style=\"text-align: center;\"><strong>NDIS DELIVERS:<\/strong><\/h3>\n<p>[\/gsf_heading][vc_separator color=&#8221;mulled_wine&#8221; style=&#8221;shadow&#8221; border_width=&#8221;3&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1610472106482{padding-top: 40px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1610472307933{padding-right: 20px !important;padding-bottom: px !important;padding-left: 20px !important;}&#8221;][vc_single_image image=&#8221;3706&#8243; img_size=&#8221;large&#8221;][vc_column_text]<\/p>\n<h5 style=\"text-align: center;\"><strong><span class=\"TextRun SCXW146901757 BCX7\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun CommentStart SCXW146901757 BCX7\">A\u00a0<\/span><\/span><span class=\"TextRun SCXW146901757 BCX7\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW146901757 BCX7\">Converged Vision\u2122 Security Concept<\/span><\/span><span class=\"EOP SCXW146901757 BCX7\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/strong><\/h5>\n<ul>\n<li>Centralizes monitoring and tracking for better situational awareness<\/li>\n<li>Integrates multiple systems\/devices to improve efficiency<\/li>\n<li>Enhances the customer experience and increases revenue<\/li>\n<li>Delivers full control over CCTV and teller systems<\/li>\n<li>Aligns planning, coordination and oversight across all locations<\/li>\n<\/ul>\n<p><span class=\"EOP SCXW158504761 BCX7\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1610472321023{padding-right: 20px !important;padding-bottom: px !important;padding-left: 20px !important;}&#8221;][vc_single_image image=&#8221;3708&#8243; img_size=&#8221;large&#8221;][vc_column_text]<\/p>\n<h5 style=\"text-align: center;\"><b><span data-contrast=\"auto\">Real-Time Health Monitoring<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h5>\n<ul>\n<li>Devices are monitored 24\/7 for failure, disruption, and connectivity<\/li>\n<li>Interrupted signals set off several alarms: dashboard, email &amp; SMS<\/li>\n<li>At-a-glance, visually assess hardware conditions &amp; system statuses<\/li>\n<li>Maximizes customer safety and minimizes device or system downtime<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1610472327795{padding-right: 20px !important;padding-bottom: px !important;padding-left: 20px !important;}&#8221;][vc_single_image image=&#8221;3709&#8243; img_size=&#8221;large&#8221;][vc_column_text]<\/p>\n<h5 style=\"text-align: center;\"><span class=\"EOP SCXW146901757 BCX7\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><span class=\"TextRun SCXW11499312 BCX7\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW11499312 BCX7\"><span class=\"TextRun SCXW242654892 BCX7\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242654892 BCX7\"><strong>Centralized Access &amp; Authorization<\/strong><br \/>\n<\/span><\/span><\/span><\/span><\/span><\/h5>\n<ul>\n<li>Centrally configure, grant, or remove access rights with one click<\/li>\n<li>Disseminate the right information at the right time to the right people<\/li>\n<li>Maintain accurate audit logs for regulatory compliance<\/li>\n<li>Easily and securely manages access between locations for authorized users<\/li>\n<li>Audit trails of personnel movement protects physical and online data<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1610473423099{padding-bottom: 10px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1582535028878{padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;}&#8221;][vc_single_image image=&#8221;3430&#8243; img_size=&#8221;large&#8221; css=&#8221;.vc_custom_1582535000821{padding-right: 0px !important;padding-bottom: 0px !important;padding-left: 0px !important;}&#8221;][vc_column_text]<\/p>\n<h5 style=\"text-align: center;\"><strong><span class=\"TextRun SCXW4506841 BCX7\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW4506841 BCX7\">Scalability and Flexibility<\/span><\/span><span class=\"EOP SCXW4506841 BCX7\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/strong><\/h5>\n<ul>\n<li>Leverage existing infrastructure to maximize cost efficiency<\/li>\n<li>Open architecture allows for scalability when the business needs it<\/li>\n<li>Manage all devices, regardless of brand, from a single user interface<\/li>\n<li>Access video footage from anywhere with our mobile app<\/li>\n<\/ul>\n<p><span class=\"EOP SCXW159161353 BCX7\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1582535038554{padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;}&#8221;][vc_single_image image=&#8221;3711&#8243; img_size=&#8221;large&#8221;][vc_column_text]<\/p>\n<h5 style=\"text-align: center;\"><strong><span class=\"TextRun SCXW168742128 BCX7\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW168742128 BCX7\">One-Step Device Configuration<\/span><\/span><\/strong><\/h5>\n<ul>\n<li>Standardize configuration to thousands of devices with one click<\/li>\n<li>Minimizes set-up time and device installation<\/li>\n<li>Ensures uniform monitoring and reporting<\/li>\n<li>Streamlines incident management and analysis<\/li>\n<\/ul>\n<p><span class=\"EOP SCXW114608717 BCX7\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1582535065013{padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;}&#8221;][vc_single_image image=&#8221;3724&#8243; img_size=&#8221;large&#8221;][vc_column_text]<\/p>\n<h5 style=\"text-align: center;\"><strong><span class=\"TextRun SCXW38062529 BCX7\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW38062529 BCX7\">Alarm and Incident Management<\/span><\/span><span class=\"EOP SCXW38062529 BCX7\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/strong><\/h5>\n<ul>\n<li>Customizable alerts for immediate notification of issue(s)<\/li>\n<li>Integrated system correlates alarms to events and instant footage for faster response<\/li>\n<li>Automatically logs each incident or resolution for better planning<\/li>\n<li>Enables effortless compliance with current regulations<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator color=&#8221;custom&#8221; border_width=&#8221;2&#8243; accent_color=&#8221;#f68922&#8243;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1610473826244{padding-bottom: 10px !important;}&#8221;][vc_custom_heading text=&#8221;For more information or to learn how NDIS Banking Solutions can help your organization:&#8221; font_container=&#8221;tag:h5|font_size:20|text_align:left|color:%23423d3b|line_height:1.3&#8243; google_fonts=&#8221;font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;.vc_custom_1611761240317{padding-bottom: 10px !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1610118337574{padding-top: 20px !important;}&#8221;][gsf_button title=&#8221;CONTACT US&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; link=&#8221;url:https%3A%2F%2Fwww.nanodems.com%2Fsecurity%2Fcontact-us%2F%20_blank||target:%20_blank|&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][gsf_heading sub_title=&#8221;Align multiple devices, locations and communications with Nanodems NDIS.&#8221; local_subtitle=&#8221;subtitle-bottom&#8221; heading_size=&#8221;large&#8221;] Resolving Complex Financial Security Environments With Advanced PSIM Integration Solutions [\/gsf_heading][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1610470895932{padding-top: 20px !important;padding-bottom: px !important;}&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;.vc_custom_1610385940316{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 0px !important;padding-left: 0px !important;}&#8221;]The security of data, assets, people and infrastructure are the highest priority among financial institutions.\u00a0 But when legacy [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-2638","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.nanodems.com\/security\/wp-json\/wp\/v2\/pages\/2638"}],"collection":[{"href":"https:\/\/www.nanodems.com\/security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nanodems.com\/security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nanodems.com\/security\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nanodems.com\/security\/wp-json\/wp\/v2\/comments?post=2638"}],"version-history":[{"count":75,"href":"https:\/\/www.nanodems.com\/security\/wp-json\/wp\/v2\/pages\/2638\/revisions"}],"predecessor-version":[{"id":4443,"href":"https:\/\/www.nanodems.com\/security\/wp-json\/wp\/v2\/pages\/2638\/revisions\/4443"}],"wp:attachment":[{"href":"https:\/\/www.nanodems.com\/security\/wp-json\/wp\/v2\/media?parent=2638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}