ADVIA CREDIT UNION

Services we provide:

  • Discovery
  • Digital Strategy
  • Content Analysis
  • Custom Integrations
  • UX/UI Design
  • Website Development
  • Hosting
  • Support


About Advia Credit Union

Advia Credit Union has a mission to provide financial advantages to its members by providing advice, advocating for members, and offering advantages other financial institutions don’t. This is accomplished through innovative financial solutions and a new, scalable website. For this new site, Advia sought to proactively provide the quickest and easiest digital solution for members to get the best user experience. Advia is not like other financial institutions; this is illustrated in Advia’s commitment to serving the ever-changing financial needs of its members. One of its core values is to drive progress by engaging in a spirit of innovation and developing new digital service tools for its members. This led to an innovative website redesign to give members easy access to information digitally.

The Challenge

The old website was not intuitive, and the overall digital experience lacked. The lending areas of the old site for both mortgages and auto loans were not producing results. With increased in mobile traffic, the site needed an improved mobile user experience. A major challenge facing Advia’s business team was the organization and content hierarchy of the old site. The content was repetitive and text-heavy, and members were confused about where to find the information they sought. Other obstacles included Advia’s team being unable to easily update the content and structure of the pages on the old website.

Goals for the New Site:

  • Improved navigation layout
  • Measurable enhancements
  • Increase time spent on the website
  • Meets brand standards with redesign
  • Increase overall visitors engagement
  • Increase content management efficiency

Advia wanted to create a “one-stop” resource center to educate members on digital banking—including forms, links, documents, and video tutorials. Two goals for the new Advia Credit Union website were simplifying content and allowing self-service for members. Advia did not want to reinvent the wheel in terms of UI but wanted to deliver a better digital experience to its members and potential new members. The new website provides a clean and clear navigation experience to eliminate clutter and confusion.

The Right Platform

SilverTech reviewed several CMS/DX platforms with Advia. Progress Sitefinity was the chosen platform, giving Advia a fully optimized digital experience. Using the page templates on the Sitefinity platform allows Advia to accomplish the goals for the new site by enhancing the design and layout of the website with ease. The new website improves the user experience with the use of properly placed navigation buttons and call to actions (CTAs) clearly directing users through the content on the page to the sub-pages. Advia’s site has an engaging navigation and advanced filter functionality allowing users to get to the content they are looking for with ease. Additionally, the Advia content team can seamlessly update and create pages within the Sitefinity CMS, keeping the website current and relevant.

DOWNLOAD FULL ADVIA CREDIT UNION CASE STUDY

RESULTS

13.58%
Increase in session duration
1,242%
Increase in self-service/locations pageviews
7,243.46%
Increase in self-service/contact-us pageviews
571.99%
Increase in certificate accounts pageviews

The Ultimate Guide to New Digital Terms You Need to Know

12/3/24

With digital transformation evolving at lightning speed, it brings a host of new technologies and jargon that shape how businesses operate. Understanding these terms is essential for anyone navigating the digital world. This guide covers some of the latest digital terms and acronyms, with a focus on data management, security, and cutting-edge technologies like AI and machine learning. 

Customer Data Platform (CDP) 

A Customer Data Platform (CDP) is a centralized system that collects, organizes, and manages customer data from various sources like websites, emails, and social media. It unifies this data to create a comprehensive customer profile that businesses can use to personalize marketing efforts and improve customer experience. Unlike a traditional data management platform (DMP), a CDP is designed to provide a persistent, unified customer database that is accessible to other systems. The goal is to enhance personalized marketing efforts by enabling a deeper understanding of customer behavior. 

  • Example: A retail company using a CDP can gather data from its e-commerce website, mobile app, and social media to create a single customer profile, allowing for more targeted promotions and improved customer engagement. 

Digital Asset Management (DAM) 

A Digital Asset Management (DAM) system is a centralized repository for storing, organizing, and managing an organization’s digital assets. These assets can include images, videos, audio files, documents, and other multimedia content. DAM solutions make it easier for teams to find, share, and use digital content efficiently across departments while maintaining control over asset versions and permissions, streamlining workflows and ensuring brand consistency. 

  • Example: A marketing team can use a DAM platform to store branding materials, ensuring all team members have access to the most up-to-date logos, brochures, and advertisements. Ensuring that all assets comply with the brand guidelines. 

Product Information Management (PIM)  

Product Information Management (PIM) is a platform or software solution that helps businesses manage and centralize product data. It ensures consistent, accurate, and up-to-date product descriptions, specifications, pricing, and images, ensuring consistency across all sales channels, like e-commerce websites, catalogs, and brick-and-mortar stores. 

  • Example: A company that sells electronics could use a PIM system to manage product specifications for smartphones, ensuring that every online retailer displays consistent product descriptions and accurate details. 

Software as a Service (SaaS)   

Software as a Service (SaaS) refers to cloud-based software solutions that are hosted by a third party and delivered over the internet. Instead of purchasing and installing software outright, users typically pay a subscription fee for access to SaaS products, which are often updated and maintained by the service provider. SaaS is popular for its scalability, accessibility, and cost-effectiveness.

  • Example: Applications like Google Workspace, Salesforce, and Microsoft 365 are all SaaS applications, enabling users to access tools for communication, collaboration, data storage, customer relationship management and productivity from anywhere with an internet connection. 

AI (Artificial Intelligence) 

Artificial Intelligence (AI) refers to the simulation of human intelligence in machines. AI systems can perform tasks that typically require human intelligence, such as recognizing patterns, understanding natural language, making decisions, and solving complex problems. 

  • Example: AI chatbots on customer service websites provide real-time assistance by answering customer queries, without the need for human intervention. 

ML (Machine Learning) 

Machine Learning (ML) is a subset of AI that enables computers to learn from data without being explicitly programmed. ML algorithms analyze large datasets, identify patterns, and improve decision-making over time, making predictions or decisions based on historical data. 

  • Example: E-commerce platforms use ML algorithms to recommend products based on a customer’s past browsing and purchasing behavior. 

Zero Trust Security Model  

The Zero Trust Security Model is a cybersecurity model that operates on the principle that no user, inside or outside of the organization, should be trusted by default. is a security framework that operates on the principle of "never trust, always verify." In this model, no one is trusted by default—whether inside or outside the organization's network. Every user or device must be authenticated, authorized, and continuously validated before being granted access to any resource. 

  • Example: A company implementing Zero Trust requires all employees to authenticate their identities before accessing the internal network, even if they are on-site or using a company device. 

Multi-Factor Authentication (MFA)  

Multi-Factor Authentication (MFA) is a security measure that requires users to provide two or more verification factors to gain access to a system or application. These factors typically include something the user knows (password), something the user has (a physical token or smartphone), and something the user is (biometric verification, such as a fingerprint or face recognition). 

  • Example: When logging into an online bank account, a customer may need to enter their password (something they know) and confirm their identity via a code sent to their smartphone (something they have).

DLP (Data Loss Prevention)

Data Loss Prevention (DLP) refers to a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users. DLP systems monitor, detect, and block unauthorized attempts to transfer data outside of an organization’s control. 

  • Example: A company implements DLP to prevent employees from accidentally sending confidential data via email to unauthorized recipients. 

SOC (Security Operations Center) 

A Security Operations Center (SOC) is a centralized unit within an organization that deals with security issues on a technical level. The SOC team monitors and analyzes network traffic and systems for signs of malicious activity or security breaches. 

  • Example: The SOC at a large corporation continuously monitors their IT infrastructure for any signs of suspicious activity and swiftly responds to potential threats. 

Blockchain 

Blockchain is a decentralized, distributed ledger technology that records transactions across multiple computers in such a way that the transactions are immutable and transparent. It is often associated with cryptocurrencies like Bitcoin, but its uses extend to supply chain management, voting systems, and more. 

  • Example: A shipping company uses blockchain technology to track the movement of goods across the supply chain, ensuring transparency and authenticity at every stage. 

IoT (Internet of Things) 

The Internet of Things (IoT) refers to the network of physical devices—ranging from household appliances to industrial machines—that are connected to the internet and can collect and exchange data. IoT technology allows these devices to communicate and perform actions autonomously or be controlled remotely. 

  • Example: Smart thermostats, home security cameras, and wearable fitness trackers are common IoT devices that collect data and can be controlled through mobile apps. 

RPA (Robotic Process Automation) 

Robotic Process Automation (RPA) is a technology that uses software robots, or "bots," to automate repetitive, rule-based tasks typically performed by humans. RPA is widely used to streamline processes in industries like banking, insurance, and manufacturing.

  • Example: A bank uses RPA to automate the processing of loan applications, reducing the need for human intervention and speeding up approval times. 

BYOD (Bring Your Own Device) 

Bring Your Own Device (BYOD) is a policy that allows employees to use their personal devices, such as smartphones and laptops, to access company systems and data. While it can improve flexibility and productivity, BYOD also introduces security risks that need to be managed.

  • Example: An organization adopts a BYOD policy, allowing employees to access work emails and documents from their own smartphones, but implements strict security protocols to protect sensitive data. 

Security Information and Event Management (SIEM)   

Security Information and Event Management (SIEM) systems are tools that collect, analyze, and store data related to security events in real-time. SIEM helps organizations detect, respond to, and mitigate potential security threats by correlating information from various sources, including network devices, servers, and applications. 

  • Example: An enterprise using a SIEM platform can monitor abnormal user behavior, such as multiple failed login attempts, to detect and respond to potential security breaches more quickly. 

Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR) is a cybersecurity solution that monitors and responds to threats on endpoint devices, such as laptops, desktops, and mobile devices. EDR tools detect suspicious activities, provide real-time alerts, and enable the remediation of cyberattacks targeting endpoints. 

  • Example: A company deploying EDR software can identify malware on an employee’s laptop and quarantine the affected files to prevent further spread across the network. 

 

These terms represent the forefront of technological innovation and digital security. By keeping up with these digital terms, businesses and individuals can better understand how to leverage technology to improve operations, enhance security, and streamline workflows. Understanding these terms also empowers you to adapt to the evolving digital landscape in both personal and professional contexts. Whether you're in marketing, IT, or management, these technologies play an essential role in shaping the digital strategies of modern organizations. 


This website uses cookies in order to offer you the most relevant information. Please "Accept & Continue" for optimal site performance.