Professional Documents
Culture Documents
Alfalah has invested in revolutionary technology to have an extensive range of products and services.
Bank has emerged as one of the foremost financial institution in the region endeavoring to meet the needs of tomorrow as well as today
Vice President
KalSoft (Pvt.) Ltd. and Bank Alfalah have signed an agreement according to which KalSoft would be executing the complete IT integration project for Bank. Assist by delivering industry standards based service-oriented middleware
Collaborate hierarchy structure Formalization is weak Decision making is de-centralized Improved both way communication Jobs are broadly defined Emphasis on group work
Bank Alfalah uses both intra-nets and extra-nets, intra-nets are an integral part of the bank as it allows communication within the entire bank and between all departments. This helps them cut down on serving time and increases efficiency.
You don't have to even apply for Free Online Banking because Bank Alfalah has already integrated your Current Account with Free Online Banking service.
Bank Alfalah Limited signed an agreement with Teradata Corporation for the expansion of the Banks Teradata Enterprise Data Warehouse. Data warehouses can be updated and mined as infrequently as the need for management reports and decisions dictate,
The questions data mining can possibly answer for Bank Alfalah are: 1.What transactions does a customer do before shifting to a competitor bank? (to prevent attrition) 2. What is the profile of an ATM customer and what type of products is he likely to buy? (to cross sell) 3. Which bank products are often availed of together by which groups of customers? (to cross sell and do target marketing)
The CISO oversees security implementation and monitoring of over 300+ Servers, 7000+ PCs and 100+ applications.
Prime responsibility includes: (1)Designing a Bank-wide Information Security strategy based on annual IT Risk assessments and stakeholder feedback. (2)Creating a staff awareness program on new Information Security threats like malware, phishing, social networks etc.