SESSION FOUR
The Technology Effect Moderator: George Mehok, Safeguard Properties
Panelists John Ardy, Equator Marc Hinkle, Mortgage Contracting Services Brandon Kirkham, VRM Mortgage Servicing Solutions Russ Klein, Safeguard Properties John Long, Xactware Oscar Posadas, Wells Fargo Bryant Shoemaker, Yardi Systems
Industry Drivers • Quality control • Compliance • Timeliness • Service levels • Accuracy and
verification • Productivity
• Information security • Property registration • Risk mitigation • Customer satisfaction • Regulations • Profitability
Enabling Technologies • Mobile • Geo-spatial mapping • Image recognition • Big data analytics • Cloud services • Advanced analytics • Social networking
• Document management • Predictive workflow • Data encryption • Intrusion detection • Robotics • Remote sensors (M2M) • Artificial intelligence
6
Our Story • Preserving our communities and neighborhoods
nationwide • Shaping investor guidelines, industry practices and
the evolution of technology applications • Managing and controlling complaint issues • Upholding common sense expectations • Searching for, and eliminating, unsightly blight
Unmonitored Properties A Dedicated Focus
Definition: An abandoned or vacant property, possibly in default, that is creating blight in a community.
Clear and Concise Property Posting
Quality Control • Internal QC • Field QC • Training • Vendor and employee performance management • Analytics • Root cause analysis • Automated controls and data quality programs
3. Assess
1. Assign 2. Collect
5. Visualize
6. Integrate
4. Analyze
Quality Control Platform 1. Assign: Assign inspection orders to
internal/external field reps. 2. Collect: Collect data and photo
evidence in real-time from the field. 3. Assess: Assess the information
returned for quality control. 4. Analyze: Access to reporting tools
and business intelligence analytics. 5. Visualize: View detailed property
locations and ensure accuracy at the neighborhood level.
6. Integrate: Connect with servicers systems.
1. Apple 66.2%
2. Android 23.5%
3. Blackberry 5.9%
4. Windows 2.9%
5. Flip phone or non-smartphone 1.5%
What mobile device type are you currently using?
Industry’s Latest Distribution Mobile Devices
Mobile Apps Adoption
Mobile Data Adoption
Monitoring Device Adoption
Top Considerations for Mobile Apps • Context • Device proliferation • Bigger, smaller and touch devices • Voice • Point-of-sale expands to field services • Security • Feedback mechanism
Mobile Field Estimation
The Future
• Mobile • Integration • Paperless
1. Already do it or are testing 23.1%
2. One year (2015) 18.5%
3. Three years (2017) 35.4%
4. Five years (2019 or beyond) 12.3%
5. Never; will not be feasible 10.8%
When will video replace photo inspection documentation?
Cloud Computing • Private
– Services and infrastructure are maintained on a private network.
• Public – Services and
infrastructure are provided offsite over the Internet.
• Hybrid – A variety of public and
private options are available with multiple providers.
Does your company permit customer information to be stored in the “Public Cloud”?
1. Yes 12%
2. No 76%
3. Don’t know 6%
4. No, but are exploring options 6%
Contractor Validation • Revised approach and next steps
– Individual level vs. company level requirements – Universal identification number assignment – Associates individual to their credentials – Links individual and credentials to work order completion
• Role of mobile technology – Sign in/out application – GPS location confirmation – Individual tracking to work order
1. Poodle Virus 2%
2. Cryptolocker 0%
3. Employees 30%
4. Contractors 2%
5. Overseas hackers 9%
6. All of the above 57%
Which is the most serious data security risk?
V ice BID Technology by Xactware
Technology Progression
1. Wearable mobile devices (Google Glasses, Watch Phone) 13.2%
2. Flying drones 11.3%
3. Image recognition 20.8%
4. Mobile video 35.8%
5. Predictive analytics 17.0%
6. Other 1.9%
Which technology will have the greatest impact on our industry?