Voice Biometric Authentication Best Practices: Overcoming Obstacles to Adoption

Size: px
Start display at page:

Download "Voice Biometric Authentication Best Practices: Overcoming Obstacles to Adoption"

Transcription

1 Voice Biometric Authentication Best Practices: Overcoming Obstacles to Adoption Sponsored by: As technology providers and system integrators around the world successfully bring their solutions to market, we re identifying the product attributes, architectures and deployment strategies that define the best practices in layered, multi-factor and risk-based deployments of voice biometrics. January 2012 Dan Miller, Senior Analyst Opus Research, Inc. 350 Brannan St., Suite 340 San Francisco, CA For sales inquires please or call +1(415) This report shall be used solely for internal information purposes. Reproduction of this report without prior written permission is forbidden. Access to this report is limited to the license terms agreed to originally and any changes must be agreed upon in writing. The information contained herein has been obtained from sources believe to be reliable. However, Opus Research, Inc. accepts no responsibility whatsoever for the content or legality of the report. Opus Research, Inc. disclaims all warranties as to the accuracy, completeness or adequacy of such information. Further, Opus Research, Inc. shall have no liability for errors, omissions or inadequacies in the information contained herein or interpretations thereof. The opinions expressed herein may not necessarily coincide with the opinions and viewpoints of Opus Research, Inc. and are subject to change without notice. Published January 2012 Opus Research, Inc. All rights reserved.

2 Voice Biometrics Best Practices Page ii Table of Contents A Defining Moment for Voice Biometric Solutions Providers... 1 Voice Biometric Ecosystem Members to Benefit... 1 Overall Best Practice: Amplify Organic Adoption... 2 Mobile Means Feature Phones, Smartphones and Tablets... 3 Lessons from the past... 3 Early Packaging and Performance Problems (HSN and Schwab)... 4 Positioning Presented Real Obstacles... 5 Partnering To Address Perceived Deficiencies... 6 Organizational Issues: Battling Bureaucracies... 6 Pricing and ROI Concerns... 9 The Next Chapter: Voice Biometrics Fosters Trusted Commerce... 9 Does Enrollment Equate to Loyalty? Is Bulk Enrollment a Possibility? What s in the Wings for Authentication? Is Text-Independence a Best Practice? Promoting Trust and Long-term Relationships Fitting into Multi-Factor Solutions Expect Accelerated Adoption Tables Figure 1: Global picture for Registered Voiceprints... 2 Figure 2: Response to customer survey re: voice biometrics... 10

3 Voice Biometrics Best Practices Page 1 A Defining Moment for Voice Biometric Solutions Providers As we look ahead in 2012, recent events are likely to accelerate demand for voice-based authentication of individuals using mobile phones and other devices. The largest search engine company in the world, Google, is acquiring the longest-established manufacturer of mobile phones, Motorola Mobility, and has well-publicized plans to turn phones into electronic wallets. Meanwhile the largest provider of token-based authentication systems (RSA s SecureID) has been hacked, generating a lot of news coverage and further demonstrating the weaknesses of traditional authentication approaches. For the security professionals among the largest commercial banks in the United States, January 1, 2012 marked an important deadline for compliance with guidelines from the Federal Financial Institutions Examination Council (FFIEC) regarding fraud prevention on Web-based e-commerce sites. Hardening the phone channel has become an important component of those efforts. The FFIEC s counterparts around the globe - and there are dozens on a regional level, like the Committee of European Banking Supervisors, and on a national level, like the Monetary Authority of Singapore, have issued their own guidelines for processes and procedures to prevent fraud and protect privacy. These recommendations have been a boon to voice biometrics for two reasons. Stronger protection of Web-based resources expose the phone channel as a weak link in the fraud protection chain. Second, IT analysts, led by Gartner, have recently begun recommending a combination of authentication methods that include voice biometrics and reportedly expect at least one large financial institution to implement voice biometric-based caller authentication by Voice Biometric Ecosystem Members to Benefit The longest-standing, leading providers of voice biometric-based engines are Nuance (which added technologies from PerSay and Loquendo to its mix), Agnitio, VoiceVault and VoiceTrust. Each has many years of experience packaging their technologies into solutions and building partnerships with IVR makers, application providers and integrators. They are joined in the market by a number of companies with portfolios of speech-based solutions that include a voice biometric engine to support speaker detection and identification, as well as authentication. That list includes STC-SpeechPro, Voice Biometrics Group, Finivation and a few others. The efforts of the engine providers are joined by a number of solution providers who comprise a longer list of competitors or their successor firms. A number of these companies entered the market by acquiring IP from voice biometric pure-plays and incorporating it into a broader portfolio of identity management, risk management or security services. They are exemplified by CSIdentity, an identity management firm that acquired core software from VoiceVerified; Fujitsu Ltd, which acquired the IP that was developed by Kaz from Australian network operator Telstra; and ValidSoft, a company that

4 Voice Biometrics Best Practices Page 2 specializes in fraud prevention normally associated with payment cards, the internet and telephone channels. The ranks of voice biometric solution providers are rounded out by a group of software developers and system integrators that often take a COTS (customizable off-the-shelf) approach to bringing solutions to the market. Leading Software is an example of this category. Working with a large integrator like Atos-Origin, it is finding success by helping large enterprises shorten the time it takes to get an enrollment system up and running or to integrate with existing IVR (interactive voice response) systems. System integrators that specialize in contact center automation are another set of candidates with go-to-market strategies for voice biometric-based solutions. These include Datapoint, Salmat and IBM Global Services. Overall Best Practice: Amplify Organic Adoption Both customer care and security specialists see the value of establishing higher levels of trust with their customers and fellow employees. That equates to stronger authentication of individuals, not end-points, tokens or mobile devices. With Apple s introduction of Siri, a speech-enabled mobile assistant, the general public is getting tuned into the power of the spoken word for search, control and dictation. Authentication will not be far behind. The pre-requisite here is one of packaging. Figure 1: Global picture for Registered Voiceprints Source: Opus Research (2011) The result of these best practices is reflected in the slope of the curve in Figure 1, which is Opus Research s forecast for registered voiceprints on a global basis. Note that, in this document we sometimes refer to indicated best practices which we define as the approaches that solution providers

5 Voice Biometrics Best Practices Page 3 have indicated they will carry forward because they are finding the highest acceptance rates in real world implementations. Voice biometric solution providers are unlikely to be able to change behavior among the general public. But they can demonstrate how automated speech processing, when coupled with artificial intelligence (AI) as it is with Siri, is an empowering force. Early application of multi-factor authentication (including voice biometrics) helps accomplish two very important goals. First, as people carry out more e-commerce and other routine activities on their phones, biometric-based security will help prevent fraud in general. Second, during each conversation, strong authentication promotes trust, meaning that both parties can have confidence that they are in touch with the individual that they want to carry out business with. Mobile Means Feature Phones, Smartphones and Tablets Enterprise security experts know that they cannot rely on any single factor, but must instead look to more robust security methods. As soon as a C-level executive starts using her ipad for work and personal use, it becomes more important to authenticate the person who s in possession of that device. The move to mobile makes user authentication more important than ever, precisely because it is no longer sufficient to merely secure hardware endpoints. Participants want assurances that the individual at that endpoint is the person he or she claims to be. Waiting in the wings are large-scale implementations by large government agencies that have the need to closely manage disbursement of transfer payments (like social security or unemployment benefits). Such implementations have already moved past the pilot stage in Australia and New Zealand. The largest pension organization in the Philippines has been offering voice-based authentication of retirees, leveraging an existing smartcard-based identification/verification infrastructure. The ability to enroll and authenticate remotely has proven to be valuable in all of these cases. Lessons from the past The rest of this document provides specifics surrounding what Opus Research regards as best practices based on the lessons learned over more than a decade of bringing voice biometric-based solutions to the market. In it we evaluate a set of offerings, including proof-of-concept, trials and formal offerings, that failed to reach a level of enrollment or use that would deem them successful. Our assumption is that today s best practices at the very least will be those that correct long-standing shortcomings. This will lead to high growth in both the enrollment of voiceprints and the repeated use of voice authentication. To support our efforts, we will organize the roots of failure into five major categories:

6 Voice Biometrics Best Practices Page 4 Product shortcomings - including technological failures, which were prevalent in the first generation of voice biometric-based authentication Packaging addressing how well the technology was integrated into solutions to known problems. Partnerships and Promotion looking at the go-to-market strategies and relationships with system integrators, third-party solution providers and specialists in adjacent industries like identity management and credit service bureaus. Personnel assessing the considerations that need to be given to organizational structure on both the buy side and the sell side, as solution providers learn which executives and departments influence acquisition and implementation strategies. Pricing issues looking at the ROI of specific implementations and making comparisons to alternative forms of authentication, access control and transaction authorization. Early Packaging and Performance Problems (HSN and Schwab) In July 1999, Home Shopping Network (HSN) deployed the world's largest voice authentication installation using Nuance Verifier (provided by the West Coast Nuance which was acquired by Speechworks/Scansoft in 2005) to identify and authenticate frequent shoppers by comparing their voice against their pre-registered voiceprint. By mid-2000, HSN had enrolled the voiceprints of over 430,000 frequent shoppers and claimed to be adding 10,000 new customers each day. According to Nuance promotional literature, the system handled more than 160,000 calls per day and the system significantly reduced agent call times. At the same time, retail brokers Charles Schwab and Aim Investors Service, had launched voice authentication services for phone-based services. Schwab, Aim and HSN all reported high levels of customer satisfaction and a positive return on investment (ROI) based on shortened phone calls, higher automation rates and stronger customer loyalty. But these high-profile deployments, and others, exposed two problems in the packaging and promotion of voice biometric solutions. Regarding packaging, voice biometric-based solutions were positioned almost exclusively as speech applications, closely mated to interactive voice response (IVR) systems (those computers that answer the phone and offer voice menus), rather than as authentication mechanisms that could leverage existing security and business process management software and infrastructure. This positioning led to an overall failure of the early deployments to deliver acceptable performance rates, as large customers, like HSN and Schwab, sought to achieve large-scale deployments. Packaging also jeopardized the solutions ability to scale. Nuance s Caller Authentication and Speechworks solutions were positioned as enhancements

7 Voice Biometrics Best Practices Page 5 to core speech recognizer technology. This created performance, cost and scaling issues which led early implementers to abandon their projects. Retailers, for example, found it risky to ramp-up enrollment and authentication systems that were placed in the critical path for revenuegenerating activities. They often slowed the purchase activities of their most desirable, strategic customers. The services were quietly abandoned in order to avoid highly-visible, costly failures. Today s voice biometric-based authentication engines start with greater accuracy than the turn-of-the-century technologies. Solution providers also benefit from indicated best practices that package voice-based authentication as an extension of existing caller authentication and imposter detection software and services. Thus, the primary point of integration is not an IVR. Instead, solutions are, more accurately customer-centric and context sensitive, leveraging business logic to apply the proper level of security as needed given a caller s identity and the nature of the transaction being undertaken. They also leverage the token-based service that back-ends today s PIN and Password infrastructure. Positioning Presented Real Obstacles During the period of time between 1999 and 2006, innumerable deployments were delayed or postponed as they came under the scrutiny of chief security officers (CSOs). Because vendors made the mistake of positioning voiceprints as PIN replacements, they created formidable barriers to adoption. They seemed to be saying voice biometrics are all about security. CSOs or their staff members were more than happy to sit on vendor selection committees to challenge the accuracy and efficacy of voiceprints. The problem was that PIN-based systems seldom experienced a technical failure, but usability failures, in the form of forgotten PINs, were already high. In fact, the problem of forgetting PINs and passwords is about to go into overdrive as large firms attach more strictures on their employees. Access control is no longer based on four-digit PINs. Passwords or pass phrases now must be at least six characters in length and include at least one number and one special character. They must be refreshed or replaced every three months, and employees are forbidden to repeat an old password within a 12- month period. But the result is a less secure environment, as employees create text files on their smartphones that include all of their passwords or, more commonly, just write their password on Post-It notes, which they stick to their computer screens. Today, Opus Research regards best practice in access control to be the use of voice biometric-based authentication in ways that are consistent with existing business rules and processes. Successful vendors convey the message that access control is about speed and convenience, as well as security. This presentation shifts the measure of success away from the rigid idea of zero false accepts (which is an inaccurate term anyway), to one of addressing log-in failure (based on technology, usability or other factors), which can be reduced in the interest of creating a better user experience.

8 Voice Biometrics Best Practices Page 6 Partnering To Address Perceived Deficiencies Voice biometric-based authentication platforms are on the front line and in the critical path of all manner of secure e-commerce. Thus it is understandable that large companies in financial services, telecommunications, healthcare and retailing might hesitate to contract with small, unproven firms. This explains why a number of the early adopters with large, customer-facing implementations contracted with large system integrators or solutions providers. For example, telecommunications company BellCanada s implementation was built on PerSay (now Nuance) VocalPassword technology, but IBM Global Services acted as system integrator and project manager. IBM Global Services also acted as the integrator/solution provider for Volkswagen Bank, when industry upstart VoiceTrust was selected to provide core technology for a large password reset application in The hosted services and business process outsourcing (BPO) division of telecom giant Telstra was the solution provider to Australia s social security administration, Centrelink. Even for smaller implementations, like the hundreds of thousands of customers for AHN or WestPac bank, the likes of Salmat or Dimension Data act as go-to-market partners for lesser known and newer technology providers. Larger partners like IBM GS serve a dual role. They can bring a team of software professionals who are familiar with a large firm s existing enterprise software infrastructure. But just as importantly, they can serve as a singlepoint-of-contact (the proverbial one-throat-to-choke ) when implementations hit bumps along the way to full deployment. Plus, through their size and access to insurance, they can indemnify smaller companies should there be a system failure that creates an economic loss for the client. Organizational Issues: Battling Bureaucracies Protracted vendor evaluation exercises and trials characterized many of the deployments between 2002 and Characteristics of customers in the targeted sectors financial services and large government agencies contributed to the long sales cycles. Among commercial banks, ABN AMRO provides some object lessons about the impediments to adoption and related roll-out issues. As for large government implementation, there are lessons that can be learned regarding Australia s Centrelink.. Let s start with Centrelink because organizational and architectural issues introduce unparalleled levels of complexity. Among them: Deployments are political processes that move at the speed of large governments Planning and testing cycles were exceedingly long to accommodate pre-established approval procedures User experience for enrollment (specifically length of calls) was treated as a secondary or tertiary issue (behind accuracy and security)

9 Voice Biometrics Best Practices Page 7 Process was gated by the long-term procurement cycle. In this case the entire government telecom infrastructure (including contact centers) is outsourced and periodically renegotiated on ten-year cycles In brief, Centrelink was a huge undertaking, involving 4,000 staff members operating out of 25 call centers and handling a potential 33 million calls each year. By mid-2010 it was enrolling 800 new users each month and handling 7,000 authentications, which seems modest in a country where 150,000 calls are handled by the agency s IVR on a daily basis. The target was to serve all 450,000 PIN users. Latest assessment is around 200,000. Voice authentication was only one of many IVR applications. It was also treated as one of seven major IVR applications relevant to user authentication. It was primarily treated as a PIN replacement when PINs are forgotten or they expire. Trials were also delayed during protracted vendor evaluations. Lessons learned, according to David Wright, the Centrelink project manager, include: Make sure security is balanced with customer usability Engage your stakeholders early in the process and take them along the journey with you Prove the technology works and gain business confidence Be ready to adapt, including improving call flows and / or business rules Think about the future, including upgrades / new technology Plan ahead for change, for example an aging template These cautionary suggestions, especially those involving the engagement of stakeholders early in the process, can be considered best practices for implementations in large businesses as well as government bureaucracies. This brings us to ABN AMRO, which provides another set of cautionary considerations for today s solution providers. In this case, a commercial bank sought to differentiate itself by giving a high profile to a novel approach to user authentication and security. In 2007, as it started to evaluate and deploy speaker authentication in its contact centers, it was one of the top 20 independent banks in the world. Its Dutch contact center received over 35 million calls each year and all but 7 million were routed to live agents. In 2006 ABN AMRO began two separate but related initiatives surrounding speech technologies. One was to replace the menu-driven IVR systems with voice-based self-service with speech-recognition-based navigation. At the same time the bank initiated a PIN replacement effort that closely linked voice biometric-based user authentication with a token-based device. In essence it was replacing the PIN part of Chip and PIN with a spoken passphrase. This approach was quite different to other layered, multifactor approaches that we had observed.

10 Voice Biometrics Best Practices Page 8 Opus Research believes that replacing PIN-based authentication with an approach that requires unique hardware and multiple steps, where entry of a simple PIN would have sufficed, was a barrier to adoption. While it was promoted as a mechanism for voice-based verification of frequent callers, bank management approved the technology based on the use of a hardware token as a back-up for the less frequent callers. In addition to the speech navigation and multi-factor token approaches described above, ABN AMRO initiated a separate project to evaluate voice verification. It evaluated speaker verification products from five global vendors and actually selected a single voice biometric authentication provider (VoiceVault) in Based on a Proof-of-Concept among over 1,400 participants, project managers and bank management were convinced that the technology was ready to implement with its general customer base. The bank even did customer surveys and determined that 83% of its customers preferred voice verification to the traditional PIN; 99% would use it to gain access to balance info and nearly 75% would use it to initiate a money transfer. The acquisition of ABN AMRO by a consortium of financial institutions, including Royal Bank of Scotland (RBS), Fortis and Bank Santander, probably led to the demise of the voice verification project. RBS and Santander had voice verification initiatives of their own, with Santander being among the earliest implementers of customer-facing caller authentication. Fortis, on the other hand, after being ranked among the 20 largest companies in the world in 2007, was forced to sell-off most of its operating units during the financial crisis of In the midst of both internal and external turbulence, the voice authentication efforts of ABN AMRO were quietly shut down. Both Centrelink and ABN AMRO helped the core technologies cross some very important thresholds. They achieved false accept rates (FAR) and false reject rates (FRR) that were considered quite acceptable both by callers and by security personnel. ABN AMRO was also able to demonstrate that its approach, employing the VoiceVault engine, was able to detect and reject efforts to thwart the system using tape replays. The bank had plans to roll out several applications in the fourth quarter of 2008, bringing voice-based authentication to support retrieval of account information, money transfers and stock trading to 4 million clients, whom it expected to enroll on a voluntary basis. In addition to falling victim to the banking crisis of , ABN AMRO found out that taking a voluntary or opt-in approach to enrollment presented a formidable barrier to adoption. The three largest implementations (BellCanada, Global Bilgi/Turkcell and Aeroplan) have implemented enrollment procedures considered best practices that, in effect, market voice biometric-based authentication to inbound callers. Scripts or live agents explain the advantages of enrolling for more secure, speedy and convenient future interactions and then proceed to march them through the enrollment process. Customers must opt out of the onboarding process, at which time they are routed to existing authentication resources.

11 Voice Biometrics Best Practices Page 9 Global Bilgi and Aeroplan report that fewer than 20% of callers choose to opt out of the process, and some of those who fail to enroll do so due to other circumstances, such as noisy environments or bad telephone connections. Pricing and ROI Concerns There is much evidence that many firms have found themselves unable to cost-justify voice biometric implementations. This is quite frustrating for veteran sales people in both the security and the speech application domains. At a time when e-commerce fraud and identity theft is reportedly at an alltime high, it is frustrating that banks, credit card issuers, major retailers and even government agencies find it necessary to leave the losses from such activity largely undisclosed. What s more, they seldom connect the dots between strong authentication and reduction in such fraud losses. By contrast, the providers of speech-enabled applications have become adept at proving the ROI of their solutions by documenting that the combination of speech-based navigation and voice biometric-based authentication shortens the average time that it takes for a caller to complete a phone-based transaction. For high-volume, customer-facing contact centers, saving seconds can amount to millions of dollars in savings over the course of a year. Opus Research sees that a best practice in pricing is to bring implementation costs in line with the expected savings that will result from the reduction in call times. These are the hard dollar savings resulting from reduced personnel costs, minutes of use on communications networks and facilities costs. Beyond these documented benefits are soft benefits that related to customer satisfaction, retention and the ability to upsell and cross-sell based on rapid authentication of callers and high levels of confidence that the individual on the other end of a phone call is, indeed, who he or she claims to be. But the unspoken benefit of strong authentication is, of course, fraud reduction. While most companies (especially among financial services providers, card issuers and retailers) are loathe to reveal exact figures for fraud losses, they are well-aware of the hard dollar benefits of fraud reduction. The Next Chapter: Voice Biometrics Fosters Trusted Commerce Success at BellCanada, Global Bilgi and Aeroplan, along with password reset applications - representing roughly 8 million registered voiceprints by the end of 2010 provides sufficient evidence that the technology works at scale. Now that the umbrella concern about the technology has been laid to rest, attention rightfully turns to defining the use cases and solutions that provide the best user experience. Service providers frequently survey a range of individuals to learn whether they are likely to enroll their voiceprints and derive benefits from voice-based authentication. Most recently, Financial Sector Technology (FSTech) Magazine surveyed over 100 CISOs and heads of security at financial institutions. More than two-thirds of respondents stated that guarding against card-related fraud was a top priority.

12 Voice Biometrics Best Practices Page 10 More importantly, as shown in Figure 2, nearly twice as many respondents believe that voice biometrics has a role to play in reducing fraud, than those who don t. Figure 2: Response to customer survey re: voice biometrics Source: Validsoft/FSTech Security Sentifment Survey (2011) Among lessons learned from past implementations, issues surrounding initial enrollment and building a base of protected users rank very highly. These, along with other lessons learned, raise the following questions, discussed below: issues. Does Enrollment Equate to Loyalty? Acceptance and repeated use of voice-based authentication starts with an enrollment process that puts emphasis on a long-term relationship. The largest implementers have learned that a proposition that says, We d like to take about 3 minutes of your time to save you a minute on all your subsequent calls elicits a significant positive response and a large percentage of callers opt in to the service. When it comes to promoting a loyal, long-term relationship, hosted voice biometric solutions provider, VoiceTrust, experiences very high enrollment rates for its G2P (Government to People) transfer payment services. In this case, registering one s voiceprint is a pre-requisite for receiving pension benefits. Is Bulk Enrollment a Possibility? Because some compliance directives (in healthcare, insurance, banking) require audiofiles to be stored for a matter of years, it has been suggested that large companies could take advantage of this rich set of spoken utterances to engage in bulk caller authentication. Once a single speaker s voice has been isolated from others on a phone line and it can be associated with a known identity and, upon capture of sufficient spoken material, be distilled into a voiceprint.

13 Voice Biometrics Best Practices Page 11 There are ethical, and perhaps legal, issues associated with this passive approach to enrollment. But some vendors have argued that callers can be informed that their voice is being recorded to provide more convenient security on future calls. It cannot be characterized as a best practice and, given the pace at which buyers move to new approaches, it probably won t become a common practice either. What is more, the creepiness factor will always be very high for capture of personal characteristics (whether voice, fingerprints, iris scans or pictures of one s face); it will always seem surreptitious. What s in the Wings for Authentication? The most common practice, when looking at the largest, customer-facing implementations, is the use of a pass phrase such as my voice is my password for speaker verification. Such text-dependent solutions predominate because they have proven demonstrably more mature. Enrollment routines are well-defined, Equal Error Rates (EER) are well documented and tools exist for assessing scores and adjusting acceptable False Accept Rates (FARs) and False Reject Rates (FRRs) to suit each use case. Where randomness is required, as part of a routine to discourage replay attacks, a digit-based system is well-received by current implementers. In these instances, enrollment involves capturing the digits zero-though-nine a number of times from which the voiceprint is distilled. For authentication, the digits are displayed in a random order so that the replay of a tape-recorded pass phrase would not be accurate. Providers of pass phrase-based authentication systems have other ways of detecting the use of a tape recorder, such as detecting a tape hiss or humming sound that commonly occurs with playback equipment. Is Text-Independence a Best Practice? Text-independent methods for enrollment and subsequent authentication are making slow headway out of development labs and the government sector, where text- and language-independent solutions have matured as part of surveillance and speaker detection schemes. Prior to acquisition by Nuance, PerSay had installed its FreeSpeech solution at a commercial bank in Israel. Text independent, passive, enrollment has been demonstrated for several years. A few investment houses have trialled convenient and secure interactions to high net worth individuals. Text-independence equates to language-independence as well and, for that reason, a number of multi-national banks have been monitoring or trialing new systems with an eye to determining the minimum length of spoken utterances required to build a voice print (this had been 30 seconds to a minute but has been reduced to 20 seconds in the lab ) and the minimum amount of conversational speech to do an accurate authentication (moving toward 10 seconds).

14 Voice Biometrics Best Practices Page 12 As layered, multi-factor and risk-based authentication solutions prevail, we expect to see more creative, text-independent applications. In many industries, enterprises are required to monitor and record all phone-based interactions, which means that a certain amount of forensic work can be performed on stored audiofiles. Text-independent solutions can support passive enrollment as well as speaker change detection, for which there is an obvious need from educational institutions that offer remote testing or certification and need assurance that the person taking the test is the person he or she claims to be. There are similar applications for companies with virtual contact centers that require work-at-home agents to authenticate themselves at the beginning of a shift but offer no assurance that the same person is there to complete a shift. Promoting Trust and Long-term Relationships After initial enrollment, constant behavioral reinforcement is required to keep interest and activity up. The most conspicuous and appropriate applications have been for financial services companies who have launched voice biometric-based authentication services designed to give high net worth individuals confidence that their financial services provider is making a special effort to provide good service and high levels of security. Citing VoiceTrust once again, as part of its proof-of-life service the first registration must be in person, but after that the company uses a proprietary algorithm to compensate changes that happen with age. Fitting into Multi-Factor Solutions The mission for solutions providers at large is to make voice biometrics part of a multi-factor, layered solution that provides a highly secure, convenient service to targeted customers. This will become especially important as transactions of all kinds are initiated from mobile devices and it becomes more crucial than ever before to authenticate the individual in possession of the mobile device through which each transaction is initiated. ValidSoft, which entered the marketplace with a four-factor approach to user authentication, VALid, exemplifies a set of best practices in terms of building confidence that a company is not dealing with an imposter. Voiceprints, representing something you are, are taken into consideration with something you have (a mobile phone), something you know (usually a PIN or password) and somewhere you are (or are not), which can be ascertained using ValidSoft s Proximity Correlation Logic. By incorporating all four factors into a single platform, along with a number of invisible realtime checks, the company is able to support strong authentication in a nonintrusive, convenient way. In all cases, such solutions should provide a pleasing experience for callers. One strategy is to closely link voiceprints with a very convenient mechanism for strong authentication on an as-needed basis. Other factors that may come into play are obvious signs that an individual is an imposter. For

15 Voice Biometrics Best Practices Page 13 example if a customer living in Bethesda, MD, originates a call from Sudan or a caller named Dan Miller has a decidedly female voice. When it comes to detecting imposters or assigning the high-risk tag to a particular caller or individual the voice channel alone does not provide all the answers. Most large businesses already have rule-based systems and business logic in place to support the goals of the Chief Security Officer. These well-established and time-tested rules are the ones that should be applied to govern the level of risk associated with the individual on the other end of the phone or at a student or employee s workstation. Expect Accelerated Adoption Bolstered by real world experience, regulatory guidelines and analysts recommendations, executives at financial services companies, healthcare providers and telecommunications service providers are forging ahead with plans to implement voice biometric technologies. In this document, Opus Research has identified approaches to user enrollment and subsequent authentication that overcome long-standing barriers to adoption by creating a pleasing and engaging user experience and leveraging existing security infrastructure to support the goal of fraud prevention. To answer the question, What has changed? in regards to adoption of the technology in the past year: companies are finding that both employees and customers have grown comfortable using multiple mobile devices and making seamless transition from real-time conversations to ones that happen over a period of time via texting, chat, tweeting or other social network-based tools. What s more, they use smartphones, wireless PCs and laptops as mobile assistants, on which personal contact lists, applications and data coexist with sensitive information that is supposed to be under tight corporate control. In the social, mobile environment, user authentication (as opposed to deviceoriented access control) has become more important than ever before in order to prevent unauthorized access to corporate resources. Meanwhile, user experience aficionados are new to the security discussion, but have rapidly come to a similar conclusion: banks, insurance companies, government agencies, telcos and retailers serve customers, not their phones or other devices. Over time, they will find that strong, rapid authentication will enable them to serve their best, longest-standing customers in the most personal and efficient way. Because the devices are often phones, voiceprints are perceived as the most natural and efficient authentication mechanism. In conjunction with layers of other factors, protocols and business rules, decisionmakers are making voice biometrics part of security solutions that provide high levels of confidence and foster stronger customer bonds over time. To support secure, customer-centric e-commerce using voice biometrics, the time is now.

Enterprise Readiness Series: The Case for Passive, Voice-Based Authentication

Enterprise Readiness Series: The Case for Passive, Voice-Based Authentication Enterprise Readiness Series: The Case for Passive, Voice-Based Authentication Today s customer authentication methods are from another age. Opus Research interviewed security and customer care professionals

More information

Voice Authentication On-Demand: Your Voice as Your Key

Voice Authentication On-Demand: Your Voice as Your Key Voice Authentication On-Demand: Your Voice as Your Key Paul Watson, Vice President Relationship Technology Management Voice Search Conference March 2-4, 2009 Convergys Corporation A Global Leader in Relationship

More information

Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog. A Nuance Education Paper

Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog. A Nuance Education Paper Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog A Nuance Education Paper 2009 Definition of Multi-Factor Authentication Dialog Many automated authentication applications

More information

A New Authentication Paradigm:

A New Authentication Paradigm: A New Authentication Paradigm: Call Center Security without Compromising Customer Experience Financial institutions can reap significant financial gains by using voiceprints to authenticate through the

More information

- 2013 FINANCIAL INDUSTRY TRENDS REPORT - Cashing in on the Customer Experience: 7 Steps to Revolutionize Your Bank s Customer Service Strategy

- 2013 FINANCIAL INDUSTRY TRENDS REPORT - Cashing in on the Customer Experience: 7 Steps to Revolutionize Your Bank s Customer Service Strategy Cashing in on the Customer Experience: 7 Steps to Revolutionize Your Bank s Customer Service Strategy Financial institutions must take action to adapt to a post-crisis era. Banks and credit unions face

More information

ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS

ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS ImpostorMaps is a methodology developed by Auraya and available from Auraya resellers worldwide to configure,

More information

Overcoming basket abandonment through effective implementation of real-time communications services.

Overcoming basket abandonment through effective implementation of real-time communications services. Overcoming basket abandonment through effective implementation of real-time communications services. The benefits of real-time customer engagement For the vast majority of online retailers, converting

More information

Seven ways to boost customer loyalty and profitability through an empowered contact center

Seven ways to boost customer loyalty and profitability through an empowered contact center Seven ways to boost customer loyalty and profitability through an empowered contact center Is your bank using today s communications technology to its full potential? The financial services industry as

More information

Agenda. Announcement: Verint Acquires Victrio Victrio Solutions Client Results in Deployment Critical Success Factors Verint + Victrio Synergy

Agenda. Announcement: Verint Acquires Victrio Victrio Solutions Client Results in Deployment Critical Success Factors Verint + Victrio Synergy 1 Agenda Announcement: Verint Acquires Victrio Victrio Solutions Client Results in Deployment Critical Success Factors Verint + Victrio Synergy 2 October 29: Verint Acquires Victrio Who is Verint? (NASDAQ:VRNT)

More information

VoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk

VoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk VoiceTrust Whitepaper Employee Password Reset for the Enterprise IT Helpdesk Table of Contents Introduction: The State of the IT Helpdesk...3 Challenge #1: Password-Related Helpdesk Costs are Out of Control...

More information

Customer experience roulette: are banks making the right investments?

Customer experience roulette: are banks making the right investments? Customer experience roulette: are banks making the right investments? A survey of banking consumers and executives. 1 Executive summary Nuance commissioned a survey of 1,000 American consumers to learn

More information

Contact Center Automation

Contact Center Automation Frequently Asked Questions on Contact Center Automation Summary Uniphore Software Systems, a pioneer in providing voice-based mobility solutions has integrated its Contact Center Automation solutions to

More information

Report» Beyond the Checklist: 10 Attributes of Successful Cloud Contact Centres

Report» Beyond the Checklist: 10 Attributes of Successful Cloud Contact Centres Report» Beyond the Checklist: 10 Attributes of Successful Cloud Contact Centres The Cloud is Old News The move to The Cloud started as a blatant play to save money by cutting capital expenditures on new

More information

At a recent industry conference, global

At a recent industry conference, global Harnessing Big Data to Improve Customer Service By Marty Tibbitts The goal is to apply analytics methods that move beyond customer satisfaction to nurturing customer loyalty by more deeply understanding

More information

The Three Waves of Customer Care

The Three Waves of Customer Care White Paper The Three Waves of Customer Care What You Will Learn This white paper, intended for business decision makers, describes the three major waves of innovation experienced in the customer care

More information

IP Contact Centers Approach Maturity

IP Contact Centers Approach Maturity Decision Framework, S. Blood, T. Wright Research Note 11 December 2002 IP Contact Centers Approach Maturity Enterprises should evaluate IP-based contact-center applications and next-generation architecture

More information

Maximizing Customer Retention: A Blueprint for Successful Contact Centers

Maximizing Customer Retention: A Blueprint for Successful Contact Centers Maximizing Customer Retention: A Blueprint for Successful Contact Centers Sponsored by Table of Contents Executive Summary...1 Creating Loyal Customers: A Critical Company Goal...1 Causes of Customer Attrition...2

More information

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION A Goode Intelligence white paper sponsored by AGNITiO First Edition September 2014 Goode Intelligence All Rights Reserved Sponsored

More information

Guide to Evaluating Multi-Factor Authentication Solutions

Guide to Evaluating Multi-Factor Authentication Solutions Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor

More information

customer care solutions

customer care solutions customer care solutions from Nuance enterprise white paper :: Voice Biometrics Industry Solutions Overview Nuance s voice biometrics products are designed to meet the dynamic security needs of the world

More information

Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs

Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs Solutions White Paper Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs Table of Contents Executive Summary............................. 1 Business Challenge.............................

More information

IVR CRM Integration. Migrating the Call Center from Cost Center to Profit. Definitions. Rod Arends Cheryl Yaeger BenchMark Consulting International

IVR CRM Integration. Migrating the Call Center from Cost Center to Profit. Definitions. Rod Arends Cheryl Yaeger BenchMark Consulting International IVR CRM Integration Migrating the Call Center from Cost Center to Profit Rod Arends Cheryl Yaeger BenchMark Consulting International Today, more institutions are seeking ways to change their call center

More information

CRM Excellence Award Winner: BCAA

CRM Excellence Award Winner: BCAA Case Studies, A. Sarner Research Note 5 December 2002 CRM Excellence Award Winner: BCAA A project to capture and consolidate member data grew into a winning customer relationship management initiative

More information

Building and Measuring Business Value:

Building and Measuring Business Value: Business White Paper Building and Measuring Business Value: Customer Satisfaction Surveys April 2008 Table of Contents 3 Introduction 3 The Need for Insight 3 The Right Measurement Tool 4 Survey Dimensions

More information

Hitachi ID Password Manager Telephony Integration

Hitachi ID Password Manager Telephony Integration Hitachi ID Password Manager Telephony Integration 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Functional integration 2 2.1 Self-service password reset....................................

More information

Criteria for a Third- Generation Chat Solution: Customer Service

Criteria for a Third- Generation Chat Solution: Customer Service Criteria for a Third- Generation Chat Solution: Customer Service A Delivery Model for Incremental Online Conversion August, 2010 www.sitel.com Table of Contents 1. Executive Summary 2. Focus on Incremental

More information

Contact Center Performance Management Software

Contact Center Performance Management Software Markets, W. Close Research Note 7 March 2003 Contact Center Performance Software Enterprises face critical challenges in contact center management. Capitalizing on people, performance and analytics will

More information

Strong Authentication. Securing Identities and Enabling Business

Strong Authentication. Securing Identities and Enabling Business Strong Authentication Securing Identities and Enabling Business Contents Contents...2 Abstract...3 Passwords Are Not Enough!...3 It s All About Strong Authentication...4 Strong Authentication Solutions

More information

Nuance Destination Solutions. Save. Grow. Earn. Customer Interaction over the Voice Channel. Self-Service the Right Way

Nuance Destination Solutions. Save. Grow. Earn. Customer Interaction over the Voice Channel. Self-Service the Right Way Nuance Destination Solutions Save. Grow. Earn. Customer Interaction over the Voice Channel Self-Service the Right Way SAVE Nuance is changing the way companies communicate with their customers over the

More information

When did you first build your current ecommerce platform? Or when did you last upgrade or replatform?

When did you first build your current ecommerce platform? Or when did you last upgrade or replatform? Technological advances and social networking continue to transform the online shopping experience. Meanwhile shoppers expectations are set by the best-of-breed ecommerce sites they frequently visit. That

More information

Shared VRU. A Key Link in Your Customer Service Chain Kyle Shadday, Director, Voice Response Strategy

Shared VRU. A Key Link in Your Customer Service Chain Kyle Shadday, Director, Voice Response Strategy Shared VRU A Key Link in Your Customer Service Chain Kyle Shadday, Director, Voice Response Strategy Agenda Voice response within FIS Telephone banking today FIS shared VRU roadmap Speech recognition Unleash

More information

5Ways. to Put Your CRM Data to Work. for You and Your Customers

5Ways. to Put Your CRM Data to Work. for You and Your Customers 5Ways to Put Your CRM Data to Work for You and Your Customers Customer Relationship Management (CRM) solutions are becoming increasingly prevalent in today s organizations to collect and manage information

More information

CRM in the Contact Center and the Emergence of the Unified Agent Desktop

CRM in the Contact Center and the Emergence of the Unified Agent Desktop CRM in the Contact Center and the Emergence of the Unified Agent Desktop An excerpt from Datamonitor s recent report, DMTC2207 SUMMARY Publication Date: September 2008 Contact centers face ever-increasing

More information

Benefits of Personalizing IVR: An Eircom Case Study

Benefits of Personalizing IVR: An Eircom Case Study Benefits of Personalizing IVR: An Eircom Case Study Reference Code: IT024-000014 Publication Date: 08 Apr 2014 Author: Clare McCarthy SUMMARY Catalyst Customer-service channels are at the forefront of

More information

First Data Learns to Manage Online Merchant Risk

First Data Learns to Manage Online Merchant Risk Case Studies, A. Litan Research Note 1 April 2003 First Data Learns to Manage Online Merchant Risk Selling accounts and payment processing to online merchants represents First Data's fastest-growing market.

More information

ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE

ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE Purpose This document explains the benefits of using Risk Based Authentication (RBA) a dynamic method of cardholder authentication

More information

How to reduce the cost and complexity of two factor authentication

How to reduce the cost and complexity of two factor authentication WHITEPAPER How to reduce the cost and complexity of two factor authentication Published September 2012 48% of small and medium sized businesses consistently cite technical complexity and cost of ownership

More information

RETAIL COMMUNICATIONS

RETAIL COMMUNICATIONS RETAIL SOLUTIONS RETAIL solutions RETAIL COMMUNICATIONS THE CHALLENGES Your employees are busy serving in-store customers, the phones are ringing unanswered; will missed calls result in missed sales opportunities?

More information

Seven ways to boost customer loyalty and profitability through an empowered contact center

Seven ways to boost customer loyalty and profitability through an empowered contact center Seven ways to boost customer loyalty and profitability through an empowered contact center Is your bank using today s communications technology to its full potential? Table of Contents Differentiate the

More information

The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device

The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-668-6536 www.phonefactor.com Executive

More information

The In-Depth Guide to Fraud Prevention in International E-commerce

The In-Depth Guide to Fraud Prevention in International E-commerce The In-Depth Guide to Fraud Prevention in International E-commerce The Evolution of Fraud Cyberattacks are not a new threat, yet the rise in high-profile hacking cases has merchants rightfully concerned

More information

Application of Biometric Technology Solutions to Enhance Security

Application of Biometric Technology Solutions to Enhance Security Application of Biometric Technology Solutions to Enhance Security Purpose: The purpose of this white paper is to summarize the various applications of fingerprint biometric technology to provide a higher

More information

Customer contact solutions from Genesys and IBM: Improve your customers experience and reduce costs

Customer contact solutions from Genesys and IBM: Improve your customers experience and reduce costs Customer contact solutions from Genesys and IBM: Improve your customers experience and reduce costs Highlights Integrated contact centre solutions that help identify, acquire, develop and retain high

More information

W3C Speaker Identification and Verification Workshop

W3C Speaker Identification and Verification Workshop W3C Speaker Identification and Verification Workshop Speaker Verification in a Multi-Vendor Environment Mr Ross Summerfield (with support from Dr Ted Dunstone and Dr Clive Summerfield) What is Centrelink?

More information

Organizations Must Employ Effective Data Security Strategies

Organizations Must Employ Effective Data Security Strategies Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security

More information

IBM Global Business Services Microsoft Dynamics CRM solutions from IBM

IBM Global Business Services Microsoft Dynamics CRM solutions from IBM IBM Global Business Services Microsoft Dynamics CRM solutions from IBM Power your productivity 2 Microsoft Dynamics CRM solutions from IBM Highlights Win more deals by spending more time on selling and

More information

Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty

Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty Conducted by Javelin Strategy & Research June 2010 All Rights Reserved Rising Fraud

More information

Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment

Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment Using Voice Biometrics in the Call Center Best Practices for Authentication and Anti-Fraud Technology Deployment This whitepaper is designed for executives and managers considering voice biometrics to

More information

Chat Enhancements Optimize Customers Web Experience

Chat Enhancements Optimize Customers Web Experience Chat Enhancements Optimize Customers Web Experience Brands Realize Significant Benefits When Providing Automated Web Chat Support for Online Customers Executive Summary Chat, an effective interactive web

More information

White Paper. Speech-enabled applications can provide better customer service at 1/12th the cost of live agents. Nuance. Speech. Understanding. Action.

White Paper. Speech-enabled applications can provide better customer service at 1/12th the cost of live agents. Nuance. Speech. Understanding. Action. White Paper 1005 Hamilton Court Menlo Park, CA 94025 Phone 650.847.0000 Fax 650.847.7979 www.nuance.com Speech-enabled applications can provide better customer service at 1/12th the cost of live agents

More information

LIVE CHAT ANALYTICS & ROI Using analytics to measure the ROI of engagement

LIVE CHAT ANALYTICS & ROI Using analytics to measure the ROI of engagement Using analytics to measure the ROI of engagement Website analytics have evolved a lot since the humble Page View. No longer are decisions on new changes based on guesswork and intuition. Instead, you can

More information

GUIDE TO PURCHASING A PHONE SYSTEM FOR YOUR CALL CENTER

GUIDE TO PURCHASING A PHONE SYSTEM FOR YOUR CALL CENTER GUIDE TO PURCHASING A PHONE SYSTEM FOR YOUR CALL CENTER A STEP-BY-STEP PRIMER TO HELP YOU SELECT THE RIGHT SOLUTION FOR YOUR SMALL TO MIDSIZE BUSINESS GUIDE TO PURCHASING THE RIGHT PHONE SYSTEM FOR YOUR

More information

Do Low-Cost Bundled Banking Services Solutions Cost More in the Long Run?

Do Low-Cost Bundled Banking Services Solutions Cost More in the Long Run? With over 20 billion credit card purchase transactions in the US in 2009 and a highly complex system for processing those transactions, it s not surprising that credit card information is a key target

More information

Connecting the Dots on the Omnichannel Customer Journey

Connecting the Dots on the Omnichannel Customer Journey A new e-book from TeleTech for sales, marketing, and customer care leaders. Connecting the Dots on the Omnichannel Customer Journey Everybody s talking about omnichannel these days. But what is omnichannel

More information

Private Label ACH Debit Programs

Private Label ACH Debit Programs Private Label ACH Debit Programs What Doesn t Meet The Eye Can Be A Real Eye-Opener Merchants are increasingly focusing on managing payment transactional costs. As a result, some merchants are considering

More information

A strategic approach to fraud

A strategic approach to fraud A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for

More information

whitepaper critical software characteristics

whitepaper critical software characteristics australia +613 983 50 000 brazil +55 11 3040 4700 canada +1 416 363 7844 cyprus +357 5 845 200 france +331 5660 5430 germany +49 2 131 3480 ireland +353 1 402 9439 israel +972 3 754 6222 italy +39 06 5455

More information

EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02

EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Decision Framework, J. Radcliffe Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Europe, the Middle East and Africa Customer Relationship Management Analytics Suite

More information

WITH AGILE TECHNOLOGY

WITH AGILE TECHNOLOGY FUTURE-PROOF BANKING STRATEGIES Technology Transformation STARTS NOW Banks now better understand the strategic nature of their core systems and are ready to embark on critical technology projects to support

More information

Improving Customer Experience with IVR

Improving Customer Experience with IVR Improving Customer Experience with IVR June 2014 Sponsored By: Table of Contents Introduction... 1 Visual IVR... 2 Voice Biometrics... 3 IVR Analytics... 3 Simplified IVR Development Environments... 5

More information

Enterprise Single Sign-On SOS. The Critical Questions Every Company Needs to Ask

Enterprise Single Sign-On SOS. The Critical Questions Every Company Needs to Ask Enterprise Single Sign-On SOS The Critical Questions Every Company Needs to Ask Enterprise Single Sign-On: The Critical Questions Every Company Needs to Ask 1 Table of Contents Introduction 2 Application

More information

Multi-Factor Authentication of Online Transactions

Multi-Factor Authentication of Online Transactions Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best

More information

The New Rules of Workforce Management

The New Rules of Workforce Management The New Rules of Workforce Management What can today s Workforce Management solutions do for your contact center? Provide advanced functionality, including leave management, self-service, mobile features

More information

ARE YOU READY FOR THESE TECHNOLOGY ENHANCEMENTS?

ARE YOU READY FOR THESE TECHNOLOGY ENHANCEMENTS? tech line / nov 2014 SMS VISUAL IVR MOBILE DEVICES VOICE BIOMETRICS VIDEO ARE YOU READY FOR THESE TECHNOLOGY ENHANCEMENTS? 5 cutting-edge contact center technologies that are moving beyond early adopters.

More information

User Behaviour Analytics

User Behaviour Analytics User Behaviour Analytics How do they know its really you? White Paper Sept 2015 Ezmcom Inc. 4701 Patrick Henry Drive BLDG 7, Santa Clara, CA, 95054, US Executive Summary Authentication has traditionally

More information

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Research Publication Date: 19 August 2010 ID Number: G00205618 Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Johan Jacobs Customers are insisting on multiple methods to

More information

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Enhancing customer experience: first, do no harm

Enhancing customer experience: first, do no harm Enhancing customer experience: first, do no harm Table of Contents Look for low-hanging fruit by assessing obvious problems... 2 Make technology changes when the time is right... 3 Cross-pollinate with

More information

MASTERCARD SECURECODE ISSUER BEST PRACTICES

MASTERCARD SECURECODE ISSUER BEST PRACTICES MASTERCARD SECURECODE ISSUER BEST PRACTICES Minimize Abandonment in Authorization and Maximize Fraud Reduction with an Optimal Implementation of SecureCode Best Practices The explosive growth of e-commerce

More information

Management Update: CRM Success Lies in Strategy and Implementation, Not Software

Management Update: CRM Success Lies in Strategy and Implementation, Not Software IGG-03122003-01 D. Hagemeyer, S. Nelson Article 12 March 2003 Management Update: CRM Success Lies in Strategy and Implementation, Not Software A customer relationship management (CRM) package doesn t ensure

More information

Oracle Retail Customer Engagement Cloud Services

Oracle Retail Customer Engagement Cloud Services OR A C L E D A T A S H E E T Oracle Retail Customer Engagement Cloud Services Oracle Retail Customer Engagement Cloud Services is a suite of integrated cloud services designed to drive incremental revenue

More information

customer care solutions

customer care solutions customer care solutions from Nuance case study :: Invesco Trimark Provides Personalized Service Using a Nuance Voice Verification Solution for Caller Identification and Authentication NUANCE :: customer

More information

WHITE PAPER Fighting Banking Fraud Without Driving Away Customers

WHITE PAPER Fighting Banking Fraud Without Driving Away Customers WHITE PAPER Fighting Banking Fraud Without Driving Away Customers Effective Methods for Targeting Cybercrime in Financial Services Table of Contents Introduction 1 Stopping Fraud: One Goal Among Many 2

More information

Outlook for the CRM Software Market: Trends and Forecast (Executive Summary) Executive Summary

Outlook for the CRM Software Market: Trends and Forecast (Executive Summary) Executive Summary Outlook for the CRM Software Market: Trends and Forecast (Executive Summary) Executive Summary Publication Date: October 30, 2002 Authors Thomas Topolinski Chad Eschinger Pranav Kumar This document has

More information

The Benefits of an Industry Standard Platform for Enterprise Sign-On

The Benefits of an Industry Standard Platform for Enterprise Sign-On white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed

More information

Voice biometrics. Advait Deshpande. 2002-2013 Nuance Communications, Inc. All rights reserved. Page 1

Voice biometrics. Advait Deshpande. 2002-2013 Nuance Communications, Inc. All rights reserved. Page 1 Voice biometrics Advait Deshpande 2002-2013 Nuance Communications, Inc. All rights reserved. Page 1 Imagine a world without PINS/Passwords 2002-2013 Nuance Communications, Inc. All rights reserved. Page

More information

Building a Multi-Channel Contact Center

Building a Multi-Channel Contact Center WHITE PAPER Building a Multi-Channel Contact Center Table of Contents Traditional Call Centers Evolve.... 3 The Multi-Channel Contact Center... 4 More Focus on the Consumer and Customer Experience... 5

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

VoiceSign TM Solution. Voice Signature Overview

VoiceSign TM Solution. Voice Signature Overview Voice Signature Overview VoiceSign adds 'speak on the dotted line' to transaction processes. Both business and client benefit from convenient and secure transaction verification process. How it works At

More information

Maintaining a Competitive Edge with Interaction Analysis

Maintaining a Competitive Edge with Interaction Analysis Explore Maintaining a Competitive Edge with Interaction Analysis Winner of the Frost & Sullivan 2007 Product Innovation Award Autonomy etalk White Paper Maintaining a Competitive Edge with Interaction

More information

Understanding the Benefits of Unified Communications

Understanding the Benefits of Unified Communications Understanding the Benefits of Unified Communications Overview Increasing operating efficiencies is more important than ever in today s business. Competitive pressures force organizations to improve processes

More information

Integrated Mobile Customer Experience (IMCx) Vision (Part 1) An Altivon White Paper. 2014 Altivon

Integrated Mobile Customer Experience (IMCx) Vision (Part 1) An Altivon White Paper. 2014 Altivon Integrated Mobile Customer Experience (IMCx) Vision (Part 1) An Altivon White Paper 2014 Altivon Integrated Mobile Customer Experience (IMCx) Vision (Part 1) Look around just about anywhere and you will

More information

Management Update: The Eight Building Blocks of CRM

Management Update: The Eight Building Blocks of CRM IGG-06252003-01 S. Nelson Article 25 June 2003 Management Update: The Eight Building Blocks of CRM Customer relationship management (CRM) represents the key business strategy that will determine successful

More information

What We Do. Our products harness big data and transform it into actionable knowledge, to be consumed in 5 seconds

What We Do. Our products harness big data and transform it into actionable knowledge, to be consumed in 5 seconds White Paper 2014 5 SECONDS TO KNOWLEDGE Why KMS lighthouse We improve customer experience by means of knowledge, leading the Knowledge Driven Experience (KDE) revolution What We Do Our products harness

More information

RSA Adaptive Authentication For ecommerce

RSA Adaptive Authentication For ecommerce RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers

More information

Agenda Overview for Mobile Marketing, 2015

Agenda Overview for Mobile Marketing, 2015 G00270723 Agenda Overview for Mobile Marketing, 2015 Published: 18 December 2014 Analyst(s): Mike McGuire Mobile technologies enable digital marketers to engage customers at every stage of the purchase

More information

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels

More information

Business Architecture Scenarios

Business Architecture Scenarios The OMG, Business Architecture Special Interest Group Business Architecture Scenarios Principal Authors William Ulrich, President, TSG, Inc. Co chair, OMG BASIG wmmulrich@baymoon.com Neal McWhorter, Principal,

More information

Data Management: Foundational Technologies for Health Insurance Exchange Success

Data Management: Foundational Technologies for Health Insurance Exchange Success INDUSTRY BRIEF Data Management: Foundational Technologies for Health Insurance Exchange Success Sponsored by: Informatica Janice W. Young November 2013 IN THIS INDUSTRY BRIEF U.S. health plans have been

More information

Speech-Enabled Interactive Voice Response Systems

Speech-Enabled Interactive Voice Response Systems Speech-Enabled Interactive Voice Response Systems Definition Serving as a bridge between people and computer databases, interactive voice response systems (IVRs) connect telephone users with the information

More information

The Customer Experience:

The Customer Experience: The Customer Experience: The Holy Grail of Competitive Advantage. 1 A great customer experience has emerged as the holy grail of competitive advantage. Providing a great customer experience has emerged

More information

Online And Mobile Are Transforming B2B Commerce Firms That Act Now Will Gain Appreciably, Companies That Don t Will Fall Farther Behind

Online And Mobile Are Transforming B2B Commerce Firms That Act Now Will Gain Appreciably, Companies That Don t Will Fall Farther Behind A Forrester Consulting Thought Leadership Paper Commissioned By hybris October 2013 Online And Mobile Are Transforming B2B Commerce Firms That Act Now Will Gain Appreciably, Companies That Don t Will Fall

More information

It s Not Just a Call, It s a Customer

It s Not Just a Call, It s a Customer It s Not Just a Call, It s a Customer A White Paper by The Beryl Institute May 2007 Dedicated to improving customer service in healthcare Copyright 2007 by The Beryl Institute. All rights reserved. 1 It

More information

Digital Commerce in Retail: Supporting a Common Mobile Customer Journey RETAILER SURVEY - CONDUCTED NOVEMBER 2014

Digital Commerce in Retail: Supporting a Common Mobile Customer Journey RETAILER SURVEY - CONDUCTED NOVEMBER 2014 Digital Commerce in Retail: Supporting a Common Mobile Customer Journey RETAILER SURVEY - CONDUCTED NOVEMBER 2014 Digital Commerce in Retail: Supporting a Common Mobile Customer Journey CONTENTS 1. Background

More information

Internet Banking Authentication Guidance is Out

Internet Banking Authentication Guidance is Out Brace Yourself: Updated d FFIEC Internet Banking Authentication Guidance is Out October 13, 2011 Paul Rainbow, Manager David Dyk, Manager 1 The material appearing in this presentation is for informational

More information

Motive Home Solutions

Motive Home Solutions Motive Home Solutions Motive Home Solutions automate and simplify the key interactions that impact the connected home experience. The connected home is no longer a futuristic concept. Research indicates

More information

Building Secure Multi-Factor Authentication

Building Secure Multi-Factor Authentication Building Secure Multi-Factor Authentication Three best practices for engineering and product leaders Okta Inc. I 301 Brannan Street, Suite 300 I San Francisco CA, 94107 info@okta.com I 1-888-722-7871 Introduction

More information

SOLUTION BRIEF: Insurance Give Policyholders Seamless Experiences Provide the Right Help for Satisfying Outcomes

SOLUTION BRIEF: Insurance Give Policyholders Seamless Experiences Provide the Right Help for Satisfying Outcomes SOLUTION BRIEF: Insurance Give Policyholders Seamless Experiences Provide the Right Help for Satisfying Outcomes Global economic uncertainty, new regulations and growth of digital technologies have created

More information