Voice biometrics. Advait Deshpande Nuance Communications, Inc. All rights reserved. Page 1
|
|
- Jody Crawford
- 8 years ago
- Views:
Transcription
1 Voice biometrics Advait Deshpande Nuance Communications, Inc. All rights reserved. Page 1
2 Imagine a world without PINS/Passwords Nuance Communications, Inc. All rights reserved. Page 2
3 Nuance Communications, Inc. All rights reserved. Page 3
4 Nuance Nuance Communications, Inc. All rights reserved. Page 4
5 Who is Nuance? Reinventing the relationship between people and technology Defining the next generation of human-computer interaction: Intelligent Systems Deeply invested in creating effortless and natural user experiences Best known for rapidly advancing voice-recognition technology The only publicly held USbased Voice Biometrics solutions provider Nuance Confidential Nuance Communications, Inc. All rights reserved. Page 5
6 7 billion mobile cloud transactions annually 4,100 patents & applications 65+ countries 14+ billion customer engagements per year 12,000 employees 80+ languages 800 million mobile keyboards shipped annually 15,000 mobile app developers 1,200 voice and language scientists and engineers 5 billion lines of medical data transcribed annually 25 million voice-enabled cars sold annually 6,500+ companies use Nuance Enterprise solutions Nuance Communications, Inc. All rights reserved. Page 6
7 What is voice biometrics? Nuance Communications, Inc. All rights reserved. Page 7
8 How it Works? Behavioral Characteristics Pronunciation, emphasis, speed of speech, accents Physical Characteristics Unique physical traits of your vocal tract, mouth shape and size, nasal passages Nuance Communications, Inc. All rights reserved. Page 8
9 Why voice biometrics? User convenience Nuance Communications, Inc. All rights reserved. Page 9
10 85% respondents dissatisfied with current automated authentication system. The questionnaire was designed by Coleman Parkes Research in close conjunction with both Opus and Nuance. The research was conducted in May 2012 and undertaken under the strict rules of MRS Nuance Communications, Inc. All rights reserved. Page 10
11 Nuance Communications, Inc. All rights reserved. Page 11
12 Why voice biometrics? Better Security Nuance Communications, Inc. All rights reserved. Page 12
13 Threat landscape Identity theft achieved easily via social networks, Phishing, Vishing, Smishing Phone channel is new frontier for Fraudsters. Stop relying on Challenge questions facebook has all the answers! Don't rely on easily exposed data to identify callers: Birth Date, Account Numbers Nuance Communications, Inc. All rights reserved. Page 13
14 Mul$ factor authen$ca$on not an op$on anymore! Something you have: Mobile Phone Token Card/Document Something you know Password PIN Question Something you are Voice signature Fingerprint Facial recognition Regulatory (FFIEC, Basel) Recommendations Single-factor authentication methods are inadequate for high-risk financial transactions Financial Institutions can us a variety of methods to establish authentication, including These methods can be either single factor or multi-factor Multi-factor authentication is not just a good idea its required by regulators!! Nuance Communications, Inc. All rights reserved. Page 14
15 More Secure than PINs, Password Up to 30% of financial account takeover fraud is perpetrated on channels with PIN/Password authentication Up to 60% of US consumers use the same Passwords for multiple credentials* Up to 25% of users fail knowledge based authentication while fraudster successfully get through Nuance Communications, Inc. All rights reserved. Page 15
16 How and where is it used? Nuance Communications, Inc. All rights reserved. Page 16
17 Voice Biometrics Solutions Active Speaker Verification Passive Speaker Verification Verifies a speaker s identity based on voiceprints acquired during an interaction with IVR, web, or mobile applications IVR/Mobile/Web Interaction Transparently verifies the speaker s identifies during the course of natural conversation Agent Interaction Nuance Communications, Inc. All rights reserved. Page 17
18 What is Voice Biometrics used for today? Use cases Business cases Improved call automation Reduced call handle time Improved agent satisfaction Increased client satisfaction Increased revenues Reduced fraud Nuance Communications, Inc. All rights reserved. Page 18
19 Voice Biometric Deployments Financial Services Telecom pid=newsarchive&sid=af9oh5v36.mo private/active_docs/ customer_references/ SS_NA_MTS_Allstream_Consulting_scr een.pdf /2011_CIO_100_How_Three_Compa nies_are_using_it_to_rethink_consumer_ Services /Barclays-streamlines-phonebanking-with-voice-biometrics announcements/ announcements_ _globalbilgi_voi ce_bio_and_satisfaction.pdf ArticleID= Nuance Communications, Inc. All rights reserved. Page 19
20 How to quantify the business value? Nuance Communications, Inc. All rights reserved. Page 20
21 Building a compelling business case The traditional business case is based on AHT savings Increased IVR containment, FCR Cost avoidance by reducing fraud Nuance Communications, Inc. All rights reserved. Page 21
22 New approach to business case Operational savings Improved customer experience Revenue generation Evolving approach *Harvard business review July august Nuance Communications, Inc. All rights reserved. Page 22
23 Voice Biometrics delivers cost savings 4% Contact Center Operation Savings $1m Annual savings Nuance Communications, Inc. All rights reserved. Page 23
24 Thank You Nuance Communications, Inc. All rights reserved. Page 24
customer care solutions
customer care solutions from Nuance enterprise white paper :: Voice Biometrics Industry Solutions Overview Nuance s voice biometrics products are designed to meet the dynamic security needs of the world
More informationAgenda. Announcement: Verint Acquires Victrio Victrio Solutions Client Results in Deployment Critical Success Factors Verint + Victrio Synergy
1 Agenda Announcement: Verint Acquires Victrio Victrio Solutions Client Results in Deployment Critical Success Factors Verint + Victrio Synergy 2 October 29: Verint Acquires Victrio Who is Verint? (NASDAQ:VRNT)
More informationVoice Authentication On-Demand: Your Voice as Your Key
Voice Authentication On-Demand: Your Voice as Your Key Paul Watson, Vice President Relationship Technology Management Voice Search Conference March 2-4, 2009 Convergys Corporation A Global Leader in Relationship
More information75% of big companies globally have been affected by fraud in the last 12 months
THE ENTERPRISE SECURITY CHALLENGE 75% of big companies globally have been affected by fraud in the last 12 months 50% of organizations classify themselves as highly vulnerable to information and identity
More informationShared VRU. A Key Link in Your Customer Service Chain Kyle Shadday, Director, Voice Response Strategy
Shared VRU A Key Link in Your Customer Service Chain Kyle Shadday, Director, Voice Response Strategy Agenda Voice response within FIS Telephone banking today FIS shared VRU roadmap Speech recognition Unleash
More informationFFIEC CONSUMER GUIDANCE
FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their
More informationPursuing Compliance with the FFIEC Guidance Risk Assessment 101 KPMG RISK ADVISORY SERVICES
Pursuing Compliance with the FFIEC Guidance Risk Assessment 101 KPMG RISK ADVISORY SERVICES Contents PART I An Increasing Threat: Identity Theft The FFIEC Response Risk Assessment Fundamentals The FFIEC
More informationFront cover Authenticating Customers with Nuance Voice Biometrics Solutions
Front cover Authenticating Customers with Nuance Voice Biometrics Solutions Redguides for Business Leaders Brett Beranek Russell Warren Understand how authentication impacts call center interactions Explore
More informationELECTRONIC AUTHENTICATION. Understanding the New. Multi-factor authentication and layered security are
Understanding the New ELECTRONIC AUTHENTICATION Multi-factor authentication and layered security are helping assure safe Internet transactions for credit unions and their members. Assuring Your Online
More informationTECHNOLOGY WHITEPAPER
TECHNOLOGY WHITEPAPER Securing Citizen Self-Service for Government AURAYA SYSTEMS One Tara Boulevard Nashua, New Hampshire 03062 +1 603 123 7654 twitter.com/armorvox linkedin/in/armorvox Securing Citizen
More informationHere are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online.
Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online. FFIEC BUSINESS ACCOUNT GUIDANCE New financial standards will assist credit
More informationContact Center Automation
Frequently Asked Questions on Contact Center Automation Summary Uniphore Software Systems, a pioneer in providing voice-based mobility solutions has integrated its Contact Center Automation solutions to
More informationReducing Fraud whilst Keeping Transactions in Motion
Reducing Fraud whilst Keeping Transactions in Motion Fraud Today Following a decrease in 2012, fraud is on the rise again, and so are the costs involved in managing it. These factors are in turn driving
More informationFFIEC CONSUMER GUIDANCE
FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their
More informationMeasuring Performance in a Biometrics Based Multi-Factor Authentication Dialog. A Nuance Education Paper
Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog A Nuance Education Paper 2009 Definition of Multi-Factor Authentication Dialog Many automated authentication applications
More informationVoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk
VoiceTrust Whitepaper Employee Password Reset for the Enterprise IT Helpdesk Table of Contents Introduction: The State of the IT Helpdesk...3 Challenge #1: Password-Related Helpdesk Costs are Out of Control...
More informationE-Banking Regulatory Update
E-Banking Regulatory Update Hal R. Paretchan, CISA, CISSP, CFE Information Technology Specialist Federal Reserve Bank of Boston Supervision, Regulation & Credit (617) 973-5971 hal.paretchan@bos.frb.org
More informationUser Behaviour Analytics
User Behaviour Analytics How do they know its really you? White Paper Sept 2015 Ezmcom Inc. 4701 Patrick Henry Drive BLDG 7, Santa Clara, CA, 95054, US Executive Summary Authentication has traditionally
More informationImproving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
More informationcustomer care solutions
customer care solutions from Nuance white paper :: The ROI of Hosted IVR Why Organizations are Investing in Customers, Not Equipment NUANCE :: customer care solutions Hosted speech IVR is rapidly overtaking
More informationInternet Banking Authentication Guidance is Out
Brace Yourself: Updated d FFIEC Internet Banking Authentication Guidance is Out October 13, 2011 Paul Rainbow, Manager David Dyk, Manager 1 The material appearing in this presentation is for informational
More informationinteractive product brochure :: Nina: The Virtual Assistant for Mobile Customer Service Apps
interactive product brochure :: Nina: The Virtual Assistant for Mobile Customer Service Apps This PDF contains embedded interactive features. Make sure to download and save the file to your computer to
More informationFrench Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
More informationMOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO
MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION A Goode Intelligence white paper sponsored by AGNITiO First Edition September 2014 Goode Intelligence All Rights Reserved Sponsored
More informationCustomer experience roulette: are banks making the right investments?
Customer experience roulette: are banks making the right investments? A survey of banking consumers and executives. 1 Executive summary Nuance commissioned a survey of 1,000 American consumers to learn
More informationAdvanced Biometric Technology
INC Internet Biometric Security Systems Internet Biometric Security System,Inc.White Papers Advanced Biometric Technology THE SIMPLE SOLUTION FOR IMPROVING ONLINE SECURITY Biometric Superiority Over Traditional
More informationTop Authentication & Identification Methods to Protect Your Credit Union
Top Authentication & Identification Methods to Protect Your Credit Union Presented on: Thursday, May 7, 2 3 ET Co presented by: Ann Davidson VP of Risk Consulting at Allied Solutions Tammy Behnke Credit
More informationOnline Banking Risks efraud: Hands off my Account!
Online Banking Risks efraud: Hands off my Account! 1 Assault on Authentication Online Banking Fraud Significant increase in account compromises via online banking systems Business accounts are primary
More informationSound Business Practices for Businesses to Mitigate Corporate Account Takeover
Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.
More informationVoice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India rahulrsharma999@gmail.com Abstract: Voice authentication system captures the
More informationMobile E-Commerce: Friend or Foe? A Cyber Security Study
Research February 2015 Mobile E-Commerce: Friend or Foe? A A J.Gold Associates Research Report Many consumers now interact with the Internet primarily through mobile devices, avoiding traditional PC devices
More informationFFIEC BUSINESS ACCOUNT GUIDANCE
FFIEC BUSINESS ACCOUNT GUIDANCE New financial standards will assist credit unions and business account holders to make online banking safer and more secure from account hijacking and unauthorized funds
More informationTHE FFIEC CHALLENGE A Call for Reliable Authentication
THE FFIEC CHALLENGE A Call for Reliable Authentication March 14, 2006 ISACA LOS ANGELES RISK ADVISORY SERVICES INFORMATION RISK MANAGEMENT Agenda The FFIEC Challenge Current/Future Authentication Scenarios
More informationOC Business Council Cybersecurity Task Force Meeting Online Fraud Update. April 2015
OC Business Council Cybersecurity Task Force Meeting Online Fraud Update April 2015 2014 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or
More informationWHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
More informationBriefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.
Polling Question Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication. Please type in your response. This poll will close promptly at 1:00 pm CDT Getting the
More informationGuide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
More informationMulti-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
More informationKEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com info@plurilock.com 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
More informationSecure communications via IdentaDefense
Secure communications via IdentaDefense How vulnerable is sensitive data? Communication is the least secure area of digital information. The many benefits of sending information electronically in a digital
More informationFFIEC Supplemental Guidance to Authentication in an Internet Banking Environment. Robert Farmer Senior Technology Compliance Manager
FFIEC Supplemental Guidance to Authentication in an Robert Farmer Senior Technology Compliance Manager 1 888 250 4400 Effective Date The FFIEC Supplement to Authentication in an was issued on June 28,
More informationKNOWLEDGE-BASED AUTHENTICATION USE CASE EBOOK
KNOWLEDGE-BASED AUTHENTICATION USE CASE EBOOK Learn about the many ways in which organizations like yours are using dynamic knowledge-based authentication to protect their customers and streamline business
More informationTelephone Banking Authentication Practical Approaches to Securing a Popular yet Vulnerable Channel
Telephone Banking Authentication yet Vulnerable Channel March 2007 Overview Financial institutions (FIs) must implement effective authentication solutions that address specific, often mutually exclusive
More information2 FACTOR + 2. Authentication WAY
2 FACTOR + 2 WAY Authentication Deepnet DualShield is an open, unified authentication platform that enables multi-factor strong authentication across diverse applications, users and security tokens. 5
More informationIDENTIFY YOUR CUSTOMERS
CONFIDENTID MOBILE USER AUTHENTICATION IDENTIFY YOUR CUSTOMERS BEYOND A SHADOW OF A DOUBT solutions for SECURE MOBILE AND ONLINE BANKING AUTHENTICATE WITH CONFIDENCE RECOGNIZE YOUR CUSTOMERS AND YOUR RISKS
More informationEnterprise Voice Technology Solutions: A Primer
Cognizant 20-20 Insights Enterprise Voice Technology Solutions: A Primer A successful enterprise voice journey starts with clearly understanding the range of technology components and options, and often
More informationStrong Authentication. Securing Identities and Enabling Business
Strong Authentication Securing Identities and Enabling Business Contents Contents...2 Abstract...3 Passwords Are Not Enough!...3 It s All About Strong Authentication...4 Strong Authentication Solutions
More informationMulti-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
More informationFFIEC Authentication Guidance Examination in 2012: Are You Prepared?
FFIEC Authentication Guidance Examination in 2012: Are You Prepared? Areas of Continuity, Change, and Emphasis The Knowledge Congress LIVE Webcast March 8, 2012 Andrew Lorentz Partner, Washington, D.C.
More informationA New Authentication Paradigm:
A New Authentication Paradigm: Call Center Security without Compromising Customer Experience Financial institutions can reap significant financial gains by using voiceprints to authenticate through the
More informationHow To Use Usher For Business
MicroStrategy Enterprise Security Secure your enterprise with MicroStrategy Usher, the revolutionary new enterprise security platform Nearly 90% of IT Security Professionals Are Concerned About A Data
More informationCreating Trust Online TM. Comodo Mutual Authentication Solution Overview: Comodo Two Factor Authentication Comodo Content Verification Certificates
Creating Trust Online TM Comodo Mutual Authentication Solution Overview: Comodo Two Factor Authentication Comodo Content Verification Certificates January 2007 Setting the stage Banking and doing business
More informationVocalPassword : voice biometrics authentication.
VocalPassword : authentication. Friendly voice authentication across web, IVR, call center, or mobile. 1 VocalPassword for easy and secure authentication. VocalPassword, the world s most widely deployed
More informationIntelligent Contact Management with. Flexible cloud services from VoltDelta. Contact centre Self service Customer insight
R Intelligent Contact Management with Flexible cloud services from VoltDelta >> >> >> Contact centre Self service Customer insight Contact centre out of the cloud Intelligently manage every contact channel
More informationREPORT. Next steps in cyber security
REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15
More informationBuilding Secure Multi-Factor Authentication
Building Secure Multi-Factor Authentication Three best practices for engineering and product leaders Okta Inc. I 301 Brannan Street, Suite 300 I San Francisco CA, 94107 info@okta.com I 1-888-722-7871 Introduction
More informationUnderstanding It s Me 247 Security. A Guide for our Credit Union Clients and Owners
Understanding It s Me 247 Security A Guide for our Credit Union Clients and Owners October 2, 2014 It s Me 247 Security Review CU*Answers is committed to the protection of you and your members. CU*Answers
More informationAuthentication Solutions Through Keystroke Dynamics
Objective: The objective of this paper is to provide a basic understanding of the biometric science of keystroke dynamics, and how BioPassword is using keystroke dynamics technology to deliver enterprise
More informationSecurity Assessment of briidge.net TM 2-Step verification for banking customers in a multichannel delivery environment that is FFIEC compliant
Security Assessment of briidge.net TM 2-Step verification for banking customers in a multichannel delivery environment that is FFIEC compliant Prepared for: By: Wesly Delva, SSCP, Information Security
More informationSecurity and Usability
Security and Usability David Hunt: DCH Technology Services A Financial Services View Active Security Passive Security Technologies Impact on Users Big Data Consumer context, do we know you? Active Security
More informationEntrust IdentityGuard
+1-888-437-9783 sales@identisys.com IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
More informationMoving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
More informationSupplement to Authentication in an Internet Banking Environment
Federal Financial Institutions Examination Council 3501 Fairfax Drive Room B7081a Arlington, VA 22226-3550 (703) 516-5588 FAX (703) 562-6446 http://www.ffiec.gov Purpose Supplement to Authentication in
More informationTABLE OF CONTENTS. Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13
TABLE OF CONTENTS Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13 Introduction Our world is more Mobile now than ever. In 2013
More informationMobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime
More informationTechnical User Group Agenda
Technical User Group Agenda December 16, 2014 Web Conference Information URL: https://www.connectmeeting.att.com Meeting Number: 8665282256 Access Code: 5251941 10:00 a.m. 10:30 a.m. (Pacific Time) Conference
More informationThe Implementation of Multifactor Authentication in Canadian Financial Institutions. By Wilson Yee Tsun Lo ACC 626
The Implementation of Multifactor Authentication in Canadian Financial Institutions By Wilson Yee Tsun Lo ACC 626 1.0 Introduction The Internet has enabled financial institutions to offer various additional
More informationFrequently Asked Questions on FFIEC Guidance on Authentication in an Internet Banking Environment. August 15, 2006
Board of Governors of the Federal Reserve System Federal Deposit Insurance Corporation National Credit Union Administration Office of the Comptroller of the Currency Office of Thrift Supervision Frequently
More informationAutomatic Speaker Verification (ASV) System Can Slash Helpdesk Costs
Solutions White Paper Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs Table of Contents Executive Summary............................. 1 Business Challenge.............................
More informationAre All High-Risk Transactions Created Equal?
Are All High-Risk Transactions Created Equal? How to Minimize FFIEC Exam Pain 1 Lee Wetherington, AAP Director of Strategic Insight ProfitStars @leewetherington Agenda New Supplement to FFIEC Guidance
More informationEnterprise Readiness Series: The Case for Passive, Voice-Based Authentication
Enterprise Readiness Series: The Case for Passive, Voice-Based Authentication Today s customer authentication methods are from another age. Opus Research interviewed security and customer care professionals
More informationTop 5 Reasons to Choose User-Friendly Strong Authentication
SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts
More informationBest Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
More informationWhitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
More informationAUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
More informationInteractive product brochure :: Nina TM Mobile: The Virtual Assistant for Mobile Customer Service Apps
TM Interactive product brochure :: Nina TM Mobile: The Virtual Assistant for Mobile Customer Service Apps This PDF contains embedded interactive features. Make sure to download and save the file to your
More informationWhite Paper. FFIEC Authentication Compliance Using SecureAuth IdP
White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by
More informationStemming the Rising Tide of Contact Center Fraud
Stemming the Rising Tide of Contact Center Fraud 2013 NICE. All rights reserved. Reproduction of this report by any means is strictly prohibited. TABLE OF CONTENTS INTRODUCTION... 3 CONTACT CENTER IN THE
More informationVoiceSign TM Solution. Voice Signature Overview
Voice Signature Overview VoiceSign adds 'speak on the dotted line' to transaction processes. Both business and client benefit from convenient and secure transaction verification process. How it works At
More informationGood Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries
More informationReport» Using Voice Biometrics for Strong Authentication and Risk Reduction
Report» Using Voice Biometrics for Strong Authentication and Risk Reduction Report» Using Voice Biometrics for Strong Authentication and Risk Reduction This era of self-service, cloud computing and Bring-Your-Own-Device
More informationTECHNOLOGY WHITEPAPER
TECHNOLOGY WHITEPAPER ArmorVox10 Targets Call Center Fraud How to provide fast voice-file cross-matching to detect and track fraud in call centers. AURAYA SYSTEMS One Tara Boulevard Nashua, New Hampshire
More informationStrategic Healthcare IT Advanced Research. SHARPS Project and ILHIE Prototype June 26, 2013
Strategic Healthcare IT Advanced Research Projects on Security (SHARPS) SHARPS Project and ILHIE Prototype June 26, 2013 Strategic Health IT Advanced Research Projects (SHARP) SHARP Area 1 Security and
More informationBusiness Banking Customer Login Experience for Enhanced Login Security
Business Banking Customer Login Experience for Enhanced Login Security User credentials uniquely identify each person who uses the banking platform. The intent of authentication is unequivocal verification
More informationMulti-Factor Authentication Core User Policy and Procedures
Multi-Factor Authentication Core User Policy and Procedures Core Users with access to other people s sensitive or restrictive information must use one-time passwords (OTP) generated from approved fobs
More informationNeustar Intelligent Cloud Services
Neustar Intelligent Cloud Services Position Paper: W3C Workshop on Identity in the Browser Submitted on April 20, 2011 Primary Contact John Hwang Product Manager, Neustar 571-434-4693 john.hwang@neustar.biz
More informationUsing Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment
Using Voice Biometrics in the Call Center Best Practices for Authentication and Anti-Fraud Technology Deployment This whitepaper is designed for executives and managers considering voice biometrics to
More informationTransforming the Customer Experience When Fraud Attacks
Transforming the Customer Experience When Fraud Attacks About the Presenters Mike Young, VP, Product Team, Everbank Manages consumers and business banking products, as well as online and mobile banking
More informationACI Response to FFIEC Guidance
ACI Response to FFIEC Guidance Version 1 July 2011 Table of contents Introduction 3 FFIEC Supervisory Expectations 4 ACI Online Banking Fraud Management 8 Online Banking Fraud Detection and Prevention
More informationECONOMICS OF IDENTITY
ECONOMICS OF IDENTITY The size and potential of the UK market for identity assurance Economics of Identity White Paper THE OPEN IDENTITY EXCHANGE CTRL-SHIFT By Alan Mitchell and Jamie Smith Foreword By
More informationThe Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device
The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-668-6536 www.phonefactor.com Executive
More informationOut-Of-Band Authentication Using a Real-time, Multi-factor Service Model
Out-Of-Band Authentication Using a Real-time, Multi-factor Service Model Andrew Rolfe Authentify, Inc. Andy.Rolfe@Authentify.com Presentation Overview Authentication basics What is OOBA? Why is it important?
More informationProtect Your Business and Customers from Online Fraud
DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently
More informationBeyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
More informationHow to reduce the cost and complexity of two factor authentication
WHITEPAPER How to reduce the cost and complexity of two factor authentication Published September 2012 48% of small and medium sized businesses consistently cite technical complexity and cost of ownership
More informationMultifactor Authentication August 10, 2006
m-hoesing@cox.net (402) 981-7747 Multifactor Authentication August 10, 2006 Str0nGp_w Meeting OCC 2005-35 Requirements for Multifactor Authentication on ebanking Applications Standard disclaimer, I never
More informationIDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
More informationMoving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers
Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers Sponsored by Nok Nok Labs, Inc. Independently conducted by Ponemon Institute LLC Publication
More informationWhite Paper. Speech-enabled applications can provide better customer service at 1/12th the cost of live agents. Nuance. Speech. Understanding. Action.
White Paper 1005 Hamilton Court Menlo Park, CA 94025 Phone 650.847.0000 Fax 650.847.7979 www.nuance.com Speech-enabled applications can provide better customer service at 1/12th the cost of live agents
More information