Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs
|
|
|
- Trevor Sharp
- 10 years ago
- Views:
Transcription
1 Solutions White Paper Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs Table of Contents Executive Summary Business Challenge SentryCom Enterprise Voice Authentication Platform* Technologies Summary Definitions and Acronyms For More Information References Executive Summary In most enterprises, computer users must call the helpdesk every time they need to reset their domain access passwords something users do so often, it can end up costing a company with 10,000 computer users more than $1.5 million per year in helpdesk services. Automatic speaker verification (ASV) technology from Israeli company SentryCom Ltd. based on open, standards-based, modular platforms from Intel allows users to change their own domain passwords without compromising security, enabling enterprises to dedicate their expensive helpdesk resources to more important tasks. The system can also be used to record time/attendance for the extended enterprise (for example, for mobile or remote employees working away from the office) and for secure corporate portal access from any PC using any wireless or wireline telephone. Business Challenge When an enterprise employee calls the helpdesk for a simple domain access password reset, a helpdesk employee normally has the caller answer a predetermined security question such as What is your mother s maiden name? to verify the employee s identity. This process is inconvenient and time-consuming. It is also basically insecure, since it relies on human accuracy. SentryCom Ltd. is a General Member of the Intel Communications Alliance: a community of communications and embedded developers and solution providers. Most importantly, having employees call the helpdesk for simple password resets is extraordinarily expensive. META Group estimates that an average computer user calls the company helpdesk 21 times a year. [Meta] On average, 30% of helpdesk calls are for password resets, with an average cost of $25 per reset. [ComputerWorld] For a company with 10,000 users, that adds up to $1,575,000 per year just for password resets.
2 Replacing this awkward and expensive process with a selfservice system is the obvious solution. It would also save the enterprise even more helpdesk time and money if the system could automatically: Log time/attendance for roaming employees using a phone within the extended enterprise. Enable employees to gain secure Web access from any PC using a phone within the extended enterprise. Allow employees to use a single sign-on to access multiple domains using a phone. But it is challenging to find a system that can let employees perform all these functions quickly and easily and without compromising the enterprise s security or changing its infrastructure. SentryCom Enterprise Voice Authentication Platform The solution to these challenges is automatic speaker verification (ASV) technology, which verifies the caller s identity using biometric matching of voiceprints. Biometrics is the automated use of physiological or behavioral characteristics to determine or verify identity. Biometric voice recognition technology uses the distinctive aspects of the voice to verify the identity of individuals. This voice recognition technology differs from speech recognition, a technology that translates what a user is saying (a process unrelated to authentication). ASV technology verifies the identity of the individual who is speaking. The ASV speaker verification process is fast, convenient, and secure. It does not force the employee to use expensive helpdesk resources for activities such as simple password changes. Also, it does not require the enterprise to change its infrastructure or the employees to change their habits. SentryCom, based in Haifa, Israel, used ASV technology to develop its Enterprise Voice Authentication Platform* (EVAP*), which uses a simple challenge-response user interface to prevent recorded playback of the person s voice by asking the caller to say quasi-random pairs of letters or digits for example, twenty-six, forty-one or ninety-three, sixty-four. This helps to eliminate fraudulent access. Technologies The voice authentication engine is a key building block of EVAP, which integrates with Web and contact center applications to provide for secure and cost-efficient remote access. It is designed to increase and enhance security while improving end users privacy and confidence. In developing EVAP, SentryCom used a patented authentication technology to address the known difficulties of voice authentication, including: False rejection rate (FRR) False acceptance rate (FAR) Noise tolerance Voice variability over time Immunity to impostor playback attacks and mimics Speakers with colds or other voice-altering conditions Long enrollment sessions A decision-making algorithm elps to solve the traditional weaknesses of voice authentication systems, reducing error rates (both FAR and FRR) without compromising the system s robustness. The authentication engine uses a text-dependent and language-independent interface as well as real-time, random, digit-pairs prompting to detect a live user and to prevent voice playback attack. Data extracted from the user s voiceprint which can be captured from PC microphones, telephones, and cellular phones is passed on to the authentication engine. As the user speaks, the shape of his or her vocal tract changes. The different shapes that the speaker s vocal tract assumes contribute to voiceprint personalization. When the speaker is prompted to talk, the voice authentication technology extracts the speaker s voiceprint and matches it with claimed Identity. If there is a good fit, then the speaker is accepted into the system and can proceed to use the application to which he or she has requested access. The system is not affected by nasalization that occurs when the speaker has a cold, or by speakers with speech impediments, as long as the user is able to speak consistently between registration and authentication. It can also identify mimics, who largely 2
3 New Permanent Password Mainframe UNIX IBM OS Windows NT*/2000 LDAP Password Reset Legacy Application UserID, OTP SQL Database SentryCom is Using 4 Lines of Intel Dialogic D/41JCT-LS Telephony Board on PC SentryCom Java Consumer Server UserIDs, OTP, DateTime Caller ID, PIN, VoicePrint Return OTP SentryCom Telephony Server User ID Customer Service Send CallerID, PIN, VoicePrint, Then Get Authentication Result And OTP Flash Phonecall to Help Desk If Authentication Failed If TRUE User, Then Send UserID, OTP, DateTime Adminstrator Console Admin Tools and Viewers Get VoicePrints, Then Store Authentication Result and OTP OTP OTP Server SentryCom Authenication Server SentryCom SQL Database Server Figure 1. Solution Architecture rely upon mannerisms, rhythm, and intonation to impersonate someone s voice. Since the voice authentication technology is based on short-term vocal tract shape, it is not fooled by mimics, which are rejected by the system. The system also protect against tape recorded attacks, since the voice authentication solution is text-dependent and uses real time, random prompting. The speaker is prompted to repeat specific, randomly-generated digits correctly and within a certain time limit, which is virtually impossible using a tape recording. The interactive voice response (IVR) component of the platform allows for multiple applications within the extended enterprise: Self-serving password reset Time/attendance Web access Single sign-on (SSO) Implementing ASV technology in the enterprise environment 3
4 requires a flexible, cost-effective IVR platform. SentryCom choose to develop its IVR platform around the Intel Dialogic D/41JCT-LS Combined Media Board. A four-port system provides sufficient concurrency for most enterprise needs. The four-port, analog D/41JCT-LS Combined Media Board is an ideal choice for developing global, enterprise applications such as IVR, unified messaging, and contact center applications. It supports voice, fax, and software-based speech recognition processing in a single PCI slot, providing four analog telephone interface circuits for direct connection to analog loop start lines. With a variety of international approvals, the D/41JCT-LS board cost effectively expands an application s ability to serve several global market segments. The SentryCom IVR solution is implemented in both English and Hebrew. The authentication software runs on servers using Intel processors and the Windows* operating system. The middleware for the solution is Intel NetMerge CT Application Development Environment, which helps speed development of IVR applications. This set of program building blocks is specifically designed to deliver the innovative features of Intel telecommunications technologies in forms that are easier to use and quicker to learn than conventional hardware interfaces. It eliminates the need to learn telephony hardware, application programming interfaces, and protocols. This software reduces the need to write directly to a telephony device s in C or C++. Summary The EVAP solution from SentryCom Ltd., based on open, standards-based, modular platforms from Intel, allows users to change their own domain passwords without compromising security, enabling enterprises to dedicate their expensive helpdesk resources to more important tasks. The system can also be used to record time/attendance for the extended enterprise (for example, for mobile or remote employees working away from the office) and for secure corporate portal access from any PC using any wireless or wireline telephone. which has successfully tested it for enterprise password reset. The Israeli Ministry of Trade and Commerce Chief Scientist Office approved the use of the system for time/attendance reporting. It is currently being evaluated by financial institutions in Israel, the U.S., and Denmark. Definitions and Acronyms Application programming interface ASV Automatic speaker verification CT Computer telephony EVAP Enterprise Voice Authentication Platform FAR False acceptance rate FRR False rejection rate IVR Interactive voice response PCI Peripheral Component Interface SSO Single sign-on For More Information SentryCom Ltd. Intel Dialogic D/41JCT-LS Combined Media Board Data Sheet web.htm Intel NetMerge CT Application Development Environment Data Sheets products/7445web.htm References [Meta] The Value of Identity Management: How Securing Identity Management Provides Value to the Enterprise, Meta Group, [ComputerWorld] Want to Save Some Money? Automate Password Resets, ComputerWorld, July 9, EVAP has been successfully tested for Web access with AnalystOnline, an Israeli financial portal, and with the Israeli Standards Institute National Biometrics Knowledge Center. It is also in use with a multi-national company based in the UK, 4
5 FOR MORE INFORMATION Please contact your local Intel representative or visit our websites at: This document and related materials and information are provided as is with no warranties, express or implied, including but not limited to any implied warranty of merchantability, fitness for a particular purpose, non-infringement of intellectual property rights, or any warranty otherwise arising out of any proposal, specification, or sample. Intel assumes no responsibility for any errors contained in this document and has no liabilities or obligations for any damages arising from or in connection with the use of this document. This whitepaper is for informational purposes only, and may contain typographical errors and technical inaccuracies. The content is provided as is, without express or implied warranties of any kind. Intel, Intel NetMerge, Pentium, Intel Centrino, the Intel logo are trademarks or registered trademarks of Intel Corporation and its subsidiaries in the United States and other countries. *Other names and brands may be claimed as the property of others. Copyright 2004 Intel Corporation. All rights reserved /04 4
Using Dialogic Boards to Enhance Voice Mail/Messaging Applications. Application Note
Using Dialogic Boards to Enhance Voice Mail/Messaging Applications Application Note Application Note Using Dialogic Boards to Enhance Voice Mail/Messaging Applications Executive Summary Voice mail, voice
The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged
Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog. A Nuance Education Paper
Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog A Nuance Education Paper 2009 Definition of Multi-Factor Authentication Dialog Many automated authentication applications
WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
The Cross-Media Contact Center
Whitepaper The Cross-Media Contact Center The Next-Generation Replacement for the Traditional Call Center Intel in Communications Executive Summary Because call centers are a principal point of contact
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
VoiceSign TM Solution. Voice Signature Overview
Voice Signature Overview VoiceSign adds 'speak on the dotted line' to transaction processes. Both business and client benefit from convenient and secure transaction verification process. How it works At
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
Getting the Most From. Your Help Desk
. Turbo-IT Corporation 103 West Second Street Irving, Texas 75060 http://www.turbo-it.com turbo-it Corporation Getting the Most From.......... Your Help Desk Cost Reduction Strategies for Service Desk
Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions
Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Dirk Roziers Market Manager PC Client Services Intel Corporation
Extranet Access Management Web Access Control for New Business Services
Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control
Managing Wireless Clients with the Administrator Tool. Intel PROSet/Wireless Software 10.1
Managing Wireless Clients with the Administrator Tool Intel PROSet/Wireless Software 10.1 This document is provided as is with no warranties whatsoever, including any warranty of merchantability, noninfringement
Application Note. Using Dialogic Boards to Enhance Interactive Voice Response Applications
Using Dialogic Boards to Enhance Interactive Voice Response Applications Using Dialogic Boards to Enhance Interactive Voice Response Applications Executive Summary Interactive Voice Response (IVR) systems
CA ArcotOTP Versatile Authentication Solution for Mobile Phones
PRODUCT SHEET CA ArcotOTP CA ArcotOTP Versatile Authentication Solution for Mobile Phones Overview Consumers have embraced their mobile phones as more than just calling or texting devices. They are demanding
Defender Delegated Administration. User Guide
Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS
ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS ImpostorMaps is a methodology developed by Auraya and available from Auraya resellers worldwide to configure,
Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide
Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Note Before using this information and the product it supports,
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
Provide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
Application Note. Gemalto s SA Server and OpenLDAP
Application Note Gemalto s SA Server and OpenLDAP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the
Administration Guide. Wireless software upgrades
Administration Guide Wireless software upgrades SWDT207654-207654-0727045705-001 Contents Upgrading the BlackBerry Device Software over the wireless network... 3 Wireless software upgrades... 3 Sources
Hitachi ID Password Manager Telephony Integration
Hitachi ID Password Manager Telephony Integration 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Functional integration 2 2.1 Self-service password reset....................................
Speaker Identification and Verification (SIV) Introduction and Best Practices Document
Speaker Identification and Verification (SIV) Introduction and Best Practices Document Internal Working Draft February 13, 2006 VoiceXML Forum Speaker Biometrics Committee Authors: Valene Skerpac, ibiometrics,
Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide
Tivoli Endpoint Manager for Security and Compliance Analytics Setup Guide Setup Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
Voice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India [email protected] Abstract: Voice authentication system captures the
Active Directory Synchronization with Lotus ADSync
Redbooks Paper Active Directory Synchronization with Lotus ADSync Billy Boykin Tommi Tulisalo The Active Directory Synchronization tool, or ADSync, allows Active Directory administrators to manage (register,
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
IT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
Intel Identity Protection Technology (IPT)
Intel Identity Protection Technology (IPT) Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Steve Davies Solution Architect Intel Corporation 1 Copyright
IBM Security SiteProtector System Migration Utility Guide
IBM Security IBM Security SiteProtector System Migration Utility Guide Version 3.0 Note Before using this information and the product it supports, read the information in Notices on page 5. This edition
OVERVIEW. DIGIPASS Authentication for Office 365
OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista
Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista [email protected] [email protected] November 2007 www.gemalto.com All information herein
White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview
White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4
Enhancing Password Management by Adding Security, Flexibility, and Agility IBM Redbooks Solution Guide
Enhancing Password Management by Adding Security, Flexibility, and Agility IBM Redbooks Solution Guide The number of logins and passwords that employees must manage on a daily basis continues to be a source
IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready
Agenda Key: Session Number: 35CA 540195 IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready 8 Copyright IBM Corporation, 2008. All Rights Reserved. This publication may refer
ORACLE FINANCIAL SERVICES ANALYTICAL APPLICATIONS INFRASTRUCTURE
ORACLE FINANCIAL SERVICES ANALYTICAL APPLICATIONS INFRASTRUCTURE KEY FEATURES Rich and comprehensive business metadata allows business users to interact with financial services data model to configure
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Interstage Application Server V7.0 Single Sign-on Operator's Guide
Interstage Application Server V7.0 Single Sign-on Operator's Guide Single Sign-on Operator's Guide - Preface Trademarks Trademarks of other companies are used in this user guide only to identify particular
Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management
IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo
NETWRIX IDENTITY MANAGEMENT SUITE
NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
The Intel NetStructure SIU520 Signaling Interface
The Intel NetStructure SIU520 Signaling Interface Intel in Communications The Intel NetStructure SIU520 signaling interface unit (SIU) provides Signaling System 7 (SS7) connectivity for multichassis call
PEOPLESOFT HELPDESK FOR HUMAN RESOURCES
PEOPLESOFT HELPDESK FOR HUMAN RESOURCES Today s Human Resource organizations are faced with the challenge of providing rapid and high quality customer service to their workforce while containing or reducing
IDGo 800 Minidriver for Windows. User Guide
IDGo 800 Minidriver for Windows User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the
Overcoming Security Challenges to Virtualize Internet-facing Applications
Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing
Samsung KNOX EMM Authentication Services. SDK Quick Start Guide
Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license
identity management in Linux and UNIX environments
Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual
HOTPin Integration Guide: Google Apps with Active Directory Federated Services
HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
An Oracle White Paper December 2010. Implementing Enterprise Single Sign-On in an Identity Management System
An Oracle White Paper December 2010 Implementing Enterprise Single Sign-On in an Identity Management System Introduction Most users need a unique password for every enterprise application, causing an exponential
Requesting Access to IBM Director Agent on Windows Planning / Implementation
Requesting Access to IBM Director Agent on Windows Planning / Implementation Main When IBM Director Server first discovers a managed system, that system might be initially locked (represented by padlock
MBAM Self-Help Portals
MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa
System Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment
Using Voice Biometrics in the Call Center Best Practices for Authentication and Anti-Fraud Technology Deployment This whitepaper is designed for executives and managers considering voice biometrics to
etoken TMS (Token Management System) Frequently Asked Questions
etoken TMS (Token Management System) Frequently Asked Questions Make your strong authentication solution a reality with etoken TMS (Token Management System). etoken TMS provides you with full solution
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly
White paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
CA Arcot RiskFort. Overview. Benefits
PRODUCT SHEET: CA Arcot RiskFort CA Arcot RiskFort CA Arcot RiskFort provides real-time protection against identity theft and online fraud via risk based, adaptive authentication. It evaluates the fraud
Application Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview
Application Note Atmel CryptoAuthentication Product Uses Atmel Abstract Companies are continuously searching for ways to protect property using various security implementations; however, the cost of security
Two-Factor Authentication
Two-Factor Authentication A Total Cost of Ownership Viewpoint CONTENTS + Two-Factor Authentication 3 A Total Cost of Ownership Viewpoint + Introduction 3 + Defining Total Cost of Ownership 3 + VeriSign
Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
Intel Processors in Industrial Control and Automation Applications Top-to-bottom processing solutions from the enterprise to the factory floor
Intel Processors in Industrial Control and Automation Applications Top-to-bottom processing solutions from the enterprise to the factory floor Intel Processors in Industrial Control and Automation Applications
Telephony Fundamentals
An Introduction to Basic Telephony Concepts Executive Summary As telecommunications has moved from proprietary to open, standardsbased systems, advanced voice solutions have grown richer and more cost
Installing the BlackBerry Enterprise Server Management Software on an administrator or remote computer
Installing the BlackBerry Enterprise Server Management Software on an administrator or Introduction Some administrators want to install their administrative tools on their own Windows 2000 computer. This
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
Configuring IBM Cognos Controller 8 to use Single Sign- On
Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright
ios Team Administration Guide (Legacy)
ios Team Administration Guide (Legacy) Contents About ios Development Team Administration 5 At a Glance 6 Team Admins Manage Team Membership and Assign Roles in the Member Center 6 Development Devices
Administrators Help Manual
Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service
IP Contact Center: Realize the Full Business Potential of IP Contact Centers
IP Contact Center: Realize the Full Business Potential of IP Contact Centers WHITEPAPER The joint solution from Cisco and IBM provides people, processes, and technology needed to maximize the return on
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
Intel Embedded Virtualization Manager
White Paper Kelvin Lum Fee Foon Kong Platform Application Engineer, ECG Penang Intel Corporation Kam Boon Hee (Thomas) Marketing Development Manager, ECG Penang Intel Corporation Intel Embedded Virtualization
SafeNet Cisco AnyConnect Client. Configuration Guide
SafeNet Cisco AnyConnect Client Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and
Two-Factor Authentication
Chen Arbel Vice President, Strategic Development Authentication Unit & Software DRM Aladdin Knowledge Systems Two-Factor Authentication The key to compliance for secure online banking Legal Notice Copyright
Netop Remote Control Security Server
A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days
Installing on Windows
Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Note Before using this information and the product it supports,
Cisco and IBM: Enhancing the Way People Work Through Unified Communications
Cisco and IBM: Enhancing the Way People Work Through Unified Communications WHITEPAPER August 2007 Cisco and IBM Strategic Alliance: Whitepaper Table of Contents Executive Summary... 1 A Winning Approach...
BlackBerry Enterprise Server. BlackBerry Administration Service Roles and Permissions Version: 5.0 Service Pack: 4.
BlackBerry Enterprise Server BlackBerry Administration Service Roles and Permissions Version: 5.0 Service Pack: 4 Reference Guide Published: 2013-03-28 SWD-20130328143914668 Contents 1 Administrative s
BlackBerry Enterprise Solution and RSA SecurID
Technology Overview BlackBerry Enterprise Solution and RSA SecurID Leveraging Two-Factor Authentication to Provide Secure Access to Corporate Resources Table of Contents Executive Summary 3 Empowering
customer care solutions
customer care solutions from Nuance enterprise white paper :: Nuance VocalPassword Security Overview Version 7.0 NUANCE :: customer care solutions Contents About this Document...3 Nuance VocalPassword
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.
MITEL. 5000 Communications Platform
MITEL 5000 Communications Platform Today s Hybrid Communications Platform In today s competitive business environment, you understand the need to optimize the performance of your organization by utilizing
SafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
Voice Authentication On-Demand: Your Voice as Your Key
Voice Authentication On-Demand: Your Voice as Your Key Paul Watson, Vice President Relationship Technology Management Voice Search Conference March 2-4, 2009 Convergys Corporation A Global Leader in Relationship
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
